hello all,
    I have a question about the part "Integrity Challenge Mechanism" in "Design and Implementation of a TCG-based Integrity Measurement Architecture"
    Assuming  a situation like this, an compromised system extend PCR-11 with a measurement list of another (non-compromised) system. Then the compromised system uses "Integrity Challenge Protocol" that you described, but he uses PCR-11 and the measurement list of another (non-compromised) system.
    How you deal the above situation???
    Thank you very much.