Often, components implements TEEs, which makes it difficult for attackers to compromise the program managing inside them. With components-based mostly TEEs, we decrease the TCB for the hardware along with the Oracle software running around the TEE, not the whole computing stacks from the Oracle program. Techniques to real-object authentication:As o