IV. INTEGRITY MEASUREMENT PROTOCOL
As the self measurement process of platform hardware
shows. In the following, we'll explain step two and step three
in turn.
Step two aims to perform the self-measurement, and then
deliver the self-measurement information to TPM while
protect this information from being tampered with. So, three
kinds of attacks must be prevented so as to ensure what TPM
receives is trusted:
(a)Replay attack: an attacker may intercept the measurement
information, and then resends the measurement result
before the hardware is compromised to TPM.