久久久久久精品无码人妻_青春草无码精品视频在线观_无码精品国产VA在线观看_国产色无码专区在线观看

COMP3217代做、Python/Java編程設計代寫

時間:2024-02-28  來源:  作者: 我要糾錯



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區
    昆明西山國家級風景名勝區
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    久久久久久精品无码人妻_青春草无码精品视频在线观_无码精品国产VA在线观看_国产色无码专区在线观看

    久久久国产精华液999999| 少妇性饥渴无码a区免费| 日本老太婆做爰视频| 91九色在线观看视频| 国产精品欧美激情在线观看| 欧美一级在线看| 99久久99久久精品| 欧美一级视频在线| 欧美日韩激情四射| 1024精品视频| 91视频 - 88av| 欧美激情第四页| 亚洲欧美偷拍另类| 亚洲欧美自偷自拍另类| 国产精品无码av无码| 黄色免费观看视频网站| 国产一级爱c视频| 国产九色porny| 免费一级特黄毛片| 黄色一级在线视频| 免费看一级大黄情大片| av7777777| 国产a级一级片| 99蜜桃臀久久久欧美精品网站| 国产3p露脸普通话对白| 亚洲美免无码中文字幕在线 | 中文字幕第22页| 亚洲一二三av| 天天成人综合网| 强开小嫩苞一区二区三区网站| 2025韩国大尺度电影| 91九色国产ts另类人妖| 久久久久久久久影视| 红桃一区二区三区| 久久在线中文字幕| 欧美日韩在线中文| 粗暴91大变态调教| 国产乱淫av片杨贵妃| 国风产精品一区二区| 人妻激情另类乱人伦人妻| 日韩欧美猛交xxxxx无码| 欧美日韩福利在线| 成人小视频在线看| 一区二区三区韩国| 波多野结衣三级在线| 中文精品无码中文字幕无码专区| 国产在线播放观看| 国产aaaaa毛片| 91香蕉国产线在线观看| www.夜夜爱| 国产日产欧美视频| 成年人三级黄色片| 米仓穗香在线观看| 久久国产亚洲精品无码| www欧美激情| 强开小嫩苞一区二区三区网站| 尤物av无码色av无码| 日本美女视频一区| 老司机激情视频| 97在线免费公开视频| 看看黄色一级片| 精品人妻少妇一区二区| 国产一区二区在线免费播放| 欧美日韩一区二区三区电影| 日本www在线播放| 91丝袜超薄交口足| 国产精品无码人妻一区二区在线| 啊啊啊国产视频| 男同互操gay射视频在线看| 亚洲 高清 成人 动漫| 911福利视频| 国产av人人夜夜澡人人爽麻豆| 中文字幕av专区| 国产精品一线二线三线| www.精品在线| 大j8黑人w巨大888a片| 亚洲成色www.777999| 久久久久久香蕉| 深夜做爰性大片蜜桃| 亚洲精品无码国产| 日日干夜夜操s8| 国产欧美日韩小视频| 国产成人手机视频| 激情视频小说图片| 日韩精品一区中文字幕| 欧美h视频在线观看| 亚洲色欲综合一区二区三区| 日韩中文在线字幕| 黑人粗进入欧美aaaaa| 日本道在线视频| jizz大全欧美jizzcom| 免费毛片网站在线观看| 尤物网站在线看| 爆乳熟妇一区二区三区霸乳| 久久av高潮av| 国产精欧美一区二区三区白种人| av免费中文字幕| 青青在线免费观看| 波多野结衣激情| 超碰在线公开97| 97成人在线观看视频| 中文字幕精品在线播放| 羞羞的视频在线| 黄色片久久久久| 18禁裸男晨勃露j毛免费观看| 黄色国产精品视频| 一女被多男玩喷潮视频| 久久精品久久99| 国产精品亚洲a| 国产亚洲精品久久久久久久| 一路向西2在线观看| 国产1区2区在线| 国产自产在线视频| 青青青在线观看视频| 国产精品夜夜夜爽张柏芝| 日本888xxxx| 国产av无码专区亚洲精品| 日韩精品在线视频免费观看| 亚洲一区 在线播放| 日日夜夜精品视频免费观看| 91 在线视频观看| 亚洲最大成人在线观看| 国产福利影院在线观看| 超碰影院在线观看| 欧美污视频网站| 国产91在线视频观看| 日韩少妇内射免费播放| 少妇无码av无码专区在线观看| 免费人成自慰网站| 欧美a级免费视频| 日韩精品一区二区免费| 国产精品视频二| 路边理发店露脸熟妇泻火| 欧美一级特黄aaaaaa在线看片| 99re99热| 无码熟妇人妻av在线电影| 台湾无码一区二区| 日本va中文字幕| 国产精品久久国产| 黄色一级大片免费| 欧美交换配乱吟粗大25p| 成年丰满熟妇午夜免费视频| 成人短视频在线观看免费| a级黄色小视频| 国产白丝袜美女久久久久| 欧美成人免费高清视频| 国产精品亚洲二区在线观看| 久久久国产欧美| 在线免费看v片| 伊人网在线免费| 9久久9毛片又大又硬又粗| 久久久久人妻精品一区三寸| 日本中文字幕高清| 国产福利精品一区二区三区| 麻豆中文字幕在线观看| 国产黄色激情视频| 欧美久久久久久久久久久久久| 免费在线观看的av网站| 欧美婷婷精品激情| 欧美性受xxxx黒人xyx性爽| 成人在线免费高清视频| 欧美一区二区中文字幕| 国产91色在线观看| 伊人再见免费在线观看高清版 | 欧美人与动牲交xxxxbbbb| 丰满少妇久久久| 十八禁视频网站在线观看| 一级黄色在线播放| 国产xxxx振车| 亚洲欧美另类动漫| 伊人网在线免费| 免费国产成人av| 亚洲一区二区三区四区五区xx| 男女无套免费视频网站动漫| 亚洲欧美日本一区二区| 国产资源在线免费观看| 成人三级视频在线播放| 久久精品国产99久久99久久久| 青青草视频在线免费播放| 日本三级黄色网址| www.av毛片| 天天影视色综合| 奇米精品一区二区三区| 加勒比av中文字幕| 国产九九九九九| 国产精品久久久久久久99| 日本一区二区黄色| 日日噜噜夜夜狠狠久久丁香五月 | 麻豆视频传媒入口| 亚洲色图38p| 日本一本草久p| wwww.国产| av免费观看网| 日韩video| 三上悠亚在线一区| 99色精品视频| 成人一级生活片| 激情文学亚洲色图| 久久久久久久少妇| 欧美成人高潮一二区在线看|