日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

COMP3217代做、Python/Java編程設計代寫

時間:2024-02-28  來源:  作者: 我要糾錯



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區
    昆明西山國家級風景名勝區
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

              9000px;">

                        麻豆国产一区二区| 一区二区三区中文字幕| 欧美亚洲日本一区| 国产91在线|亚洲| 麻豆国产精品777777在线| 久久国产尿小便嘘嘘| 伊人婷婷欧美激情| 《视频一区视频二区| 日本一区二区三区视频视频| 精品国产污污免费网站入口| 3d动漫精品啪啪| 欧美一区二区三区视频在线| 日韩色在线观看| 91麻豆精品国产91久久久久久久久| 欧美亚日韩国产aⅴ精品中极品| 91视频.com| 在线精品视频免费播放| 欧美影院一区二区| 欧美三级电影在线看| 欧美片网站yy| 欧美不卡在线视频| 久久精品人人做人人爽97| 久久精品亚洲精品国产欧美 | a亚洲天堂av| 91啪九色porn原创视频在线观看| 91香蕉视频在线| 欧洲日韩一区二区三区| 欧美日韩国产片| 日韩欧美综合在线| 久久久99精品久久| 国产精品久久久久婷婷二区次| 国产精品国产三级国产普通话蜜臀 | 亚洲国产电影在线观看| 国产精品久久久久久久裸模| 亚洲一区二区在线观看视频| 日av在线不卡| 成人午夜精品在线| 色老汉av一区二区三区| 欧美日韩高清一区二区| 精品福利一二区| 最新日韩在线视频| 婷婷六月综合亚洲| 国产一二三精品| 欧美日韩亚洲综合在线 | 暴力调教一区二区三区| 欧美精品xxxxbbbb| 国产欧美精品一区二区色综合朱莉| 亚洲久本草在线中文字幕| 美日韩一区二区| av毛片久久久久**hd| 欧美三级中文字幕| 欧美极品xxx| 欧美aⅴ一区二区三区视频| 懂色一区二区三区免费观看| 7777女厕盗摄久久久| 中文乱码免费一区二区| 日韩国产一区二| 91久久一区二区| 欧美国产乱子伦| 久久99精品国产.久久久久久| 日本乱人伦aⅴ精品| 一区二区久久久| 黑人巨大精品欧美黑白配亚洲| 在线视频中文字幕一区二区| 国产亚洲一区二区三区四区| 视频一区二区三区中文字幕| 色香色香欲天天天影视综合网| 久久久综合视频| 久久精品久久99精品久久| 欧美色区777第一页| 亚洲色图清纯唯美| 成人美女视频在线看| 日韩女同互慰一区二区| 亚洲成va人在线观看| 91久久国产综合久久| 亚洲欧洲精品一区二区精品久久久| 精品在线观看视频| 91精品国产欧美一区二区成人| 亚洲国产欧美在线| 欧美日韩二区三区| 五月综合激情网| 欧美人牲a欧美精品| 亚洲福利国产精品| 在线不卡中文字幕| 日产欧产美韩系列久久99| 欧美日韩免费观看一区三区| 亚洲国产成人va在线观看天堂| 在线免费观看不卡av| 亚洲在线中文字幕| 欧美午夜电影在线播放| 亚洲乱码国产乱码精品精的特点| 亚洲成人免费av| 成人激情免费网站| 中文字幕不卡三区| 91麻豆自制传媒国产之光| 国产精品国产成人国产三级 | 成人爽a毛片一区二区免费| 国产欧美精品日韩区二区麻豆天美| 国产成人午夜精品5599| 国产日韩欧美高清| 91黄色激情网站| 日韩成人精品视频| 久久综合久久综合久久综合| 国产麻豆精品在线| 国产精品私人影院| 欧美亚洲丝袜传媒另类| 免费高清在线一区| 国产精品理伦片| 欧美在线视频全部完| 美女网站视频久久| 国产精品福利在线播放| 欧美久久久久久久久中文字幕| 石原莉奈在线亚洲二区| 国产欧美久久久精品影院| 欧美性生活大片视频| 激情欧美一区二区三区在线观看| 久久精品免视看| 91国产福利在线| 精品在线一区二区| 一二三区精品视频| www精品美女久久久tv| 色一情一乱一乱一91av| 狠狠色丁香久久婷婷综合丁香| 亚洲欧美一区二区三区国产精品| 日韩三级中文字幕| 日本乱人伦aⅴ精品| 国产美女精品人人做人人爽 | 精品乱人伦小说| 色婷婷综合中文久久一本| 国产伦精品一区二区三区免费| 艳妇臀荡乳欲伦亚洲一区| 久久久久久99久久久精品网站| 日本二三区不卡| 国产老肥熟一区二区三区| 天天综合色天天综合色h| 中文在线资源观看网站视频免费不卡| 56国语精品自产拍在线观看| 91在线你懂得| 顶级嫩模精品视频在线看| 美女视频黄频大全不卡视频在线播放| 亚洲免费在线视频一区 二区| 欧美高清在线精品一区| 日韩精品一区二区三区在线播放 | 国产精品福利一区二区三区| 久久综合九色欧美综合狠狠| 欧美酷刑日本凌虐凌虐| 在线观看免费成人| 成人app在线| 成人av网站免费| 丁香桃色午夜亚洲一区二区三区| 精品一二三四在线| 麻豆精品在线观看| 精品无人区卡一卡二卡三乱码免费卡 | 欧美日韩成人综合在线一区二区| 99久久精品国产麻豆演员表| 成人a级免费电影| 粉嫩一区二区三区性色av| 国产精品一区在线观看你懂的| 免费观看30秒视频久久| 日韩专区在线视频| 蜜臂av日日欢夜夜爽一区| 美女久久久精品| 麻豆91在线观看| 久久99精品久久久久久国产越南 | 久久精品视频免费| 欧美激情中文字幕| 国产精品久久久久久久久久久免费看 | 91黄色激情网站| 91黄视频在线观看| 欧美日韩另类国产亚洲欧美一级| 欧美日韩国产一二三| 日韩一级免费观看| 欧美精品一区二区三区蜜桃| 久久青草欧美一区二区三区| 久久久不卡网国产精品二区| 一区二区三区四区激情| 亚洲午夜影视影院在线观看| 亚洲444eee在线观看| 天天影视网天天综合色在线播放| 蜜臀久久99精品久久久画质超高清| 美美哒免费高清在线观看视频一区二区 | 亚洲最大成人网4388xx| 亚洲成人一区在线| 精品在线观看免费| 波多野结衣一区二区三区| 在线观看日韩一区| 精品国产一区二区国模嫣然| 中文字幕欧美区| 婷婷激情综合网| 国产成人丝袜美腿| 欧美亚洲国产bt| 欧美电视剧在线看免费| 国产精品毛片久久久久久久| 亚洲电影一区二区| 国产老肥熟一区二区三区| 日本精品视频一区二区三区| 日韩三级av在线播放| 成人免费在线视频| 久久99国产精品成人| 99久久99久久免费精品蜜臀|