For example, an inside attacker who can physically access a trusted computing
platform may replace BIOS with a malign one, resulting in
BIOS failing to measure OSLoader. Another case is that an
attacker may change the firmware of a harddisk and insert
the computation ability into it so as to steal sensitive data [3].