For our experiment, we used the TPM simulator provided by Microsoft and conducted few security attacks to analyze the behavior of the protocol for the following threat models