(b )Tampering: an attacker may maliciously tamper the measurement information, and then resends the tampered information to TPM. (c )Masquerading: an attacker may send the measurement information of another device which is not compromised to TPM.
(b )Tampering: an attacker may maliciously tamper themeasurement information, and then resends the tamperedinformation to TPM.(c )Masquerading: an attacker may send the measurementinformation of another device which is not compromised toTPM.