I have a question about the part "Integrity Challenge Mechanism" in "Design and Implementation of a TCG-based Integrity Measurement Architecture"
Assuming a situation like this, an compromised system extend PCR-11 with a measurement list of another (non-compromised) system. Then the compromised system uses "Integrity Challenge Protocol" that you described, but he uses PCR-11 and the measurement list of another (non-compromised) system.
How you deal the above situation???
Thank you very much.