免费一级欧美片在线观看网站_国产一区再线_欧美日本一区二区高清播放视频_国产99久久精品一区二区300

COMP3217代做、Python/Java編程設(shè)計(jì)代寫

時(shí)間:2024-02-28  來源:  作者: 我要糾錯(cuò)



COMP3217 University of Southampton
Assignment 1: Trusted Computing
Set: 16/02/2024, Due: 22/03/2024
The assignment at hand is concerned with secure boot and trusted platform modules (TPM), and
draws upon the content covered in the lectures and previous labs. This is an individual assignment
that carries a weightage of 50% towards the overall module grade. You will be assessed on your
ability to demonstrate your understanding of trusted computing and benefits of applying trusted
computing to today’s computing platforms.
Marks Breakdown
50 Mark For all tasks. Which is broken down into:
5 Mark: For clarity of your description.
15 Mark: For Part-1 (breakdown below)
15 Mark: For Part-2 (breakdown below)
15 Mark: For Part-3 (breakdown below)
Submission Instructions
Please submit a report to this link https://handin.ecs.soton.ac.uk. Your report must be submitted
in PDF format.
Deadline
The assignment deadline is on 22/3/2024
Experimental Setup
We will be utilizing the same lab setup. While you are not required to submit any code, we highly encourage
you to confirm the validity of your solution by employing the simulated TPM we used in the lab.
1
COMP3217 University of Southampton
1 Part 1 - Trusted Platform Module (15 marks)
A Trusted Platform Module (TPM) is a dedicated hardware component that provides secure storage and
processing of cryptographic keys and other sensitive information. The TPM is a microcontroller that
resides on the motherboard of a computer and interacts with the system firmware to ensure that the
system remains in a trusted state during boot-up and operation. The TPM can be used for various security
purposes, including secure boot, disk encryption, and digital rights management. It includes features such
as random number generation, cryptographic functions, and secure storage of secrets. The TPM is designed
to be tamper-resistant, so it can protect sensitive information even if an attacker gains physical access to
the computer. This standardized technology was developed by the Trusted Computing Group (TCG) and is
widely used in modern computers and other devices. In our lab, we used a software TPM and implemented
remote attestation using TPM2 Quote and TPM2 PCRs.
1. Highlight four differences between TPM1.2 and TPM2.0. What are the major difference between
the two? (2 Marks)
2. Can you explain the difference between the Endorsement Hierarchy and the Storage Hierarchy? (2
Marks)
3. Can you give an example of how to generate a key that is exclusively intended for encryption and
cannot be utilized for signing? (2 Marks)
4. In a virtualized environment, TPM 2.0 can be used by multiple users. How does TPM 2.0 maintain
isolation between these users? Additionally, is it possible for each user to own their respective
hierarchies? (2 Marks)
5. You have decided that remote attestation is an essential feature and want to utilize it on your laptop.
(7 Marks)
(a) Can you describe which measurements you would store within TPM Volatile PCRs, and why
you would use those particular PCRs?
(b) Can you describe which TPM2 Quote command you would use and what arguments you would
include in the command?
(c) You have received a TPM2 quote on your laptop and are using the tools you learned in the lab
to parse and verify it. Which data from the quote would you examine and why?
(d) To utilize remote attestation, users must implement a protocol between their device and the
verifier. The lab notes provide a detailed explanation of this protocol. As part of this process,
the "verifier" sends a nonce. Why is this necessary? Additionally, can you propose a method to
ensure that this nonce is distinct from other nonces that the TPM has used within the previous
five days?
2 Part 2- Secure Boot (15 Marks)
Part 1 is concerned with secure boot and methods used to implement secure boot.
1. Can you provide a brief description of what secure boot is and explain why it is necessary? (1 Mark)
2. If you are considering buying a laptop with secure boot enabled, it’s essential to understand the
potential threats that it can prevent. Can you list five different types of threats, three different
adversaries, and three types of attacks that could occur if secure boot is not implemented?(2 points)
3. "Secure boot" is also referred to as "verified boot." Can you explain the difference between verified
boot and measured boot? Additionally, can you explain which approach is superior and provide
supporting reasons for your choice? (2 points)
2
COMP3217 University of Southampton
4. An engineer is designing a new system and intends to implement the latest and greatest security
measures for secure boot. The engineer is examining the hardware and software requirements necessary to create a robust secure boot solution. Additionally, the engineer has a functional requirement
of a boot time of one second. The one second is measured from the time you power on the device
until booting the application. The following describes the boot flow:
bootloader1->bootloader2->middileware->OS->application
Help the engineer by answering the following questions. (10 points)
(a) Which cryptographic ciphers should the hardware and software support? (2 Marks)
(b) Does the engineer require a root of trust? What is the purpose of a root of trust and why is it
necessary? (2 Marks)
(c) What storage requirements are necessary for a root of trust? Is the storage within the root of
trust volatile or non-volatile? Explain your answer. (2 Marks)
(d) How many cryptographic keys are required for the secure boot process? (2 Marks)
(e) In the lectures, you have learned about internal root-of-trust, which is when the root of trust is
embedded within the CPU. However, the engineer has found a CPU that suits the performance
he is looking for, but it does not have root-of-trust or the necessary hardware to implement
secure boot. Can you suggest some alternative options for him? (2 Marks)
(f) Following the previous question, can you describe the steps involved in verifying the bootloader1
starting from the moment the user presses the power on button until bootloader1 hands over
execution to bootloader2? (2 Marks)
3 Part 3- UEFI (15 Marks)
UEFI stands for "Unified Extensible Firmware Interface." It is a specification for firmware that operates as a
replacement for the traditional BIOS (Basic Input/Output System) firmware on modern computers. UEFI
provides a layer of software between the operating system and the firmware, enabling advanced features
such as secure boot and faster boot times. It also supports larger hard drives and partitions, as well as more
modern technologies like touchscreens and network booting. UEFI was developed by the UEFI Forum, a
group of industry leaders, and is widely adopted by major computer manufacturers. In the lectures, you
have seen a Black Hat talk that explains UEFI and possible attacks on UEFI. A link to the talk is available
on the noteswiki, and it will help you answer the following questions.
1. Who verifies the integrity of UEFI on Intel platforms (as mentioned in the lectures)? (1 Marks)
2. Where is UEFI normally stored on laptop devices? (2 Marks)
3. Where are the keys used by UEFI stored and who has direct access to them? (3 Marks)
4. Can the OS access UEFI keys location directly? why? (3 Marks)
5. How does the UEFI specification address revocation? Can you guarantee that a specific cryptographic
key is never used in the secure boot process? (3 Marks)
6. If you were to attack the implementation of UEFI secure boot and you had the option to delete
exactly one key (that is used by UEFI), which key would you choose to delete? (3 Marks)
請加QQ:99515681  郵箱:99515681@qq.com   WX:codehelp 

標(biāo)簽:

掃一掃在手機(jī)打開當(dāng)前頁
  • 上一篇:代寫CS 7638: Artificial Intelligence for Robotics
  • 下一篇:代寫ENGINEERING 2125編程 Decision Making
  • 無相關(guān)信息
    昆明生活資訊

    昆明圖文信息
    蝴蝶泉(4A)-大理旅游
    蝴蝶泉(4A)-大理旅游
    油炸竹蟲
    油炸竹蟲
    酸筍煮魚(雞)
    酸筍煮魚(雞)
    竹筒飯
    竹筒飯
    香茅草烤魚
    香茅草烤魚
    檸檬烤魚
    檸檬烤魚
    昆明西山國家級風(fēng)景名勝區(qū)
    昆明西山國家級風(fēng)景名勝區(qū)
    昆明旅游索道攻略
    昆明旅游索道攻略
  • 短信驗(yàn)證碼平臺(tái) 理財(cái) WPS下載

    關(guān)于我們 | 打賞支持 | 廣告服務(wù) | 聯(lián)系我們 | 網(wǎng)站地圖 | 免責(zé)聲明 | 幫助中心 | 友情鏈接 |

    Copyright © 2025 kmw.cc Inc. All Rights Reserved. 昆明網(wǎng) 版權(quán)所有
    ICP備06013414號-3 公安備 42010502001045

    免费一级欧美片在线观看网站_国产一区再线_欧美日本一区二区高清播放视频_国产99久久精品一区二区300
    国产精品资源在线看| 91久久国产最好的精华液| 国产欧美日韩亚州综合 | 美女爽到高潮91| 26uuu亚洲综合色| 顶级嫩模精品视频在线看| 1区2区3区国产精品| 欧美性三三影院| 欧美aaa在线| 久久久久成人黄色影片| 99久久精品国产一区| 一区二区三区久久久| 777色狠狠一区二区三区| 九一九一国产精品| 国产精品美女久久久久aⅴ| 色噜噜狠狠一区二区三区果冻| 亚洲成a人片在线不卡一二三区| 日韩一区二区精品| 粉嫩欧美一区二区三区高清影视| 亚洲人一二三区| 欧美性三三影院| 激情亚洲综合在线| 亚洲欧洲成人精品av97| 欧美日韩一区二区三区四区五区| 久久99久久久久| 国产精品美女久久久久av爽李琼| 欧美日韩一区小说| 国产一区二区久久| 亚洲黄色小视频| 日韩欧美的一区二区| www.av亚洲| 日本午夜一本久久久综合| 国产欧美日韩激情| 欧美特级限制片免费在线观看| 精品在线你懂的| 亚洲精品五月天| 欧美r级电影在线观看| 99精品视频免费在线观看| 日韩电影在线免费看| 国产欧美va欧美不卡在线| 欧美视频三区在线播放| 国产精品99久久久| 香蕉影视欧美成人| 日本一区二区三区在线不卡| 欧美日韩一区精品| 成人精品在线视频观看| 亚洲高清免费视频| 欧美极品xxx| 91精品在线免费| 99久久免费国产| 久久99精品国产麻豆婷婷洗澡| 亚洲三级视频在线观看| 精品国产乱码久久| 欧美日韩一区二区欧美激情| 国产91丝袜在线18| 免费美女久久99| 亚洲色图清纯唯美| 久久久国产精品午夜一区ai换脸| 欧美日韩色一区| 北条麻妃一区二区三区| 久久99国产精品久久| 亚洲夂夂婷婷色拍ww47 | 亚洲国产综合视频在线观看| 国产日韩影视精品| 日韩一级精品视频在线观看| 91激情五月电影| 东方aⅴ免费观看久久av| 另类小说色综合网站| 亚洲一区二区三区国产| 国产精品久久毛片| 精品日韩欧美一区二区| 欧美日韩高清一区二区三区| 97久久超碰国产精品| 国产ts人妖一区二区| 麻豆成人免费电影| 香蕉av福利精品导航| 亚洲色图欧洲色图| 国产精品美女久久久久久| 精品国产电影一区二区| 欧美一级在线视频| 欧美日韩一区视频| 日本道精品一区二区三区| 成人不卡免费av| 国产一区视频导航| 美美哒免费高清在线观看视频一区二区 | 一本在线高清不卡dvd| 国产a精品视频| 国内成人免费视频| 免费看黄色91| 天天综合天天综合色| 亚洲主播在线观看| 亚洲激情一二三区| 日韩理论片一区二区| 国产精品美女久久久久久| 久久精品欧美日韩| 久久女同互慰一区二区三区| 精品成人一区二区三区四区| 欧美哺乳videos| 欧美一卡二卡在线观看| 这里只有精品视频在线观看| 欧美军同video69gay| 欧美色区777第一页| 欧美色老头old∨ideo| 欧美无乱码久久久免费午夜一区| 在线视频国内自拍亚洲视频| 在线一区二区三区四区五区 | 一区二区视频免费在线观看| 亚洲三级小视频| 亚洲欧美欧美一区二区三区| 亚洲欧美一区二区不卡| 亚洲女同ⅹxx女同tv| 伊人开心综合网| 亚洲精品国产成人久久av盗摄| 亚洲另类在线视频| 亚洲一区二区三区四区在线 | 国产精品你懂的| 国产精品国产三级国产普通话三级| 国产欧美一区二区三区在线看蜜臀| 国产亚洲欧美激情| 中文字幕乱码日本亚洲一区二区 | 亚洲精品ww久久久久久p站| 一区二区三区精品在线| 亚洲国产一区二区三区青草影视| 亚洲无人区一区| 日一区二区三区| 久久99九九99精品| 国产精品99久久久久久宅男| 不卡一卡二卡三乱码免费网站| 99re这里只有精品首页| 91成人在线精品| 欧美精品久久天天躁| 欧美成人乱码一区二区三区| 久久人人超碰精品| 国产精品白丝在线| 一级女性全黄久久生活片免费| 午夜久久久影院| 老汉av免费一区二区三区| 国产精品影视网| av激情综合网| 欧美色倩网站大全免费| 日韩免费性生活视频播放| 久久久精品国产免大香伊| 成人免费一区二区三区视频| 亚洲国产日日夜夜| 老司机午夜精品| 成人动漫在线一区| 欧美视频一区在线| 精品日韩一区二区三区 | 日本欧美一区二区三区乱码| 国内久久婷婷综合| 99久久久精品免费观看国产蜜| 欧美日韩极品在线观看一区| 精品国产凹凸成av人网站| 国产精品久久久久四虎| 亚洲成av人片一区二区三区| 久久精品国产澳门| 不卡的av在线| 欧美精品乱码久久久久久 | 成人免费小视频| 日韩一区精品视频| 国产成人鲁色资源国产91色综| 色噜噜狠狠成人中文综合| 日韩一本二本av| 国产精品久久久99| 日韩成人伦理电影在线观看| 成人深夜在线观看| 欧美男人的天堂一二区| 久久精品日韩一区二区三区| 一区二区三区av电影| 精品在线播放午夜| 色一情一乱一乱一91av| 精品国产电影一区二区| 亚洲精品免费一二三区| 狠狠色丁香九九婷婷综合五月| 91老师国产黑色丝袜在线| 日韩欧美国产成人一区二区| 亚洲日本va午夜在线影院| 久久不见久久见中文字幕免费| 91免费精品国自产拍在线不卡 | 91精品国产aⅴ一区二区| 亚洲欧美影音先锋| 蜜臀国产一区二区三区在线播放| 不卡影院免费观看| 精品久久久三级丝袜| 一级日本不卡的影视| 丁香六月久久综合狠狠色| 欧美夫妻性生活| 亚洲欧美另类在线| 国产高清精品网站| 欧美男同性恋视频网站| 最新久久zyz资源站| 国产一区高清在线| 欧美日本在线一区| 亚洲婷婷综合久久一本伊一区| 精品午夜久久福利影院| 欧美日韩国产精选| 亚洲人成网站影音先锋播放| 国产乱色国产精品免费视频| 91精品国产综合久久精品麻豆| 亚洲青青青在线视频|