亚洲十八**毛片_亚洲综合影院_五月天精品一区二区三区_久久久噜噜噜久久中文字幕色伊伊 _欧美岛国在线观看_久久国产精品毛片_欧美va在线观看_成人黄网大全在线观看_日韩精品一区二区三区中文_亚洲一二三四区不卡

COMP3217代做、Python/Java編程設(shè)計代寫

時間:2024-02-28  來源:  作者: 我要糾錯



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關(guān)信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風(fēng)景名勝區(qū)
    昆明西山國家級風(fēng)景名勝區(qū)
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    免费的黄网站在线观看| 伊人久久av| 国产高清视频在线观看| 成年人视频网站在线| 欧美jizzhd欧美| 7777kkk亚洲综合欧美网站| 亚洲欧美一区二区三区 | 奇米亚洲欧美| 亚洲va久久久噜噜噜久久| 中国av一区| 最新国产精品| 日韩电影一二三区| 成人国产电影网| 国产精品视频免费| 五月婷婷综合网| 欧美情侣在线播放| 欧美福利网站| 蜜桃视频在线观看www社区| 最近高清中文在线字幕在线观看1| 成人亚洲综合| 欧美久久综合网| 久久午夜精品| 99久久精品久久久久久清纯| 1区2区3区国产精品| 色婷婷激情一区二区三区| 99热免费在线观看| jizz在线观看| 欧美久久久网站| 色综合咪咪久久网| 男女激情视频一区| 国产精品久久久久久亚洲毛片 | 国产一区毛片| 亚洲欧美日韩国产一区二区| 不卡一卡二卡三乱码免费网站| 亚洲女同ⅹxx女同tv| 欧美日韩国产高清一区二区三区 | 欧美大片一区二区| 你懂得在线网址| 日本在线中文字幕一区二区三区| 九九热精品视频在线观看| 久久久噜噜噜久久狠狠50岁| 国产日韩影视精品| 91精品中文字幕一区二区三区| 欧洲视频在线免费观看| 亚洲精品555| 国产中文一区| www一区二区| 91.com视频| 黄色免费在线观看网站| xvideos.蜜桃一区二区| 久久国产66| 日韩一区在线播放| av美女在线| 一二三四视频在线中文| 99热国内精品永久免费观看| 你懂的在线看| 日韩一区二区三区电影在线观看| 欧洲在线视频| 亚洲专区**| 美日韩一区二区三区| 亚洲在线视频一区| 中文字幕在线视频不卡| 欧美黄色网络| 久久青草久久| 亚洲国产综合视频在线观看| 国产乱真实合集| 日韩毛片免费视频一级特黄| 国产精品久久久久9999高清| 亚洲午夜一二三区视频| 欧美拍拍视频| 人体久久天天| 波多野结衣在线aⅴ中文字幕不卡| 欧美日韩国产精品成人| 波多野结衣中文在线| 狠狠色丁香久久综合频道| 中文字幕佐山爱一区二区免费| videoxxxx另类日本极品| 日韩精品一区二区三区免费视频| 久久99国产精品成人| 在线亚洲精品福利网址导航| 怡红院在线播放| 中文精品久久| 亚洲第一狼人社区| 超碰porn在线| 欧美激情综合| 欧美午夜性色大片在线观看| 国产色在线观看| 激情久久婷婷| 91国产免费看| www成人免费观看| 丝袜亚洲另类欧美综合| 欧美日韩欧美一区二区| free欧美| 国产99久久久精品| 欧美艹逼视频| 欧美精品系列| 亚洲成人av一区| 波多野结衣中文字幕久久| 欧美一级播放| 日韩免费一区二区三区在线播放| 国产精品天堂蜜av在线播放| 丁香天五香天堂综合| 国产夫妻在线视频| 久久av影视| 国产精品麻豆久久久| 美州a亚洲一视本频v色道| 国产精品videosex性欧美| 精品国产户外野外| 97成人资源| 成人高清视频在线观看| 美女欧美视频在线观看免费| 日韩一级在线| 日韩精品中文字幕一区二区三区| 亚洲天堂中文字幕在线观看| 中文字幕永久在线不卡| 操你啦视频在线| 日韩av电影一区| 国产九一视频| 亚洲女同另类| 亚洲欧美不卡| 激情综合色综合久久| 原千岁中文字幕| 欧美精品91| 精品国产麻豆免费人成网站| 你微笑时很美电视剧整集高清不卡| 一区二区三区精品久久久| 亚洲妇女成熟| 国产欧美日韩亚州综合| 国产美女情趣调教h一区二区| 激情成人午夜视频| 国内av一区二区三区| 日本欧洲一区二区| 手机福利小视频在线播放| 一本久久知道综合久久| 成人手机在线| 亚洲免费播放| 香港日本韩国三级| 欧美一区=区| 日本1级在线| 亚洲在线一区| 日本一区高清| 精品一区二区免费视频| av在线1区2区| 大美女一区二区三区| 在线观看免费视频你懂的| 99久久久久免费精品国产 | 久久综合九色综合97_久久久| 四虎亚洲精品| 99精品久久久久久| 日韩深夜视频| 亚洲伦理在线精品| 人人精品久久| 色噜噜狠狠色综合中国 | 中文字幕一区日韩精品欧美| 色香欲www7777综合网| 夜夜精品浪潮av一区二区三区| 韩国三级成人在线| 欧美三级中文字幕在线观看| 99久久这里只有精品| 国产精品久久久久白浆| 麻豆极品一区二区三区| 日本动漫理论片在线观看网站| 久久老女人爱爱| 日韩成人一区| 欧美日韩中字一区| 欧美亚韩一区| 欧美在线观看在线观看| 91免费观看在线| 91精品福利观看| 欧美日韩国产经典色站一区二区三区| 911久久香蕉国产线看观看| 三级网站在线| 成人性视频网站| 老司机精品视频网| 欧美精品在线观看一区二区| 亚洲经典三级| 黄av在线免费观看| 亚洲欧美激情小说另类| 欧美日韩伦理| 日本一二三区在线视频| 国产午夜精品理论片a级大结局| 国产亚洲亚洲国产一二区| 一本久道综合久久精品| 精品国产1区2区| 中文字幕亚洲精品乱码| 污视频网站在线免费观看| 91浏览器在线视频| 韩国精品福利一区二区三区| 成人黄色电影网址| 丁香亚洲综合激情啪啪综合| 婷婷精品久久久久久久久久不卡| 欧美一三区三区四区免费在线看 | 久久精品日韩欧美| 美女高潮在线观看| 欧美三级在线播放| 蜜臀av性久久久久蜜臀av麻豆| 欧美xxx视频| 天天爱天天做色综合| 国产麻豆精品95视频| 成人资源在线|