Paper Reading Questions

For each paper, you should submit two text files via the Gradescope submission web site, as described below. The submission is due before lecture.

Lecture 4

Suppose an adversary steals a laptop that uses BitLocker disk encryption. In BitLocker's design, Windows has a key to decrypt the contents of the drive.

  1. What prevents the adversary from extracting this key from Windows?
  2. If the adversary cannot extract the key, what prevents him or her from simply using Windows to access files?