Understanding The Capabilities Of Privileged Attackers Against Trusted Execution Environments