Usually, components implements TEEs, rendering it hard for attackers to compromise the software functioning inside them. With components-based TEEs, we lessen the TCB into the hardware as well as Oracle application operating over the TEE, not your complete computing stacks with the Oracle program. Techniques to real-object authentication:Ondo democ