精品深夜AV无码一区二区_伊人久久无码中文字幕_午夜无码伦费影视在线观看_伊人久久无码精品中文字幕

COMP3217代做、Python/Java編程設計代寫

時間:2024-02-28  來源:  作者: 我要糾錯



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標簽:

掃一掃在手機打開當前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風景名勝區(qū)
    昆明西山國家級風景名勝區(qū)
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗證碼平臺 理財 WPS下載

    關于我們 | 打賞支持 | 廣告服務 | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權所有
    ICP備06013414號-3 公安備 42010502001045

    精品深夜AV无码一区二区_伊人久久无码中文字幕_午夜无码伦费影视在线观看_伊人久久无码精品中文字幕
    <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp>
    <ul id="e4iaa"></ul>
    <blockquote id="e4iaa"><tfoot id="e4iaa"></tfoot></blockquote>
    • <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp>
      <ul id="e4iaa"></ul>
      <samp id="e4iaa"><tbody id="e4iaa"></tbody></samp><ul id="e4iaa"></ul>
      <ul id="e4iaa"></ul>
      <th id="e4iaa"><menu id="e4iaa"></menu></th>
      国产露脸91国语对白| 久久精品国产99| 国产亚洲一二三区| 精品国产三级a在线观看| 欧美一二三在线| 日韩一级二级三级| 日韩欧美一区二区免费| 精品少妇一区二区三区在线播放| 日韩一区二区免费电影| 亚洲精品一区二区三区精华液| 欧美成人一区二区三区| 久久精品亚洲精品国产欧美kt∨| 久久久久久久久久久久电影| 国产女同互慰高潮91漫画| 国产精品免费久久久久| 亚洲男女一区二区三区| 亚洲h在线观看| 久久99国产精品麻豆| 国产精品996| 色综合网色综合| 欧美日韩大陆一区二区| 久久先锋资源网| 亚洲欧洲精品一区二区三区| 亚洲一区二区三区中文字幕在线 | 国产丝袜美腿一区二区三区| 欧美国产日本视频| 亚洲综合偷拍欧美一区色| 天堂一区二区在线| 国内精品伊人久久久久av一坑| www.日本不卡| 日韩一区二区精品在线观看| 中文天堂在线一区| 五月婷婷综合网| 成人精品在线视频观看| 欧美视频在线一区| 久久久91精品国产一区二区三区| 一区二区国产视频| 国产成人综合在线播放| 欧美精品色一区二区三区| 欧美—级在线免费片| 亚洲大片精品永久免费| 成人va在线观看| 日韩欧美美女一区二区三区| 亚洲男人的天堂av| 国产乱码精品一品二品| 69久久99精品久久久久婷婷| |精品福利一区二区三区| 久久91精品国产91久久小草| 欧美怡红院视频| 国产精品污网站| 精品一区二区三区久久| 欧美丰满少妇xxxxx高潮对白| 中文字幕免费不卡| 久久电影网站中文字幕| 91精品国产综合久久小美女| 亚洲综合丁香婷婷六月香| 成人午夜激情在线| 精品国产乱码久久久久久闺蜜| 亚洲v精品v日韩v欧美v专区| 91久久精品一区二区三| 国产精品电影一区二区三区| 国产精品自拍一区| 精品成人佐山爱一区二区| 全部av―极品视觉盛宴亚洲| 欧美日韩mp4| 香蕉成人伊视频在线观看| 欧美日韩视频在线第一区 | 欧美日韩视频不卡| 亚洲精品一二三| 972aa.com艺术欧美| 中文字幕在线播放不卡一区| 成人毛片视频在线观看| 中文字幕一区二区三区乱码在线| 国产精品一区二区在线播放| 国产午夜精品一区二区三区视频 | 欧美一级一级性生活免费录像| 亚洲一线二线三线视频| 91丨porny丨在线| 亚洲裸体xxx| 精品视频在线免费观看| 肉丝袜脚交视频一区二区| 91精品国产综合久久久久久久| 免费成人在线影院| 欧美成人r级一区二区三区| 韩国v欧美v日本v亚洲v| 国产亚洲精久久久久久| 成人app在线| 亚洲精品成人精品456| 欧美精品久久99久久在免费线 | 久久99精品久久久| 欧美精品一区二区在线观看| 国产精品1区2区| 亚洲欧美一区二区久久 | 国产综合久久久久影院| 国产清纯美女被跳蛋高潮一区二区久久w| 国产成人免费9x9x人网站视频| 综合色天天鬼久久鬼色| 欧美日韩中文字幕精品| 久久99日本精品| 日韩理论在线观看| 欧美一区在线视频| 成人午夜视频在线| 亚洲国产日韩a在线播放性色| 日韩免费电影一区| 99国产精品久久久久| 日本视频一区二区| 国产精品久久精品日日| 欧美精品1区2区| 成人v精品蜜桃久久一区| 亚洲成av人影院在线观看网| 久久久精品免费网站| 欧美性感一区二区三区| 国产成人av在线影院| 亚洲成人综合网站| 国产精品久久久久四虎| 日韩一区二区免费在线观看| 色综合久久综合| 久久激情综合网| 亚洲高清免费在线| 国产精品网站在线观看| 欧美成人午夜电影| 欧美三级欧美一级| 不卡一二三区首页| 久草中文综合在线| 日韩极品在线观看| 亚洲一区二区三区四区不卡| 国产精品美女www爽爽爽| 精品成人一区二区三区四区| 91精品中文字幕一区二区三区| 色综合一区二区| 国产不卡视频一区二区三区| 激情另类小说区图片区视频区| 午夜不卡av免费| 一个色在线综合| 亚洲丝袜自拍清纯另类| 国产精品三级av| 日本一区二区三级电影在线观看 | 欧美日韩一区二区三区不卡| 91在线国内视频| 成人少妇影院yyyy| 国产精品羞羞答答xxdd| 久久99日本精品| 久久国产精品露脸对白| 日韩电影在线免费观看| 午夜激情久久久| 日韩av电影天堂| 日韩av一级片| 美女视频网站久久| 美女在线一区二区| 免费观看30秒视频久久| 欧美aⅴ一区二区三区视频| 日韩电影一区二区三区四区| 三级影片在线观看欧美日韩一区二区| 亚洲成av人影院在线观看网| 亚洲3atv精品一区二区三区| 日韩高清一级片| 久久精品国产一区二区三| 国内精品视频一区二区三区八戒| 韩日欧美一区二区三区| 国产成人鲁色资源国产91色综| 国产91在线观看丝袜| 色综合婷婷久久| 欧美疯狂做受xxxx富婆| 26uuu精品一区二区| 欧美国产成人在线| 亚洲蜜桃精久久久久久久| 亚洲成人中文在线| 日本视频在线一区| 国产永久精品大片wwwapp | 日韩美女主播在线视频一区二区三区 | av电影在线观看一区| 日本高清不卡视频| 欧美一区二区三区性视频| 精品88久久久久88久久久| 国产精品久久久久久久久动漫| 夜夜爽夜夜爽精品视频| 日韩电影在线免费| 夫妻av一区二区| 欧美色网一区二区| 精品成人一区二区三区| 亚洲欧美日韩国产一区二区三区 | 国产91色综合久久免费分享| 色94色欧美sute亚洲13| 欧美一区二区三区在线视频| 中文字幕 久热精品 视频在线| 亚洲成人免费在线观看| 国产精品123| 欧美绝品在线观看成人午夜影视| 久久久久九九视频| 亚洲国产欧美日韩另类综合| 国产成人一区在线| 欧美夫妻性生活| 亚洲图片你懂的| 国产一区二区在线观看免费| 欧美性受xxxx| 国产精品久久三| 激情小说亚洲一区| 欧美日韩精品综合在线| 中文字幕一区三区| 国精品**一区二区三区在线蜜桃|