日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

COMP3217代做、Python/Java編程設計代寫

時間:2024-02-28  來源:  作者: 我要糾錯



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區
    昆明西山國家級風景名勝區
    昆明旅游索道攻略
    昆明旅游索道攻略
  • NBA直播 短信驗證碼平臺 幣安官網下載 歐冠直播 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    日本欧洲视频一区_国模极品一区二区三区_国产熟女一区二区三区五月婷_亚洲AV成人精品日韩一区18p

              好吊色欧美一区二区三区四区| 在线播放日韩欧美| 欧美v日韩v国产v| 欧美在线视频播放| 午夜宅男久久久| 久久成人一区二区| 久久九九国产精品| 久久综合网hezyo| 免费永久网站黄欧美| 欧美精品1区2区3区| 欧美先锋影音| 国产色产综合产在线视频| 欧美另类一区二区三区| 欧美日韩喷水| 国内精品嫩模av私拍在线观看 | 亚洲国产成人porn| 日韩亚洲欧美中文三级| 亚洲一区二区在| 久久国产精品99国产| 欧美成人一区二区在线 | 欧美一区二区三区的| 久久综合色婷婷| 国产精品美女久久久久久2018| 韩日精品在线| 亚洲女ⅴideoshd黑人| 欧美激情四色 | 欧美女同视频| 欧美日韩日本国产亚洲在线| 亚洲一区二区三区精品视频| 亚洲尤物视频在线| 欧美人与禽猛交乱配视频| 国产午夜精品福利| 亚洲一区亚洲二区| 欧美成黄导航| 亚洲国产精品123| 久久久夜夜夜| 国产综合色一区二区三区| 午夜精品在线看| 欧美性淫爽ww久久久久无| 亚洲青色在线| 欧美福利视频一区| 日韩一级欧洲| 欧美视频精品在线观看| 亚洲精品视频在线| 欧美日韩国产小视频在线观看| 亚洲高清在线视频| 欧美日韩二区三区| 亚洲欧美清纯在线制服| 国产精品视频一区二区三区 | 国产精品九九久久久久久久| 夜夜嗨一区二区| 国产精品自拍网站| 美女露胸一区二区三区| 亚洲精品影院| 国产亚洲午夜| 欧美日韩国产大片| 蜜桃久久av| 亚洲特黄一级片| 怡红院精品视频在线观看极品| 麻豆国产va免费精品高清在线| 亚洲激情中文1区| 国产精品人成在线观看免费| 久久综合久久综合久久| 亚洲一区二区三区午夜| 91久久线看在观草草青青| 国产精品一区二区三区四区五区 | 欧美另类亚洲| 久久九九国产精品怡红院| 亚洲第一精品久久忘忧草社区| 国产精品igao视频网网址不卡日韩| 久久高清免费观看| 欧美在线91| 久久精品官网| 久久综合狠狠综合久久综合88| 午夜亚洲视频| 性欧美1819sex性高清| 午夜国产精品影院在线观看| 亚洲一区999| 亚洲综合好骚| 亚洲免费视频在线观看| 亚洲永久免费| 久热精品视频在线观看一区| 欧美激情一二区| 国产精品久久国产愉拍 | 久久精品成人欧美大片古装| 亚洲精品乱码久久久久| 最近看过的日韩成人| 99re成人精品视频| 久久久久网站| 欧美一区二区在线看| 亚洲免费电影在线观看| 一区二区三区日韩在线观看| 亚洲天天影视| 欧美一区二区国产| 久色成人在线| 国产精品jvid在线观看蜜臀| 欧美三级在线视频| 国产精品揄拍500视频| 亚洲精品人人| 亚洲影院在线观看| 欧美日韩国产999| 国内精品免费午夜毛片| 亚洲毛片在线观看| 午夜精品久久99蜜桃的功能介绍| 久久不见久久见免费视频1| 久久综合色播五月| 国产欧美1区2区3区| 一区二区冒白浆视频| 欧美怡红院视频| 欧美日韩一区二区三区高清| 在线欧美亚洲| 久久精品日产第一区二区| 国产精品人人做人人爽| 99亚洲一区二区| 欧美日韩一区二区在线视频| 亚洲国产欧美不卡在线观看| 久久成人久久爱| 伊人成人在线| 午夜精品久久99蜜桃的功能介绍| 麻豆国产精品va在线观看不卡 | 亚洲国产美女| 噜噜噜在线观看免费视频日韩| 国产精品二区三区四区| 99综合精品| 欧美日韩精品免费观看| 亚洲第一天堂无码专区| 久久中文在线| 亚洲欧洲日本国产| 欧美日韩日本国产亚洲在线| 亚洲综合电影| 伊人精品久久久久7777| 久久久久久久一区二区三区| 国产一区二区三区不卡在线观看| 日韩香蕉视频| 欧美看片网站| 亚洲另类在线视频| 欧美另类videos死尸| 亚洲国产婷婷综合在线精品 | 激情综合激情| 欧美一区二区日韩一区二区| 欧美日本免费| 亚洲欧美日韩精品| 国产在线视频不卡二| 久久久久综合| 欧美电影资源| 国产精品综合网站| 蜜桃av一区二区三区| 在线观看亚洲专区| 欧美精品一区二区三| 久久久久久久国产| 亚洲人成在线影院| 国产亚洲激情| 欧美韩日一区二区| 久久久久久精| 日韩一级二级三级| 黄色一区二区三区四区| 欧美日韩一区二区在线播放| 另类图片综合电影| 欧美日韩高清不卡| 欧美精品日韩综合在线| 欧美国产日韩在线| 欧美成人嫩草网站| 欧美精品激情在线| 欧美激情片在线观看| 欧美日韩精品二区| 欧美日韩在线直播| 国产精品一区三区| 国产精品一区二区在线| 国产视频在线一区二区| 激情另类综合| 9人人澡人人爽人人精品| 亚洲欧洲日本专区| 性欧美超级视频| 美女精品在线| 欧美国产视频一区二区| 欧美国产日本在线| 免费欧美在线| 欧美午夜剧场| 国产精品久久久久一区二区| 欧美精品偷拍| 国产精品国产三级国产aⅴ入口 | 国产精品成人一区二区网站软件| 国产精品亚洲第一区在线暖暖韩国| 欧美日韩精品国产| 韩国v欧美v日本v亚洲v| 亚洲欧洲另类国产综合| 亚洲性xxxx| 欧美精品在线观看一区二区| 国产欧美在线| 久久爱91午夜羞羞| 狠狠色丁香久久综合频道| 久久精品国产欧美激情 | 老司机aⅴ在线精品导航| 国产精品制服诱惑| 久久大逼视频| 国产精品99久久久久久宅男| 欧美午夜剧场| 久久精品国产欧美亚洲人人爽| 激情欧美日韩一区| 国产精品久久久久久户外露出|