Typically, hardware implements TEEs, which makes it difficult for attackers to compromise the computer software working inside of them. With components-primarily based TEEs, we decrease the TCB into the hardware along with the Oracle software managing on the TEE, not all the computing stacks with the Oracle system. Strategies to real-object authent