Frequently, components implements TEEs, rendering it complicated for attackers to compromise the program operating inside them. With components-based TEEs, we reduce the TCB to the components and the Oracle software package operating to the TEE, not the complete computing stacks from the Oracle procedure. Approaches to real-item authentication:Toke