Normally, components implements TEEs, which makes it complicated for attackers to compromise the software package managing inside them. With hardware-primarily based TEEs, we reduce the TCB for the hardware and the Oracle software managing on the TEE, not all the computing stacks in the Oracle process. Techniques to real-object authentication:A var