日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

COMP3217代做、Python/Java編程設計代寫

時間:2024-02-28  來源:  作者: 我要糾錯



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區
    昆明西山國家級風景名勝區
    昆明旅游索道攻略
    昆明旅游索道攻略
  • NBA直播 短信驗證碼平臺 幣安官網下載 歐冠直播 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

              9000px;">

                        在线免费av一区| 久久久久国产一区二区三区四区| 国产精品一卡二卡在线观看| 国产一区欧美二区| 91社区在线播放| 日韩一区二区三免费高清| 国产拍欧美日韩视频二区| 国产精品美女久久久久aⅴ国产馆| 中文字幕一区在线观看| 亚洲成人免费在线观看| 国产69精品久久99不卡| 欧美视频在线一区二区三区 | 日韩电影在线看| 高清免费成人av| 久久久噜噜噜久噜久久综合| 欧洲视频一区二区| 久久久精品蜜桃| 美女视频免费一区| 亚洲精品一区二区三区影院| 国产精品久久久久久户外露出 | 免费成人性网站| 国产91精品一区二区麻豆亚洲| 色综合中文字幕国产 | 亚洲h在线观看| 粉嫩13p一区二区三区| 欧美一区二区私人影院日本| 亚洲人亚洲人成电影网站色| 激情综合色丁香一区二区| 99久久伊人网影院| 国产伦精品一区二区三区免费迷| 日本一区二区三区dvd视频在线| 色综合婷婷久久| 91搞黄在线观看| 亚洲国产精品精华液ab| 久久国产尿小便嘘嘘| 欧美日本在线看| 亚洲午夜久久久久久久久电影网 | 久久久一区二区三区| 综合网在线视频| 欧美日韩www| 久久99蜜桃精品| 国产精品久久国产精麻豆99网站| 久久久久久久网| 午夜av一区二区| 91麻豆国产在线观看| 国产欧美日韩亚州综合| 精品一区二区三区久久久| 在线播放中文字幕一区| 夜夜嗨av一区二区三区四季av | 久久久国产一区二区三区四区小说| 亚洲.国产.中文慕字在线| 欧美一区二区视频网站| 日本不卡的三区四区五区| 91精品国产欧美一区二区18| 成人av电影免费观看| 精品在线你懂的| www.66久久| 亚洲三级视频在线观看| 国产原创一区二区| 国产精品美女久久久久aⅴ| 91 com成人网| 欧美羞羞免费网站| 99视频一区二区三区| 国产99久久久久| 欧美电影免费观看高清完整版在| 国产亚洲福利社区一区| 日韩中文字幕91| 日韩欧美国产一区在线观看| 久久午夜老司机| 亚洲欧美视频一区| 国产一区二区三区四| 日日欢夜夜爽一区| 午夜久久久久久| 夜夜嗨av一区二区三区中文字幕 | 国产乱码精品一区二区三区忘忧草 | 精品三级av在线| 日韩av网站在线观看| 精品区一区二区| 91偷拍与自偷拍精品| 5566中文字幕一区二区电影| 日本中文在线一区| 国产精品妹子av| 国产精品一区二区视频| 黄色日韩三级电影| 琪琪久久久久日韩精品| 久久精品免费观看| 国产综合久久久久久鬼色| 亚洲va韩国va欧美va精品 | 99精品久久99久久久久| 国内成+人亚洲+欧美+综合在线| 蜜臀av性久久久久蜜臀aⅴ四虎| 日韩主播视频在线| 国产成人丝袜美腿| 欧美一区二区在线看| 精品国免费一区二区三区| 亚洲v中文字幕| 中文字幕第一区综合| 一区二区三区中文在线观看| 制服丝袜激情欧洲亚洲| 欧美精品在线观看一区二区| 欧美丰满嫩嫩电影| 一级做a爱片久久| 精品国一区二区三区| 久久aⅴ国产欧美74aaa| 国产精品三级电影| 在线播放欧美女士性生活| 成人少妇影院yyyy| 日韩av电影一区| 国产精品国产三级国产aⅴ无密码| 6080国产精品一区二区| 91视频在线观看免费| 国产精一区二区三区| 三级一区在线视频先锋| 亚洲免费av网站| 中文av一区特黄| 久久一区二区三区国产精品| 欧美精品v日韩精品v韩国精品v| 99在线精品一区二区三区| 国产又粗又猛又爽又黄91精品| 亚洲一二三专区| 亚洲男人天堂av网| 国产精品毛片高清在线完整版| 91精品在线一区二区| 91美女片黄在线观看| 国产精品亚洲一区二区三区在线| 理论电影国产精品| 色伊人久久综合中文字幕| proumb性欧美在线观看| 欧美日韩视频在线一区二区| 波多野结衣一区二区三区| 国产盗摄一区二区| 国产一区欧美二区| 国产乱码精品一区二区三| 国产一区三区三区| 国产精品1区2区3区在线观看| 久久99精品久久只有精品| 日产欧产美韩系列久久99| 视频一区在线播放| 全国精品久久少妇| 麻豆精品一二三| 极品少妇xxxx偷拍精品少妇| 久久99精品视频| 国产一区二区网址| 成人av电影在线观看| 色综合天天在线| 欧美中文字幕一区| 欧美日韩国产a| 欧美一区二区三区免费视频 | 舔着乳尖日韩一区| 婷婷丁香久久五月婷婷| 亚洲成人三级小说| 日本在线不卡视频| 九九九精品视频| 国产精品亚洲а∨天堂免在线| 成人精品视频一区| 欧美主播一区二区三区美女| 欧美电影免费观看高清完整版在 | 色婷婷久久久综合中文字幕| 69成人精品免费视频| 国产无人区一区二区三区| 亚洲你懂的在线视频| 美脚の诱脚舐め脚责91| a美女胸又www黄视频久久| 91精品国产免费| 国产精品久久久一本精品| 日本视频一区二区| 91麻豆精品视频| 久久看人人爽人人| 亚洲成人动漫在线免费观看| 国产精品伊人色| 制服丝袜亚洲精品中文字幕| 国产精品动漫网站| 精品亚洲国内自在自线福利| 91国内精品野花午夜精品| 欧美精品一区二区不卡| 亚洲第一综合色| 不卡区在线中文字幕| 欧美成人精品高清在线播放| 亚洲自拍偷拍欧美| 国产精品乡下勾搭老头1| 在线观看亚洲一区| 久久九九国产精品| 午夜成人免费视频| 91在线一区二区三区| 日韩欧美区一区二| 亚洲福利视频导航| 国产xxx精品视频大全| 在线观看欧美日本| 久久久99免费| 日韩中文字幕区一区有砖一区 | ...中文天堂在线一区| 日韩在线观看一区二区| 一区二区视频在线| 99综合电影在线视频| a亚洲天堂av| 国产精品三级视频| 一区二区视频在线看| 国产美女娇喘av呻吟久久| 91精品午夜视频| 欧美成人性战久久|