日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

COMP3217代做、Python/Java編程設計代寫

時間:2024-02-28  來源:  作者: 我要糾錯



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區
    昆明西山國家級風景名勝區
    昆明旅游索道攻略
    昆明旅游索道攻略
  • NBA直播 短信驗證碼平臺 幣安官網下載 歐冠直播 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

              亚洲最新在线| 国内精品视频666| 久久久国产一区二区| 精品动漫3d一区二区三区免费版 | 国产精品看片资源| 久久这里只有精品视频首页| 日韩一级在线| 一区免费观看视频| 欧美视频在线一区| 欧美激情一区二区三区成人| 亚洲免费视频在线观看| 亚洲免费观看高清完整版在线观看熊| 国产日韩欧美日韩大片| 欧美天堂在线观看| 欧美成人四级电影| 久久久久久欧美| 久久精品首页| 欧美资源在线观看| 亚洲免费一在线| 一区二区电影免费在线观看| 亚洲第一中文字幕在线观看| 国产欧美日韩在线观看| 国产精品国产三级国产专区53| 欧美高清视频| 裸体一区二区三区| 久久综合999| 麻豆精品一区二区综合av| 欧美有码视频| 久久精品99国产精品| 欧美亚洲日本网站| 午夜国产精品视频| 午夜精品视频在线观看| 午夜久久黄色| 午夜精品久久久久久久男人的天堂 | 久久精品女人的天堂av| 欧美一区二区三区视频在线观看| 亚洲综合日韩中文字幕v在线| 亚洲色图自拍| 亚洲欧美日韩第一区| 亚洲一区在线直播| 篠田优中文在线播放第一区| 欧美伊人久久久久久久久影院 | 欧美日韩国产限制| 欧美午夜理伦三级在线观看| 国产精品夫妻自拍| 欧美视频一区二区在线观看 | 一区二区自拍| 亚洲高清激情| 夜夜嗨av一区二区三区网页| 亚洲视频免费在线观看| 欧美一级艳片视频免费观看| 久久国产精品久久精品国产 | 精品动漫一区| 最新中文字幕一区二区三区| 一区二区三区日韩欧美精品| 亚洲欧美制服另类日韩| 久久婷婷国产综合精品青草| 欧美精品三级| 国产美女精品免费电影| 亚洲国产精品一区制服丝袜| 亚洲先锋成人| 欧美成人高清视频| 欧美色区777第一页| 国产一区视频在线看| 99av国产精品欲麻豆| 欧美在线观看网址综合| 欧美高清在线播放| 国产亚洲a∨片在线观看| 亚洲精品一二三| 久久久久九九九九| 欧美午夜国产| 亚洲激情网站| 久久日韩粉嫩一区二区三区| 欧美日韩在线播放三区四区| 在线精品国产欧美| 亚洲欧美另类综合偷拍| 欧美精品一区二区三| 激情久久久久| 午夜精品一区二区三区在线视| 欧美精品久久99| 一区在线视频观看| 欧美亚洲自偷自偷| 欧美涩涩视频| 亚洲精选中文字幕| 欧美顶级少妇做爰| 极品尤物av久久免费看| 性欧美超级视频| 国产精品盗摄久久久| 亚洲日本中文字幕| 欧美二区在线| 亚洲激情专区| 欧美激情黄色片| 在线不卡a资源高清| 欧美在线黄色| 国产一区欧美日韩| 久久av免费一区| 国产主播一区二区三区| 欧美一区二区视频网站| 国产老肥熟一区二区三区| 亚洲一区美女视频在线观看免费| 欧美理论视频| 野花国产精品入口| 国产精品白丝jk黑袜喷水| 这里只有精品丝袜| 国产精品久久久久9999高清| 一本一本久久a久久精品综合妖精| 欧美精品久久久久a| 亚洲欧洲日韩女同| 欧美国产欧美亚洲国产日韩mv天天看完整 | 亚洲欧美日产图| 国产欧美日韩一区二区三区| 欧美在线电影| 在线日韩中文字幕| 欧美日韩国产色视频| 亚洲午夜视频| 国产视频丨精品|在线观看| 久久久蜜臀国产一区二区| 亚洲大片免费看| 欧美精品一区在线| 亚洲欧美三级伦理| 国产一区二区三区在线观看视频 | 国产精品女主播| 久久免费视频网站| 日韩一级裸体免费视频| 国产精品一区二区久久久久| 午夜在线观看免费一区| 亚洲国产日韩美| 国产精品日韩欧美一区二区| 久久人人超碰| 亚洲一区国产视频| 伊人狠狠色j香婷婷综合| 欧美日韩在线视频首页| 欧美一区二区| 99re6这里只有精品视频在线观看| 国产精品欧美日韩一区| 欧美a级片网| 午夜欧美大片免费观看| 亚洲精品欧美日韩专区| 国产嫩草一区二区三区在线观看| 久久亚洲国产精品日日av夜夜| 亚洲视频在线一区| 亚洲国产日韩欧美在线动漫| 国产女人水真多18毛片18精品视频| 欧美 亚欧 日韩视频在线| 久久成人羞羞网站| 国产精品99久久久久久www| 在线欧美电影| 国产一区二区精品在线观看| 欧美日韩中文字幕精品| 免费成人在线观看视频| 欧美伊人影院| 性18欧美另类| 亚洲性线免费观看视频成熟| 91久久久久久| 亚洲第一色在线| 国产亚洲日本欧美韩国| 国产精品系列在线| 国产精品成人一区二区| 欧美日韩美女一区二区| 欧美精品激情在线| 欧美精品一区二区三区在线看午夜| 久久亚洲一区二区| 久久不见久久见免费视频1| 亚洲免费在线精品一区| 一区二区欧美在线| 夜夜夜久久久| 中文国产一区| 在线视频中文亚洲| 这里只有精品电影| 在线亚洲一区二区| 亚洲社区在线观看| 亚洲欧美日韩国产一区二区三区| 亚洲作爱视频| 亚洲欧美精品在线| 亚洲一区三区电影在线观看| 亚洲尤物在线视频观看| 午夜久久美女| 久久精彩视频| 麻豆久久婷婷| 欧美精品久久一区二区| 欧美日韩免费高清一区色橹橹| 欧美日韩国产bt| 欧美视频在线观看 亚洲欧| 国产精品久久久久久久久久久久久| 欧美性淫爽ww久久久久无| 国产精品免费观看在线| 国产一区二区黄| 亚洲黄色在线| 亚洲欧美激情精品一区二区| 欧美一级二级三级蜜桃| 玖玖玖国产精品| 欧美日韩国产高清| 国产日韩成人精品| 亚洲国产福利在线| 日韩系列欧美系列| 午夜免费在线观看精品视频| 久久人91精品久久久久久不卡| 欧美精品成人一区二区在线观看 | 亚洲精品日韩在线| 亚洲性线免费观看视频成熟|