On Reducing The Trusted Computing Base In Binary Verification