久久久久久精品无码人妻_青春草无码精品视频在线观_无码精品国产VA在线观看_国产色无码专区在线观看

COMP3217代做、Python/Java編程設計代寫

時間:2024-02-28  來源:  作者: 我要糾錯



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區
    昆明西山國家級風景名勝區
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯系我們 | 網站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網 版權所有
    ICP備06013414號-3 公安備 42010502001045

    久久久久久精品无码人妻_青春草无码精品视频在线观_无码精品国产VA在线观看_国产色无码专区在线观看

    精品少妇无遮挡毛片| 老子影院午夜伦不卡大全| 久久久天堂国产精品| 欧美精品色婷婷五月综合| 精品国产乱码久久久久久1区二区| 免费高清一区二区三区| 一区二区xxx| 成人午夜精品久久久久久久蜜臀| 亚洲少妇久久久| 久操网在线观看| av在线网站免费观看| 日韩精品一区二区三区不卡 | 欧美 亚洲 视频| 亚洲视频在线观看一区二区三区| 青青在线视频免费观看| 男生操女生视频在线观看| 乱妇乱女熟妇熟女网站| 9色视频在线观看| 91女神在线观看| 99热成人精品热久久66| 国产妇女馒头高清泬20p多| 91香蕉国产线在线观看| 中文av一区二区三区| 国产日产欧美视频| 欧美不卡在线播放| 精品视频在线观看一区二区| 欧美性视频在线播放| 欧美国产日韩另类| 国产精品视频黄色| 人妻内射一区二区在线视频| 毛片在线播放视频| 激情五月六月婷婷| 成人高清dvd| 国产又大又长又粗又黄| 国产三级精品三级在线| 自拍偷拍21p| 黑人粗进入欧美aaaaa| 成年人在线看片| 北条麻妃在线观看| 免费日韩中文字幕| 精品久久久久久久免费人妻| 黄www在线观看| 日韩a在线播放| 成年人视频在线免费| 久草在在线视频| 国产成人无码av在线播放dvd| 国产av无码专区亚洲精品| 播放灌醉水嫩大学生国内精品| 日本www在线视频| 亚洲美免无码中文字幕在线| 久久久久久久午夜| 欧美亚洲一二三区| 韩国日本在线视频| 亚欧在线免费观看| 成人综合久久网| www激情五月| 91视频 - 88av| 欧美视频免费看欧美视频| 欧美亚洲一二三区| 可以免费在线看黄的网站| 国产野外作爱视频播放| 亚洲xxx在线观看| 三区视频在线观看| 特色特色大片在线| 99久久国产综合精品五月天喷水| 国产精品专区在线| 国产a视频免费观看| 天堂一区在线观看| 青少年xxxxx性开放hg| 国内少妇毛片视频| 欧美视频第一区| 在线免费观看av的网站| 在线观看中文av| 波多野结衣与黑人| 欧美 丝袜 自拍 制服 另类| 日韩精品一区二区三区不卡 | 大肉大捧一进一出好爽视频| 成人小视频在线看| www.这里只有精品| 三级在线免费观看| 国产a级一级片| www.cao超碰| 福利在线一区二区| 激情视频综合网| 天天av天天操| 奇米影视亚洲色图| 日本黄大片一区二区三区| 波多野结衣三级在线| 永久免费看av| 日韩欧美国产综合在线| 日本免费观看网站| 法国空姐在线观看免费| 久久视频这里有精品| 中文字幕第38页| 国产成人一区二区三区别| 欧美黑人又粗又大又爽免费| 国产又粗又爽又黄的视频| 国产成人无码精品久久久性色| 中文字幕天天干| 日本a级片在线观看| 欧美日韩在线免费播放| 日韩精品久久一区二区| 欧美黄色性生活| 久久久亚洲国产精品| 久久6免费视频| 六月丁香激情网| 青青草原播放器| 毛片一区二区三区四区| 色哺乳xxxxhd奶水米仓惠香| 久久午夜夜伦鲁鲁一区二区| 日本五级黄色片| 亚洲欧美日韩综合网| 99热自拍偷拍| 日韩精品视频网址| 又色又爽又高潮免费视频国产| 国产高清不卡无码视频| 91视频这里只有精品| 国产成人a亚洲精v品无码| 男人日女人的bb| 亚洲综合av在线播放| 青青草原av在线播放| 妞干网视频在线观看| 午夜免费福利网站| 男女视频在线看| 午夜精品久久久内射近拍高清| www.xxx麻豆| 不卡中文字幕在线| 天天爽夜夜爽一区二区三区| 国产91xxx| av片在线免费| av中文字幕av| 国内av一区二区| 鲁一鲁一鲁一鲁一av| 国产成人精品无码播放| 日本网站免费在线观看| 又大又硬又爽免费视频| 亚洲天堂av免费在线观看| the porn av| 日韩中文字幕组| 久久国产乱子伦免费精品| 精品少妇人妻av免费久久洗澡| 伊人网在线免费| 亚洲免费视频播放| 99亚洲精品视频| 最近中文字幕免费mv| 深爱五月综合网| 一起操在线视频| 校园春色 亚洲色图| 国产小视频精品| 中文久久久久久| 麻豆av免费在线| 欧美私人情侣网站| 国产xxxxx在线观看| 农村妇女精品一二区| 欧美精品第三页| 亚洲色精品三区二区一区| 黄色一级免费大片| 国产一区二区在线免费播放| 日韩精品你懂的| 中文字幕成人免费视频| 91欧美一区二区三区| 国产大尺度在线观看| 女同性恋一区二区| 国产成人在线小视频| 九九爱精品视频| 黄色网页免费在线观看| 人妻内射一区二区在线视频| 成人免费无码av| 污色网站在线观看| 天堂av.com| 久久精品在线免费视频| 国产一级做a爰片久久毛片男| 日韩黄色短视频| 欧美日韩国产精品激情在线播放| 无码人妻丰满熟妇区五十路百度| 午夜国产一区二区三区| www.久久久久久久久久久| 成人免费看片视频在线观看| 成人午夜免费在线视频| 黄色影院一级片| 牛夜精品久久久久久久| 国产传媒免费观看| www.男人天堂网| 日本中文字幕片| 香蕉视频999| 2022中文字幕| 日韩a在线播放| 亚洲色图偷拍视频| 岛国大片在线播放| 天天天干夜夜夜操| 先锋影音男人资源| 国产男女免费视频| 久久午夜夜伦鲁鲁一区二区| 一二三av在线| 三上悠亚久久精品| 制服丝袜综合网| 男人天堂新网址| av无码精品一区二区三区| 97人人模人人爽人人澡| 久艹视频在线免费观看|