日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

COMP3217代做、Python/Java編程設計代寫

時間:2024-02-28  來源:  作者: 我要糾錯



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區
    昆明西山國家級風景名勝區
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

              9000px;">

                        成人免费高清在线观看| 久久久久国产一区二区三区四区| 成人av影院在线| 国产曰批免费观看久久久| 丝袜美腿亚洲色图| 一区二区欧美在线观看| 综合色中文字幕| 国产精品久久国产精麻豆99网站| 国产欧美一区二区三区鸳鸯浴 | 日韩欧美一区在线| 91精品国产综合久久精品| 欧美日韩久久久久久| 欧美女孩性生活视频| 欧美精品三级日韩久久| 欧美午夜一区二区三区| 欧美精品 日韩| 在线不卡一区二区| 在线成人高清不卡| 精品剧情在线观看| 国产亚洲精品资源在线26u| 久久久久99精品国产片| 中文字幕国产精品一区二区| 国产精品久久久久久久蜜臀| 中文字幕在线不卡一区| 一区二区欧美国产| 日韩国产高清在线| 九九视频精品免费| 国产成人高清在线| 色综合久久99| 欧美久久一二三四区| 日韩欧美亚洲国产另类| 国产丝袜美腿一区二区三区| 中文字幕一区二区三区在线不卡 | 久久综合久久综合亚洲| 国产人妖乱国产精品人妖| 中文字幕一区二区三| 亚洲一二三四在线| 日韩电影一二三区| 国产精品99久久久| 在线视频亚洲一区| 精品日韩99亚洲| 亚洲欧美一区二区三区极速播放 | 国产成人精品一区二| 日本二三区不卡| 欧美一区二区精美| 欧美高清一级片在线观看| 亚洲一级二级三级| 国产一区二区三区国产| 91老师片黄在线观看| 欧美久久免费观看| 国产日韩v精品一区二区| 一区二区三区中文在线| 毛片一区二区三区| 成人国产精品免费观看| 欧美日韩国产系列| 欧美国产亚洲另类动漫| 午夜精品一区二区三区电影天堂| 国内偷窥港台综合视频在线播放| 99r国产精品| xvideos.蜜桃一区二区| 亚洲美女视频在线观看| 国产一区二区免费在线| 在线国产电影不卡| 久久久久久免费毛片精品| 亚洲一二三区视频在线观看| 激情文学综合插| 欧亚洲嫩模精品一区三区| 久久婷婷国产综合精品青草| 亚洲国产一区在线观看| 国产精品1区2区| 欧美一区二区在线观看| 亚洲精品v日韩精品| 国产经典欧美精品| 日韩欧美自拍偷拍| 亚洲成人免费视| 成人高清视频在线| 久久久久亚洲蜜桃| 日本aⅴ精品一区二区三区| 91蜜桃网址入口| 国产色一区二区| 麻豆精品一区二区三区| 在线观看国产日韩| 亚洲欧美日韩一区二区| 国产高清视频一区| 精品剧情在线观看| 免费观看成人av| 欧美电影在哪看比较好| 一区二区久久久久久| 97精品视频在线观看自产线路二| 久久综合久久综合久久| 裸体歌舞表演一区二区| 欧美精品色一区二区三区| 亚洲激情在线播放| 91一区二区在线| 国产精品亲子伦对白| 国产精品亚洲午夜一区二区三区 | 日韩欧美123| 日韩av在线免费观看不卡| 欧美这里有精品| 一区二区三区在线播| 91在线小视频| 亚洲乱码国产乱码精品精98午夜| 成人一区二区在线观看| 亚洲国产高清在线| 成人免费视频免费观看| 国产精品美女久久福利网站| 国产a视频精品免费观看| 久久免费看少妇高潮| 国产精品中文欧美| 国产日韩欧美在线一区| 国产盗摄一区二区三区| 国产色产综合产在线视频| 成人精品亚洲人成在线| 蜜桃视频一区二区三区在线观看| 欧美亚洲国产一卡| 亚洲国产成人高清精品| 日韩一区二区在线观看视频| 蜜桃av一区二区| 久久久精品黄色| 成人深夜视频在线观看| 亚洲欧美色图小说| 欧美日韩成人综合在线一区二区| 男女男精品视频网| 久久伊99综合婷婷久久伊| 国产精品18久久久久久久久| 国产精品热久久久久夜色精品三区| kk眼镜猥琐国模调教系列一区二区| 中文字幕亚洲一区二区va在线| 日本高清无吗v一区| 日韩精品久久理论片| 欧美电影免费观看高清完整版在| 激情六月婷婷久久| 国产精品久久免费看| 欧美亚洲国产一区二区三区| 蜜臀久久99精品久久久久宅男| 国产网站一区二区| 91免费视频观看| 免费高清在线视频一区·| 久久久久久久一区| 91久久国产最好的精华液| 奇米影视一区二区三区小说| 久久久影院官网| 91成人免费网站| 国产资源精品在线观看| 一区免费观看视频| 欧美美女激情18p| 国产成人丝袜美腿| 亚洲综合丁香婷婷六月香| 欧美成人aa大片| 91福利在线看| 九色综合狠狠综合久久| 怡红院av一区二区三区| 欧美v日韩v国产v| 99精品欧美一区二区三区综合在线| 日本伊人精品一区二区三区观看方式| 精品日韩99亚洲| 在线日韩一区二区| 国产精品88888| 日日夜夜精品视频免费| 国产欧美综合在线观看第十页| 欧美日韩国产综合一区二区三区| 国产精品77777竹菊影视小说| 亚洲国产婷婷综合在线精品| 国产亚洲视频系列| 欧美日韩一区二区三区视频| 国产超碰在线一区| 蜜臀91精品一区二区三区| 亚洲免费观看高清完整版在线观看熊| 精品国产一区二区三区四区四 | 久久久精品国产99久久精品芒果| 91久久精品一区二区三| 国产一区二区三区四区在线观看 | 欧美色图片你懂的| 成人免费看片app下载| 免费高清在线视频一区·| 亚洲激情欧美激情| 国产精品网站导航| 久久综合色综合88| 日韩一区二区在线观看视频| 欧美日韩中文精品| 97精品久久久久中文字幕 | 欧美日韩国产色站一区二区三区| 不卡区在线中文字幕| 韩国中文字幕2020精品| 亚洲成a人片在线观看中文| 国产精品国产三级国产普通话三级 | 99re66热这里只有精品3直播| 国产在线麻豆精品观看| 丝袜美腿成人在线| 亚洲第一电影网| 亚洲尤物视频在线| 亚洲裸体在线观看| 中文字幕一区二区三| 国产精品美女久久久久高潮| 久久久亚洲精品一区二区三区| 日韩欧美国产综合在线一区二区三区| 欧美日韩免费高清一区色橹橹| 在线观看免费一区| 欧美无砖专区一中文字| 欧美影院午夜播放|