Often, components implements TEEs, which makes it complicated for attackers to compromise the software package managing inside of them. With components-primarily based TEEs, we decrease the TCB to the components and the Oracle program jogging within the TEE, not the entire computing stacks from the Oracle system. Approaches to real-item authenticat