亚洲十八**毛片_亚洲综合影院_五月天精品一区二区三区_久久久噜噜噜久久中文字幕色伊伊 _欧美岛国在线观看_久久国产精品毛片_欧美va在线观看_成人黄网大全在线观看_日韩精品一区二区三区中文_亚洲一二三四区不卡

COMP3217代做、Python/Java編程設(shè)計代寫

時間:2024-02-28  來源:  作者: 我要糾錯



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關(guān)信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風(fēng)景名勝區(qū)
    昆明西山國家級風(fēng)景名勝區(qū)
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    91麻豆精品激情在线观看最新 | 国产调教一区二区三区| 久草综合在线| 亚洲天堂av资源在线观看| 韩国精品福利一区二区三区| japanese色系久久精品| 精品久久电影| 亚洲夜间福利| 久久99精品久久久| av亚洲精华国产精华精华 | 久久久99精品免费观看| 最好看的中文字幕久久| 天天影视色香欲综合网老头| 欧美无乱码久久久免费午夜一区| 欧美电影精品一区二区| 99re6热在线精品视频播放| 国产资源在线播放| 999av小视频在线| 成人欧美magnet| 天天综合91| 中文字幕伦av一区二区邻居| 国一区二区在线观看| 日韩成人一区二区| 久久综合久久99| 天天操天天色综合| 精品国产乱码久久久久久浪潮| 午夜亚洲成人| 国产自产自拍视频在线观看| 亚洲一区二区电影| 欧美成人日韩| 国产成人免费xxxxxxxx| 亚洲成人综合网站| 99视频入口| 另类视频在线| 国产suv精品一区| 亚洲午夜av| 不卡欧美aaaaa| 欧美视频在线观看免费网址| 九色porny蝌蚪视频在线观看| 国产高清视频在线观看| 中文字幕成人| 亚洲成人中文| 91蜜桃视频在线| 欧洲国产伦久久久久久久| www污污在线| 一区二区精品伦理...| 日韩影视高清在线观看| 日韩电影免费在线观看网站| 国产精品电影院| 日韩精品在线一区| 91蜜桃在线视频| 成人av影音| 日韩精品成人一区二区三区| 亚洲丝袜美腿综合| 好紧好硬好湿我太爽了| 国产社区精品视频| 欧美r级电影| 久久久久久一二三区| 日韩视频一区在线观看| 四虎av在线| 99久久精品网站| 久久久久久一二三区| 精品三级在线看| 天堂中文av在线资源库| 婷婷激情综合| 欧美国产欧美亚州国产日韩mv天天看完整| 欧美一区二区三区在线看| 色操视频在线| 在线精品小视频| 亚洲欧美一区二区久久| 日本高清视频网站www| 影音成人av| 美女精品在线| 欧美日韩亚洲视频一区| 欧美午夜电影一区二区三区| 国产免费久久| 国产欧美日韩视频在线观看| 秋霞福利视频| 中文字幕久久精品一区二区| 国产精品99久久久久久久女警| 欧美日韩在线直播| 成人黄色动漫| 亚洲免费影视| 欧美日韩综合在线| 午夜久久中文| 天堂av在线一区| 欧美日韩精品综合在线| 五月天av在线| 卡一卡二国产精品| 日韩三级av在线播放| 视频精品导航| 国产91丝袜在线观看| 激情丁香在线| 免费久久精品| 亚洲少妇30p| 国产精品剧情| 久久成人一区| 精品国产一区二区三区忘忧草 | 伊人久久在线| 国产一区二区在线看| 精品国一区二区三区| 日韩欧美中文在线观看| 不卡的av在线播放| 一级片在线观看| 91精品秘密在线观看| 色综合天天综合色综合av| 午夜影院一区| 国产福利91精品一区二区三区| 理论片鲁丝二区爱情网| 精品一区二区三区中文字幕老牛| 亚洲激情综合网| 国产精品探花在线| 国内精品国产三级国产a久久| www.99色| 日韩精品影视| 色老综合老女人久久久| 日韩成人精品一区二区三区| av一区二区三区四区| 午夜精品一区| 久久国产精品第一页| 波多野结衣av在线播放| 综合久久综合| 日韩一区二区视频在线观看| 国产伦精品一区二区三区免费优势| 国产精品对白交换视频| 免费看男女www网站入口在线| 国产精品一区二区视频| 水莓100在线视频| 鲁大师影院一区二区三区| 美女视频免费观看网站在线| 亚洲国产不卡| 精品久久久久久综合日本欧美| 婷婷激情久久| 精品视频全国免费看| 日韩三级视频| 51精品国自产在线| 精品美女久久久| 日韩欧美一区中文| 99久久综合| 窝窝九色成人影院| 亚洲视屏一区| 500福利第一精品导航| 国产精品久久久亚洲一区| 美女av网站| 性欧美长视频| 飘雪影视在线观看免费观看| 香蕉视频成人在线观看| 青青草手机在线| 国产美女av一区二区三区| 在线视频1区2区| 91年精品国产| 高清亚洲高清| 欧美日韩激情小视频| 一本色道久久综合亚洲精品酒店 | 一区二区三区日韩精品视频| 国精品产品一区| 激情成人在线视频| 亚洲三级精品| 狠狠操天天操夜夜操| 久久激情久久| 黄色在线观看网站| 国产精品你懂的| 亚洲亚洲一区二区三区| 欧美一区二区三区视频免费播放| 亚洲国产日韩欧美在线| 黄动漫视频高清在线| 国产白丝精品91爽爽久久 | 91精品国产日韩91久久久久久| 性xxxx欧美老肥妇牲乱| 尤物网站在线| 91在线高清观看| 91精品亚洲一区在线观看| 欧美性猛交一区二区三区精品| 日韩片欧美片| 夜色资源站国产www在线视频| 国产成人欧美日韩在线电影| 这里有精品可以观看| 91国偷自产一区二区使用方法| 一个色综合网| 日本三级在线视频| 亚洲欧美视频在线观看| 国内精品久久久久久久久电影网| 精精国产xxxx视频在线动漫| 国产久卡久卡久卡久卡视频精品| 欧美日韩免费看片| 欧美浪妇xxxx高跟鞋交| 日韩精品91亚洲二区在线观看| 忘忧草在线影院两性视频| 欧美日韩综合在线免费观看| 日韩激情视频网站| 国产精品久久久久av电视剧| 717成人午夜免费福利电影| 日韩av在线发布| 巨胸喷奶水www久久久免费动漫| 欧美日韩和欧美的一区二区| 快she精品国产999| 成人在线黄色| 福利av痴女| 国产日韩视频一区二区三区| 亚洲肉体裸体xxxx137|