Often, components implements TEEs, making it hard for attackers to compromise the computer software running inside of them. With hardware-dependent TEEs, we decrease the TCB towards the components along with the Oracle application managing to the TEE, not the whole computing stacks with the Oracle program. Strategies to real-object authentication:Y