Frequently, hardware implements TEEs, rendering it demanding for attackers to compromise the software package managing within them. With components-based mostly TEEs, we reduce the TCB on the hardware and also the Oracle computer software running around the TEE, not all the computing stacks of the Oracle method. Methods to real-object authenticatio