精品深夜AV无码一区二区_伊人久久无码中文字幕_午夜无码伦费影视在线观看_伊人久久无码精品中文字幕

COMP3217代做、Python/Java編程設(shè)計代寫

時間:2024-02-28  來源:  作者: 我要糾錯



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關(guān)信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區(qū)
    昆明西山國家級風景名勝區(qū)
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    精品深夜AV无码一区二区_伊人久久无码中文字幕_午夜无码伦费影视在线观看_伊人久久无码精品中文字幕
    <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp>
    <ul id="e4iaa"></ul>
    <blockquote id="e4iaa"><tfoot id="e4iaa"></tfoot></blockquote>
    • <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp>
      <ul id="e4iaa"></ul>
      <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp><ul id="e4iaa"></ul>
      <ul id="e4iaa"></ul>
      <th id="e4iaa"><menu id="e4iaa"></menu></th>
      天天av天天翘| 91精品中文字幕| 97成人在线观看| 91视频在线网站| 91人妻一区二区三区| 中文字幕亚洲日本| 亚洲男人在线天堂| www.超碰97.com| 狠狠干狠狠操视频| 精品午夜福利视频| 日韩免费一二三区| 伊人久久久久久久久| 91视频免费网址| 蜜乳av中文字幕| 中文字幕在线视频一区二区三区| 亚洲欧美色图视频| 国产青青草视频| 色婷婷在线观看视频| 99久久精品国产色欲| 久久久久久久毛片| 91精品人妻一区二区三区蜜桃2| 韩国中文字幕av| 少妇精品无码一区二区| 一本一道精品欧美中文字幕| 国产性xxxx| 亚洲欧美国产高清va在线播放| 久久精品波多野结衣| 亚洲乱码在线观看| 日本三级视频在线| 黄色一级视频免费| 99re这里只有| 日韩精品视频播放| 久久黄色片网站| 亚洲一级免费毛片| 六月丁香婷婷综合| 精品国自产在线观看| www五月天com| 国产成人精品av久久| jizzjizzjizz国产| 一级欧美一级日韩片| 在线观看国产亚洲| 全部毛片永久免费看| 99久久精品免费视频| 五月天婷婷导航| 亚洲 国产 日韩 欧美| 亚洲av熟女高潮一区二区 | 亚洲熟女少妇一区二区| 日本道中文字幕| 三级网站在线看| 欧美激情一区二区视频| 十八禁一区二区三区| 日日碰狠狠添天天爽| 中文字幕视频三区| 一二三区免费视频| 国产精品久久久久久久久久久久久久久久| 亚洲毛片在线播放| 国产视频www| 五月婷婷丁香花| www.av88| 日韩在线不卡一区| 中文字幕欧美人妻精品一区蜜臀| japanese中文字幕| 免费在线黄色网| 亚洲av成人无码久久精品| 亚洲黄色在线免费观看| 国产精品久久久久久久久久久久久久久久久 | 人妻av一区二区三区| 无人码人妻一区二区三区免费| 91人妻一区二区三区| 天天干中文字幕| 欧美 中文字幕| 久久久久亚洲AV成人| 国产小视频一区| 国产成人精品一区二区色戒| 中文字幕在线视频精品| 日本二区在线观看| 国产制服丝袜在线| 国产在线观看99| 国产成人精品综合久久久久99 | 国产麻豆a毛片| 国产婷婷在线视频| 日本亚洲一区二区三区| 一区二区三区免费在线观看视频 | 国产一区二区波多野结衣| 欧日韩在线视频| 国产情侣在线播放| 亚洲精品久久久狠狠狠爱| 国产又粗又长又大的视频| 天天综合网久久综合网| 老女人性生活视频| 懂色av中文字幕| 在线观看中文字幕视频| 久久精品人妻一区二区三区| 国产成人无码www免费视频播放| 日韩欧美视频在线免费观看| 狠狠躁狠狠躁视频专区| 粉嫩精品久久99综合一区| 伊人久久中文字幕| 日本欧美www| 日本乱子伦xxxx| 少妇伦子伦精品无吗| 深爱五月激情五月| wwwww黄色| 亚洲天堂一区二区在线观看| 日韩网站在线播放| 日韩影院一区二区| 亚洲精品鲁一鲁一区二区三区| 日韩熟女一区二区| 性欧美一区二区| 亚洲五月天综合| 非洲一级黄色片| 亚洲日本精品视频| 国产精品揄拍100视频| 天堂av手机在线| 亚洲黄色小说网址| 国产精品综合在线| 日本在线不卡一区二区| 一区二区三区 日韩| 国产福利短视频| 日本精品999| www.天天干.com| 欧美日韩三级在线观看| 在线视频观看一区二区| 在线观看一区二区三区四区 | 天天插天天干天天操| aaa黄色大片| 成 人 黄 色 小说网站 s色| 中文字幕超碰在线| 国产色视频在线| 天天综合在线视频| 久久久久久免费观看| 伊人网伊人影院| 九九热精品在线播放| 91麻豆制片厂| 少妇极品熟妇人妻无码| 久草成人在线视频| 青青草华人在线视频| 国产欧美一区二区三区在线看蜜臂| 精品人妻无码一区二区性色 | 蜜桃色一区二区三区| 999精品视频在线| 在线观看欧美一区二区| 免费观看国产精品| 精品久久人妻av中文字幕| www.com黄色片| 肥臀熟女一区二区三区| www.激情五月.com| 不卡中文字幕在线观看| www.五月天色| 亚洲精品.www| 亚洲va综合va国产va中文| 日韩在线视频第一页| 欧美日韩黄色网| 国产婷婷在线视频| 国产免费中文字幕| 国产一级二级视频| 九九热在线视频播放| 欧美性猛交xxxx乱大交hd| 日本免费不卡视频| 亚洲精品自拍视频在线观看 | 亚洲精品一二三四| 欧美视频一区二区在线| 欧美国产日韩在线观看成人| 91在线视频国产| 91精品国产高潮对白| 成人无码www在线看免费| 国产亚洲欧美日韩高清| 欧美另类视频在线观看| 九九视频免费观看| 手机在线视频一区| 免费在线一区二区三区| 在线视频观看一区二区| 国产又黄又粗视频| 无码人妻精品一区二区三区温州 | av污在线观看| 国产色片在线观看| 精品手机在线视频| 无码人妻精品一区二区三区99不卡| 亚洲欧美偷拍另类| 免费看污黄网站在线观看| aaa级黄色片| 一区二区三区在线观看免费视频| 国产露脸国语对白在线| 天天操天天爽天天干| 久久久久亚洲av成人无码电影| 五月天综合激情| 美女在线视频一区二区| 国产精品久久久精品四季影院| 日日噜噜噜噜久久久精品毛片| 成年人免费看毛片| 亚洲特级黄色片| 天天爽夜夜爽人人爽| 国产高潮呻吟久久| 97人妻精品视频一区| 亚洲区一区二区三| 亚洲精品视频大全| 亚洲精品乱码久久久久久不卡| 一区二区不卡免费视频| 四虎精品一区二区| 婷婷在线精品视频|