Normally, hardware implements TEEs, making it demanding for attackers to compromise the software package working inside them. With components-based mostly TEEs, we decrease the TCB on the components and the Oracle software package working around the TEE, not your complete computing stacks in the Oracle method. Approaches to real-item authentication