美女扒开腿免费视频_蜜桃传媒一区二区亚洲av_先锋影音av在线_少妇一级淫片免费放播放_日本泡妞xxxx免费视频软件_一色道久久88加勒比一_熟女少妇一区二区三区_老司机免费视频_潘金莲一级黄色片_精品国产精品国产精品_黑人巨大猛交丰满少妇

COMP3217代做、Python/Java編程設計代寫

時間:2024-02-28  來源:  作者: 我要糾錯



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區
    昆明西山國家級風景名勝區
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    美女扒开腿免费视频_蜜桃传媒一区二区亚洲av_先锋影音av在线_少妇一级淫片免费放播放_日本泡妞xxxx免费视频软件_一色道久久88加勒比一_熟女少妇一区二区三区_老司机免费视频_潘金莲一级黄色片_精品国产精品国产精品_黑人巨大猛交丰满少妇
    91视频综合网| 久久婷婷五月综合| 91精品少妇一区二区三区蜜桃臀| 中国特黄一级片| 国产精品久久无码| 免费在线黄色网| www.日本高清视频| 级毛片内射视频| mm131美女视频| 国产午夜在线一区二区三区| 日本猛少妇色xxxxx免费网站| 久久久老熟女一区二区三区91| 一级黄色毛毛片| 长河落日免费高清观看| 无码一区二区精品| 国产视频久久久久久| 无码人妻一区二区三区精品视频| 无人码人妻一区二区三区免费| 99自拍视频在线| 国产大学生自拍| 神马午夜精品91| 日韩久久久久久久久久久| 老女人性淫交视频| 国产精品九九视频| 男女做爰猛烈刺激| 情侣偷拍对白清晰饥渴难耐| www日韩在线| 国产a级黄色片| 亚洲一区二区三区蜜桃| 国产精品suv一区二区88| 欧美h片在线观看| 91黄色免费视频| 国产午夜精品久久久久久久久| 美国美女黄色片| 久久久久亚洲av片无码v| 给我看免费高清在线观看| 日韩视频在线观看免费视频| 一区二区视频免费看| 日韩免费高清一区二区| 黄色片网站在线播放| 北京富婆泄欲对白| 欧美视频www| 少妇真人直播免费视频| 成年人性生活视频| 一级肉体全黄裸片| 欧美 日本 国产| 波多野结衣加勒比| a级片在线观看免费| 中文字幕第24页| 成人性生活免费看| 性活交片大全免费看| 国产美女福利视频| 啪啪一区二区三区| 亚洲第一香蕉网| 给我看免费高清在线观看| 精产国品一区二区三区| 国产在线综合视频| 精品成人无码一区二区三区| 黄色激情在线观看| 性生交大片免费看l| 东方av正在进入| 国产盗摄一区二区三区在线| 91 在线视频| 一区二区三区四区五区| 免费成人美女女在线观看| 无码人中文字幕| 一本在线免费视频| 国产一区二区三区视频播放| 一级片视频免费看| 中文字幕免费在线看线人动作大片| 中文字幕丰满孑伦无码专区| 在线观看av中文字幕| 国产精品边吃奶边做爽| ass精品国模裸体欣赏pics| 国产老熟女伦老熟妇露脸| 亚洲一区和二区| 五十路六十路七十路熟婆 | 右手影院亚洲欧美| av2014天堂网| 日本少妇高潮喷水xxxxxxx| 黄色正能量网站| 日本xxxxxxxxx18| 国产又色又爽又高潮免费| 久久精品视频免费在线观看| 五月天丁香社区| 丰满的亚洲女人毛茸茸| 人妻久久一区二区| 大地资源二中文在线影视观看 | 国产精成人品免费观看| 国产3级在线观看| 日本女人性视频| 波多野结衣办公室33分钟| 欧美a在线播放| 亚洲av成人无码一二三在线观看| 国产精品久久久免费观看| 国产在线综合视频| 日韩无码精品一区二区| 国产中文字幕久久| 久久人人爽人人爽人人片| 亚洲欧美精品aaaaaa片| 日韩人妻一区二区三区| 日韩福利小视频| 老头老太做爰xxx视频| 丰满熟女人妻一区二区三区| 精品欧美一区二区久久久| 国产无套精品一区二区三区| 亚洲av无码一区二区三区人 | 中文字幕人妻一区二区| 亚洲色图综合区| 久久久久久国产免费a片| 亚洲乱妇老熟女爽到高潮的片| 亚洲欧美视频在线播放| 亚洲 自拍 另类 欧美 丝袜| 四虎国产成人精品免费一女五男| 日本黄色动态图| 日批视频免费看| 男男受被啪到高潮自述| 国产传媒视频在线| 国精产品一区二区三区| 香蕉网在线播放| 捆绑凌虐一区二区三区| 手机免费看av片| 精品国产乱码久久久久久鸭王1| 色欲av无码一区二区三区| 网站免费在线观看| 亚洲图片综合网| 国产真实乱人偷精品| 中文字幕乱码一区| 亚洲色图14p| 国产全是老熟女太爽了| av电影在线不卡| 欧美一区二区三区粗大| 成年人看的免费视频| 顶级黑人搡bbw搡bbbb搡| 91免费公开视频| 午夜av入18在线| 一级全黄裸体片| 无码国产69精品久久久久网站 | 色在线观看视频| 中文字幕在线有码| 久久久久亚洲av片无码v| 婷婷五月精品中文字幕| 亚洲男人在线天堂| 欧美另类z0zx974| 波多野结衣家庭教师| 台湾佬美性中文| 三级男人添奶爽爽爽视频 | 欧美性猛交乱大交| 色欲欲www成人网站| 国产美女久久久久久| 69xx绿帽三人行| 亚洲色成人网站www永久四虎| 免费看污片的网站| 国产探花在线播放| 中文字幕5566| 在线观看亚洲网站| 白丝女仆被免费网站| 国产精品精品软件男同| 李丽珍裸体午夜理伦片| 亚洲一级片在线播放| 少妇伦子伦精品无吗| 日韩人妻无码精品综合区| 久久免费看少妇高潮v片特黄| 黄色网址在线视频| 在线免费观看亚洲视频| 精品无码国产污污污免费网站| 欧美三级在线免费观看| 日韩一级av毛片| 波多野结衣办公室双飞 | 免费国产羞羞网站美图| 老鸭窝一区二区| 亚洲视频天天射| 免费看特级毛片| 无码 人妻 在线 视频| 美女流白浆视频| 国产91丝袜美女在线播放| 亚洲久久久久久| 亚洲自拍偷拍精品| 99精品久久久久| 91精品国产高清一区二区三蜜臀| 在线免费观看视频| 色屁屁草草影院ccyy.com| a毛片毛片av永久免费| 中国极品少妇videossexhd| 午夜精品福利在线视频| 国产在线免费看| 国产又粗又猛又爽又黄的视频小说| 国产人妻大战黑人20p| 无码熟妇人妻av| 丰满少妇高潮一区二区| 北岛玲一区二区| 一级片手机在线观看| aaaaaav| 玖玖爱在线观看| 成年人免费观看视频网站| 中文字幕 日本| 人人人妻人人澡人人爽欧美一区| 国产福利在线观看视频| 中文字幕第4页| 又色又爽的视频|