狠狠综合久久久久综合网址-a毛片网站-欧美啊v在线观看-中文字幕久久熟女人妻av免费-无码av一区二区三区不卡-亚洲综合av色婷婷五月蜜臀-夜夜操天天摸-a级在线免费观看-三上悠亚91-国产丰满乱子伦无码专区-视频一区中文字幕-黑人大战欲求不满人妻-精品亚洲国产成人蜜臀av-男人你懂得-97超碰人人爽-五月丁香六月综合缴情在线

COMP3217代做、Python/Java編程設(shè)計(jì)代寫

時(shí)間:2024-02-28  來源:  作者: 我要糾錯(cuò)



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請(qǐng)加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標(biāo)簽:

掃一掃在手機(jī)打開當(dāng)前頁(yè)
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關(guān)信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國(guó)家級(jí)風(fēng)景名勝區(qū)
    昆明西山國(guó)家級(jí)風(fēng)景名勝區(qū)
    昆明旅游索道攻略
    昆明旅游索道攻略
  • NBA直播 短信驗(yàn)證碼平臺(tái) 幣安官網(wǎng)下載 歐冠直播 WPS下載

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權(quán)所有
    ICP備06013414號(hào)-3 公安備 42010502001045

    狠狠综合久久久久综合网址-a毛片网站-欧美啊v在线观看-中文字幕久久熟女人妻av免费-无码av一区二区三区不卡-亚洲综合av色婷婷五月蜜臀-夜夜操天天摸-a级在线免费观看-三上悠亚91-国产丰满乱子伦无码专区-视频一区中文字幕-黑人大战欲求不满人妻-精品亚洲国产成人蜜臀av-男人你懂得-97超碰人人爽-五月丁香六月综合缴情在线
  • <dl id="akume"></dl>
  • <noscript id="akume"><object id="akume"></object></noscript>
  • <nav id="akume"><dl id="akume"></dl></nav>
  • <rt id="akume"></rt>
    <dl id="akume"><acronym id="akume"></acronym></dl><dl id="akume"><xmp id="akume"></xmp></dl>
    三级a在线观看| 欧美牲交a欧美牲交aⅴ免费下载| 亚洲天堂网2018| 久久亚洲a v| 日本精品久久久久中文字幕| 欧美在线观看视频网站| 丰满少妇在线观看| 一级片免费在线观看视频| 在线观看av的网址| 大肉大捧一进一出好爽动态图| www.久久久久久久久久久| 男女啪啪免费视频网站| 亚洲欧美aaa| 成人黄色一区二区| 俄罗斯av网站| 久草视频这里只有精品| 亚洲一区二区在线视频观看| 久久免费视频3| 日韩小视频在线播放| 免费看污污视频| 思思久久精品视频| 国产成年人视频网站| 久久综合久久色| 苍井空浴缸大战猛男120分钟| 在线观看成人免费| 久久久久久久久久久久久国产| 玖玖爱视频在线| 国产三级精品三级在线| 中文字幕一区二区在线观看视频| 久久午夜夜伦鲁鲁一区二区| 国产偷人视频免费| 4444在线观看| 一二三四视频社区在线| 日本不卡一区在线| 亚洲制服在线观看| 永久免费在线看片视频| 欧洲美女和动交zoz0z| 欧美中日韩在线| 2022亚洲天堂| 日日噜噜噜夜夜爽爽| 国产精品国三级国产av| 已婚少妇美妙人妻系列| 精品亚洲一区二区三区四区| 日本网站在线看| 91好吊色国产欧美日韩在线| 国产熟人av一二三区| 2025韩国大尺度电影| 亚洲美免无码中文字幕在线| 不卡av免费在线| 亚洲乱码日产精品bd在线观看| 免费看一级大黄情大片| 欧美国产日韩另类| www.欧美日本| 九九九九免费视频| 日本美女爱爱视频| 爱爱爱爱免费视频| 少妇高潮喷水久久久久久久久久| 国产美女视频免费看| 日本中文字幕高清| 亚洲人成色77777| 成人av一级片| 久久婷婷五月综合色国产香蕉| 国产91av视频在线观看| 2025韩国理伦片在线观看| 鲁一鲁一鲁一鲁一澡| 日韩精品在线观看av| 一区二区三区四区久久| dy888午夜| 黄瓜视频免费观看在线观看www| 一起操在线视频| 午夜免费福利视频在线观看| wwww.国产| 日本黄色播放器| 国内av免费观看| 青春草国产视频| 国产男女无遮挡| 欧美美女性视频| h无码动漫在线观看| 日韩av资源在线| 粉色视频免费看| 在线观看17c| 茄子视频成人免费观看| 特黄视频免费观看| 国产夫妻自拍一区| www.天天射.com| 激情小视频网站| 好男人www社区| 国产欧美自拍视频| 九九热在线免费| 一本色道久久88亚洲精品综合| www.av蜜桃| 久久久九九九热| 免费大片在线观看| www.18av.com| 亚洲免费看av| 丝袜人妻一区二区三区| 在线观看免费污视频| 免费无码不卡视频在线观看| 国产一级片中文字幕| 久久撸在线视频| 欧美视频在线播放一区| 国产精品va在线观看无码| 乱子伦一区二区| 女女百合国产免费网站| 亚洲精品综合在线观看| 天美星空大象mv在线观看视频| 国产97在线 | 亚洲| 波多野结衣与黑人| 国产欧美日韩小视频| cao在线观看| 久久久久久人妻一区二区三区| 97久久国产亚洲精品超碰热| 国产肉体ⅹxxx137大胆| 日韩a级黄色片| 大西瓜av在线| 欧美日韩在线中文| 91制片厂毛片| 国产精品无码乱伦| 99精品视频免费版的特色功能| 日韩一区二区三区久久| 亚洲怡红院在线| 老汉色影院首页| 自慰无码一区二区三区| 性chinese极品按摩| 色哟哟免费网站| 农村妇女精品一二区| 91亚洲精品久久久蜜桃借种| 大片在线观看网站免费收看| 国产xxxxx在线观看| 99中文字幕在线观看| 国产高清视频网站| 欧美 丝袜 自拍 制服 另类| 国产乱码一区二区三区四区| 亚洲精品久久久久久久蜜桃臀| 成人黄色一区二区| 成人一级生活片| 91制片厂免费观看| 天天爽天天爽夜夜爽| 国产中文字幕视频在线观看| 国产精品久久中文字幕| 日韩最新中文字幕| 色偷偷中文字幕| 色91精品久久久久久久久| 已婚少妇美妙人妻系列| 国产午夜福利在线播放| 17c丨国产丨精品视频| 日本高清视频免费在线观看| 亚洲 欧洲 日韩| 18视频在线观看娇喘| 国产a级黄色大片| 亚洲国产精品成人天堂| 黄色一级视频播放| 天堂8在线天堂资源bt| 欧美日韩在线一| 黄色片视频在线播放| 午夜dv内射一区二区| 国产喷水theporn| 日韩中文字幕免费在线| 欧美xxxxx在线视频| 91制片厂毛片| 精品国产三级a∨在线| 日本福利视频在线观看| 每日在线观看av| 伊人国产在线视频| 91免费视频黄| 久久久久久久午夜| 五月婷婷深爱五月| 精品免费久久久久久久| 可以免费观看av毛片| 老司机午夜网站| 中文字幕第38页| 国产无限制自拍| 亚洲国产欧美91| caopor在线视频| 欧美狂野激情性xxxx在线观| 91视频这里只有精品| 99色精品视频| 欧洲精品一区二区三区久久| 欧美一级xxxx| 亚洲免费999| 一区二区成人网| 一区二区三区入口| www日韩视频| 老司机午夜av| 日韩中文字幕组| 免费av网址在线| 免费观看成人在线视频| 一二三四视频社区在线| 日韩久久久久久久久久久久| 日韩成人av免费| 国产成年人在线观看| 天堂视频免费看| 久久久国产精华液999999| 91小视频网站| 在线视频一二区| 在线观看视频黄色| 亚洲小说欧美另类激情| 永久免费看av| 草草草在线视频| 欧美一级特黄aaa|