Generally, hardware implements TEEs, rendering it demanding for attackers to compromise the software program functioning within them. With components-based TEEs, we lessen the TCB on the components plus the Oracle software package working on the TEE, not all the computing stacks in the Oracle system. Techniques to real-object authentication:This is