Solve any one question.Q.1(a,b) and Q.2(a,b)
1(a)
Explain in brief eBay dato breach.
6 M
1(b)
Explain the need for Trusted Execution environment.
4 M
2(a)
Explain the pros and cons of embedded security and management engine.
6 M
2(b)
Explain the Boot Integrity.
4 M
Solve any one question.Q.3(a,b) and Q.4(a,b)
3(a)
Explain in detail memory protection control for threat analysis and mitigation in security and management engine.
6 M
3(b)
Explain any Digital Signature Algorithm.
4 M
4(a)
Explain in detail the working of SIGMA protocol.
6 M
4(b)
Explain the building blocks of the security and the management engine.
4 M
Solve any one question.Q.5(a,b) and Q.6(a,b)
5(a)
Explain the different types of boot attacks.
8 M
5(b)
Explain in detail EPID with its working and components.
8 M
6(a)
Explain how software can use a Trusted platform module to authenticate hardware devices.
8 M
6(b)
Compare Integrated Vs. Discrete TPM.
8 M
Solve any one question.Q.7(a,b,c)and Q.8(a,b,c)
7(a)
Expalin in detail the closed-Door Model.
6 M
7(b)
Explain DAL architecture with neat diagram.
6 M
7(c)
Explain in brief BIOS alteration.
6 M
8(a)
Explain in detail HDCP (High bandwidth digital contention protection)?
6 M
8(b)
Explain dynamic Application loader with neat diagram.
6 M
8(c)
Explain field programmable fuses.
6 M
Solve any one question.Q.9(a,b) and Q.10(a,b)
9(a)
Explain the High level security requirement for IoT?
8 M
9(b)
Explain the security framework for embedded securiy in IoT.
8 M
10(a)
Explain in detail IoT reference architecture.
8 M
10(b)
Explain the building blocks for Embedded Security.
8 M
More question papers from Embedded Systems