狠狠综合久久久久综合网址-a毛片网站-欧美啊v在线观看-中文字幕久久熟女人妻av免费-无码av一区二区三区不卡-亚洲综合av色婷婷五月蜜臀-夜夜操天天摸-a级在线免费观看-三上悠亚91-国产丰满乱子伦无码专区-视频一区中文字幕-黑人大战欲求不满人妻-精品亚洲国产成人蜜臀av-男人你懂得-97超碰人人爽-五月丁香六月综合缴情在线

COMP3217代做、Python/Java編程設(shè)計(jì)代寫

時(shí)間:2024-02-28  來源:  作者: 我要糾錯(cuò)



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請(qǐng)加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標(biāo)簽:

掃一掃在手機(jī)打開當(dāng)前頁(yè)
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關(guān)信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國(guó)家級(jí)風(fēng)景名勝區(qū)
    昆明西山國(guó)家級(jí)風(fēng)景名勝區(qū)
    昆明旅游索道攻略
    昆明旅游索道攻略
  • NBA直播 短信驗(yàn)證碼平臺(tái) 幣安官網(wǎng)下載 歐冠直播 WPS下載

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權(quán)所有
    ICP備06013414號(hào)-3 公安備 42010502001045

    狠狠综合久久久久综合网址-a毛片网站-欧美啊v在线观看-中文字幕久久熟女人妻av免费-无码av一区二区三区不卡-亚洲综合av色婷婷五月蜜臀-夜夜操天天摸-a级在线免费观看-三上悠亚91-国产丰满乱子伦无码专区-视频一区中文字幕-黑人大战欲求不满人妻-精品亚洲国产成人蜜臀av-男人你懂得-97超碰人人爽-五月丁香六月综合缴情在线
  • <dl id="akume"></dl>
  • <noscript id="akume"><object id="akume"></object></noscript>
  • <nav id="akume"><dl id="akume"></dl></nav>
  • <rt id="akume"></rt>
    <dl id="akume"><acronym id="akume"></acronym></dl><dl id="akume"><xmp id="akume"></xmp></dl>
    国产精品自在自线| 国产深夜男女无套内射| 欧美日韩福利在线| 欧美xxxx吸乳| 国产专区在线视频| 欧日韩免费视频| 女人天堂av手机在线| 免费激情视频在线观看| 中文字幕欧美人妻精品一区| 成人免费观看cn| 男人搞女人网站| 国产一线二线三线在线观看| 人人爽人人av| 久久久久久久久久一区| 亚洲精品20p| 国产日本在线播放| cao在线观看| 黄色片久久久久| 国产一级片91| 茄子视频成人免费观看| 免费看涩涩视频| 国产日韩一区二区在线| 欧美日韩理论片| 99视频精品免费| 婷婷视频在线播放| 波多野结衣作品集| 久久久精品高清| 日韩中文字幕在线不卡| 国内自拍在线观看| 中文字幕久久av| 欧美一区二区激情| 亚洲一区在线不卡| 免费观看成人网| www.黄色网址.com| 在线视频日韩欧美| 久久综合伊人77777麻豆最新章节| jizzzz日本| 99精品在线免费视频| 国产大片一区二区三区| 国产欧美日韩网站| 亚欧精品在线视频| 精品久久久久久久免费人妻| 欧美h视频在线观看| aa在线免费观看| 嫩草影院中文字幕| 成人午夜视频在线观看免费| 超碰在线播放91| 久久久久久久午夜| japanese在线播放| 亚洲国产日韩欧美在线观看| 毛片在线播放视频| 最近中文字幕免费mv| 亚欧激情乱码久久久久久久久| 青青青在线视频播放| 特色特色大片在线| 亚洲一二三av| 超碰成人在线播放| 激情五月俺来也| 日本在线视频www| 免费无码av片在线观看| 日本人体一区二区| 国产精品久久久久7777| 欧美一区二区三区综合| 国产卡一卡二在线| 潘金莲一级淫片aaaaa免费看| 第一区免费在线观看| www.这里只有精品| 中文字幕资源在线观看| 亚洲av毛片在线观看| 久久久久久三级| 日本美女高潮视频| 日本中文字幕精品—区二区| 日本888xxxx| 最新av免费在线观看| 手机在线国产视频| 波多野结衣三级在线| 日韩在线一区视频| 手机在线视频你懂的| 欧美 日韩 国产精品| 97超碰在线视| 国产精品网站免费| 久在线观看视频| 三级在线视频观看| 久久精品一卡二卡| 国产成人一区二区三区别| 97超碰在线人人| www欧美激情| 日本福利视频在线观看| 成人免费在线网| 最新中文字幕2018| 国产盗摄视频在线观看| 色综合久久久久无码专区| 国产高清视频网站| 亚洲不卡视频在线| 日韩视频在线观看一区二区三区| 国产精品一区在线免费观看| 波多野结衣综合网| 亚洲一区在线不卡| 成人在线视频一区二区三区 | 精品久久久久久无码中文野结衣| 欧美色图色综合| 在线免费视频一区| 大荫蒂性生交片| 伊人国产在线视频| 成人免费性视频| 中文字幕av不卡在线| 蜜臀精品一区二区| 亚洲视频第二页| 免费av观看网址| 欧美做受777cos| 一区二区xxx| 亚洲熟妇av一区二区三区漫画| 日本人69视频| 国产xxxxx在线观看| 精品一区二区三区毛片| 性欧美极品xxxx欧美一区二区| 国产免费内射又粗又爽密桃视频| 中文字幕 91| 欧美性大战久久久久xxx| 中文字幕一区二区三区四区五区人| 激情婷婷综合网| 国产午夜精品视频一区二区三区| 国产av国片精品| 女人床在线观看| 日韩精品视频网址| 亚洲va在线va天堂va偷拍| 国产成人久久777777| 青娱乐自拍偷拍| 91好吊色国产欧美日韩在线| 国产在线无码精品| 樱空桃在线播放| 免费不卡av网站| 裸体大乳女做爰69| av磁力番号网| 91免费版看片| 国产一二三区在线播放| 亚洲色图都市激情| 九一免费在线观看| 日韩小视频网站| 91av资源网| www日韩视频| 国产高清视频网站| 国产乱码一区二区三区四区| 777视频在线| 久久久一二三四| 久久福利一区二区| 日本中文字幕在线视频观看| 亚洲人精品午夜射精日韩| 国产在线精品91| 天天碰免费视频| av不卡在线免费观看| 国产黄色激情视频| 国产欧美在线一区| 污视频网站观看| 国产欧美精品aaaaaa片| 黄色一级片播放| 红桃视频 国产| 国产欧美日韩网站| 国产又大又黄又粗又爽| 91xxx视频| 久久婷婷国产精品| 韩国中文字幕av| 妺妺窝人体色www看人体| 精品一卡二卡三卡| 超碰97免费观看| 男人亚洲天堂网| 黄色录像特级片| 男女男精品视频站| www.欧美黄色| 在线观看免费的av| 亚洲熟妇av日韩熟妇在线| 国产成人黄色网址| 久久国产精品网| 久久精品亚洲天堂| 91av在线免费播放| 成人手机在线播放| 国产高清视频网站| 久久这里只有精品23| 在线观看中文av| 在线免费观看av的网站| 欧美深夜福利视频| 午夜免费一级片| 污污网站免费看| 国产激情在线观看视频| 国产欧美日韩网站| 国产精品88久久久久久妇女| 污网站免费在线| 亚洲天堂av线| 国产精品无码av无码| 久久久久久久久久久99| 国产精品8888| 久久最新免费视频| 亚洲a级黄色片| www.色欧美| www.51色.com| 深爱五月综合网| 日本特级黄色大片| 国产免费色视频| 久久久无码中文字幕久...| 亚洲第一色av|