Trusted hardware components are essential when protecting the security of our devices and privacy of our online activities. Several kinds of trusted hardware components are widely available, most notably Trusted Execution Environments (TEEs) and Secure Hardware Tokens. Increasing availability of such hardware prompts a natural question: How can systems benefit from these trusted hardware components? In this dissertation, we design four systems (COMIT, PDoT, CACTI, and VICEROY) that have enhanced security and privacy properties due to the integration of trusted hardware components. We identify and address the key challenges and issues that arise during the integration process. By evaluating proof-of-concept implementations of the four systems, we show that they meet necessary security, privacy, latency, throughput, and deployment requirements.