免费一级欧美片在线观看网站_国产一区再线_欧美日本一区二区高清播放视频_国产99久久精品一区二区300

COMP3217代做、Python/Java編程設(shè)計(jì)代寫

時(shí)間:2024-02-28  來源:  作者: 我要糾錯(cuò)



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標(biāo)簽:

掃一掃在手機(jī)打開當(dāng)前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關(guān)信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風(fēng)景名勝區(qū)
    昆明西山國家級風(fēng)景名勝區(qū)
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗(yàn)證碼平臺(tái) 理財(cái) WPS下載

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    免费一级欧美片在线观看网站_国产一区再线_欧美日本一区二区高清播放视频_国产99久久精品一区二区300
    欧美午夜宅男影院| 久久综合色鬼综合色| 视频一区视频二区中文| 91精品国产全国免费观看| 久久精品国产精品亚洲精品| 亚洲精品在线三区| 成人性色生活片免费看爆迷你毛片| 中文字幕久久午夜不卡| 91啦中文在线观看| 天堂成人国产精品一区| 精品欧美一区二区久久| 成人性视频网站| 亚洲九九爱视频| 欧美日韩高清一区| 黄一区二区三区| 国产精品久久免费看| 91国产精品成人| 日本女优在线视频一区二区| 久久久青草青青国产亚洲免观| 成人激情小说网站| 亚洲电影一级黄| 亚洲精品在线三区| 色综合婷婷久久| 爽爽淫人综合网网站| 久久久蜜臀国产一区二区| 91亚洲精品久久久蜜桃网站| 亚洲国产精品一区二区www| 日韩一区二区免费视频| 成人国产精品免费观看视频| 亚洲观看高清完整版在线观看| 欧美tickle裸体挠脚心vk| 成人av免费在线播放| 三级亚洲高清视频| 久久久精品免费免费| 91福利国产精品| 久久97超碰国产精品超碰| 日韩一区在线看| 欧美精品123区| 粉嫩久久99精品久久久久久夜 | 欧美草草影院在线视频| 99久久精品情趣| 麻豆极品一区二区三区| 自拍偷在线精品自拍偷无码专区| 欧美精品久久天天躁| 成人免费视频网站在线观看| 亚洲va韩国va欧美va| 国产欧美一区在线| 欧美日韩国产免费| 成人高清av在线| 奇米一区二区三区av| 亚洲色图都市小说| 精品美女一区二区| 在线观看亚洲a| 国产中文一区二区三区| 亚洲成人先锋电影| 中文字幕av一区 二区| 日韩视频在线一区二区| 色综合色狠狠天天综合色| 极品少妇xxxx精品少妇| 亚洲综合色丁香婷婷六月图片| 久久午夜羞羞影院免费观看| 在线观看中文字幕不卡| 看电影不卡的网站| 亚洲一级二级三级在线免费观看| 久久久蜜桃精品| 欧美夫妻性生活| 一本色道**综合亚洲精品蜜桃冫| 国产一区二区三区四区五区入口| 亚洲成人资源网| 国产精品麻豆视频| 欧美成人一区二区三区片免费| 欧美伊人久久大香线蕉综合69| 成人午夜激情在线| 国产一区二区三区不卡在线观看| 午夜视频一区在线观看| 国产精品美女一区二区三区| 欧美变态凌虐bdsm| 91麻豆精品国产91久久久久久久久| 色噜噜狠狠成人网p站| 麻豆91在线播放免费| 亚洲第一福利视频在线| 亚洲日本在线天堂| 欧美激情一区二区三区蜜桃视频| 日韩免费高清视频| 91麻豆精品国产91久久久久久久久 | 精品国产乱码久久久久久浪潮| 欧美日韩一区中文字幕| 色噜噜狠狠色综合中国| 99久久99久久精品国产片果冻| 国产精品一区二区在线播放| 久久精品国产秦先生| 日本欧美加勒比视频| 亚洲第一搞黄网站| 亚洲国产aⅴ成人精品无吗| 亚洲精品国产精品乱码不99| 中文字幕一区二区三区四区| 精品久久久久久久久久久久包黑料| 欧美日韩aaaaa| 欧美人狂配大交3d怪物一区| 欧美日免费三级在线| 欧美艳星brazzers| 欧美撒尿777hd撒尿| 欧美亚洲综合网| 欧美亚洲动漫精品| 欧美色男人天堂| 欧美午夜不卡视频| 欧美日韩高清在线| 欧美日韩精品欧美日韩精品一综合| 91官网在线免费观看| 欧美最猛黑人xxxxx猛交| jiyouzz国产精品久久| 国产91精品一区二区麻豆网站 | 黑人巨大精品欧美黑白配亚洲| 久久精品国产精品青草| 久久99精品久久久久久| 精品一区二区三区免费毛片爱| 精品一区二区av| 国产伦精一区二区三区| 国产成人av自拍| 成人高清免费在线播放| 色综合天天做天天爱| 在线观看网站黄不卡| 欧美日韩免费电影| 91精品国产综合久久小美女| 91麻豆精品国产无毒不卡在线观看| 日韩视频一区二区| 久久久www成人免费无遮挡大片| 国产日本欧洲亚洲| 亚洲欧美日韩中文字幕一区二区三区 | 欧美一区二区三区四区五区| 精品免费国产二区三区| 国产日产亚洲精品系列| 日韩精品中午字幕| 国产午夜亚洲精品羞羞网站| 国产三级三级三级精品8ⅰ区| 国产欧美日韩激情| 亚洲精选视频在线| 午夜精品久久久久久久久久| 免费在线观看成人| 国产成人一级电影| 91美女福利视频| 在线不卡中文字幕播放| 2021久久国产精品不只是精品| 国产精品美女久久久久av爽李琼| 亚洲乱码日产精品bd| 日韩精品福利网| 国产99久久久久久免费看农村| 91天堂素人约啪| 欧美性一级生活| 欧美电影影音先锋| 国产欧美精品国产国产专区| 一区二区三区高清| 日本亚洲天堂网| 国产精品一线二线三线精华| 色狠狠av一区二区三区| 91精品久久久久久久久99蜜臂| 久久午夜羞羞影院免费观看| 亚洲免费成人av| 欧美aⅴ一区二区三区视频| 丁香一区二区三区| 欧美亚一区二区| 久久婷婷一区二区三区| 亚洲精选一二三| 精一区二区三区| av中文一区二区三区| 欧美精品乱码久久久久久| 国产亚洲福利社区一区| 亚洲成人高清在线| 国产精品1区2区| 欧美三级韩国三级日本三斤| 久久久亚洲高清| 亚洲高清免费在线| 国产成人av电影| 欧美日韩国产一级片| 国产色综合久久| 午夜欧美在线一二页| 不卡在线视频中文字幕| 91精品啪在线观看国产60岁| 国产精品理论在线观看| 人人超碰91尤物精品国产| av网站一区二区三区| 日韩欧美的一区| 一区二区三区不卡在线观看| 国产一区二区三区免费| 欧美三级在线播放| 中文字幕va一区二区三区| 蜜臂av日日欢夜夜爽一区| 91麻豆精品秘密| 久久久综合九色合综国产精品| 亚洲国产日韩av| 播五月开心婷婷综合| 欧美v国产在线一区二区三区| 一区二区三区日韩精品| 粉嫩av一区二区三区| 日韩一级成人av| 亚洲妇女屁股眼交7| 91在线观看免费视频| 2021久久国产精品不只是精品| 天天综合天天做天天综合| 色综合久久综合|