美女扒开腿免费视频_蜜桃传媒一区二区亚洲av_先锋影音av在线_少妇一级淫片免费放播放_日本泡妞xxxx免费视频软件_一色道久久88加勒比一_熟女少妇一区二区三区_老司机免费视频_潘金莲一级黄色片_精品国产精品国产精品_黑人巨大猛交丰满少妇

COMP3217代做、Python/Java編程設(shè)計(jì)代寫

時間:2024-02-28  來源:  作者: 我要糾錯



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標(biāo)簽:

掃一掃在手機(jī)打開當(dāng)前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關(guān)信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風(fēng)景名勝區(qū)
    昆明西山國家級風(fēng)景名勝區(qū)
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗(yàn)證碼平臺 理財(cái) WPS下載

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    美女扒开腿免费视频_蜜桃传媒一区二区亚洲av_先锋影音av在线_少妇一级淫片免费放播放_日本泡妞xxxx免费视频软件_一色道久久88加勒比一_熟女少妇一区二区三区_老司机免费视频_潘金莲一级黄色片_精品国产精品国产精品_黑人巨大猛交丰满少妇
    天堂www中文在线资源| 9.1成人看片免费版| 日本免费福利视频| 五月激情四射婷婷| japan高清日本乱xxxxx| 国产黄色大片免费看| 911亚洲精选| 成人观看免费视频| 国产一区二区视频在线观看免费| 国产一线在线观看| 香蕉网在线视频| 公侵犯人妻一区二区三区| 亚洲欧美小视频| 国产在线免费av| 性高潮久久久久久久| 三上悠亚影音先锋| 成年女人免费视频| 一区二区国产精品精华液| 妖精视频在线观看免费| 成年人网站免费看| 在线成人精品视频| www.啪啪.com| 黄页网站在线看| 性囗交免费视频观看| 人妻精油按摩bd高清中文字幕| 在线精品一区二区三区| 国产黄色大片免费看| 99久久人妻无码精品系列| 日韩欧美黄色网址| 一区二区三区伦理片| 长河落日免费高清观看| 国产xxxxxxxxx| 精品国产精品国产精品| 久久久久久久久久久久久久久| www.狠狠爱| jizz日本免费| 日本丰满少妇裸体自慰| aaaa黄色片| 熟女人妻在线视频| av无码一区二区三区| 插我舔内射18免费视频| 99久久人妻无码中文字幕系列| 成人影视免费观看| 中文字幕网站在线观看| 污污内射在线观看一区二区少妇 | 国产精品300页| 国产免费嫩草影院| 少妇大叫太粗太大爽一区二区| 91精品人妻一区二区三区蜜桃2| 在线日韩国产网站| www.com.av| 中出视频在线观看| 午夜一区二区三区免费| 永久免费毛片在线观看| 免费在线黄色网| 全程偷拍露脸中年夫妇| 日本丰满少妇裸体自慰| 国产极品美女在线| 波多野结衣影院| 欧美熟妇精品一区二区| 欧美 日韩 国产 成人 在线观看 | 国产又黄又爽又无遮挡| 中文字幕av网址| 99精品中文字幕| 久久久久无码国产精品一区李宗瑞| 99免费观看视频| 欧美日韩高清丝袜| 国产高潮流白浆| 人妻无码一区二区三区| 蜜臀aⅴ国产精品久久久国产老师| 欧美激情 一区| 欧美色视频一区二区三区在线观看| 精品人妻一区二区三区日产| 国产日韩视频一区| 国产精品久久久久久亚洲色| 999精品免费视频| 一级免费黄色录像| 日韩精品无码一区二区三区久久久| 又色又爽的视频| 久久久久亚洲av成人无码电影| 国产免费a级片| 国产午夜精品理论片在线| 成人乱码一区二区三区av| 美女av免费看| 黄色片网站在线播放| 日韩在线不卡av| 欧美精品久久久久久久久46p| 91免费在线看片| 少妇精品无码一区二区| 免费在线观看一级片| 美女被爆操网站| 真人bbbbbbbbb毛片| 538精品在线视频| 波多野结衣 在线| 五级黄高潮片90分钟视频| 精品人伦一区二区| 18岁成人毛片| 99久久人妻无码精品系列| 爱情岛论坛亚洲自拍| 成人做爰69片免费| 久久久久亚洲av无码a片| 少妇高潮在线观看| 亚洲综合第一区| 亚洲黄色小说视频| 日本精品人妻无码77777| 国产毛片久久久久久久| 中国一级特黄录像播放| 波多野结衣电影免费观看| 人与动物性xxxx| 国产精品成人99一区无码 | 日本黄色免费片| 日本黄色动态图| 色偷偷www8888| 欧洲成人午夜精品无码区久久| 国产伦理在线观看| 国产人成视频在线观看| 日韩网站在线播放| 国产三级短视频| 在线免费观看a级片| 实拍女处破www免费看| 日韩综合第一页| 精人妻一区二区三区| 极品白嫩的小少妇| 黑人と日本人の交わりビデオ| 青青草华人在线视频| 国产精品入口麻豆| 成人精品一二三区| 女人被狂躁c到高潮| 色哟哟在线观看视频| 国产成人精品一区二区三区在线观看| 女同性恋一区二区三区| 亚洲欧美激情一区二区三区| 亚洲av鲁丝一区二区三区| 一区二区精品免费| 午夜国产福利一区二区| 国产一区第一页| www.欧美com| japanese中文字幕| av在线免费观看不卡| 亚洲一区二区三区日韩| 老熟妇高潮一区二区三区| 日韩毛片无码永久免费看| 稀缺小u女呦精品呦| 国产一区二区三区四区五区六区| 熟妇无码乱子成人精品| xxxxx99| 超碰男人的天堂| 四虎地址8848| 手机看片日韩av| 日本黄色动态图| asian性开放少妇pics| 亚洲色图 激情小说| 国产人妖在线观看| 长河落日免费高清观看| 亚洲欧美日本一区| 人人澡人人澡人人看| 精品人妻伦九区久久aaa片| 夜夜春很很躁夜夜躁| 成人免费毛片日本片视频| 日本视频在线免费| 男人的天堂官网| 免费毛片视频网站| 中文字幕av网址| 亚洲人成人无码网www国产 | 在线免费看黄色片| 男人操女人下面视频| 中文字幕影音先锋| frxxee中国xxx麻豆hd| 亚洲一二三精品| 天海翼在线视频| 精品国产一二区| 女人黄色一级片| 成人做爰69片免网站| 国产精品福利导航| 日本一二三不卡视频| 老司机深夜福利网站| 95视频在线观看| av av在线| 国精产品一区二区三区| 风韵丰满熟妇啪啪区老熟熟女| 在线免费观看麻豆| 国产交换配乱淫视频免费| 新91视频在线观看| 亚洲av永久无码精品| 美国黄色特级片| 亚洲色图第四色| 人妻少妇一区二区| 亚洲国产无码精品| 东京热无码av男人的天堂| 天天躁日日躁狠狠躁av| 丰满圆润老女人hd| 北条麻妃在线观看视频| 91av手机在线| 五月天免费网站| 影音先锋男人看片资源| 国产免费美女视频| av免费观看不卡| 免费黄色av网址| 高清中文字幕mv的电影| 特大黑人巨人吊xxxx|