Normally, components implements TEEs, rendering it complicated for attackers to compromise the program managing inside of them. With components-dependent TEEs, we decrease the TCB into the components plus the Oracle software package jogging over the TEE, not all the computing stacks on the Oracle technique. Ways to real-item authentication:Licensin