Problem 1: Code Attestation and Trusted Computing

a) How can we potentially use code attestation and trusted computing to secure cloud computing?
b) How does this trusted-hardware based approach compare with cryptographic approaches that we've discussed so far? What are the pros and cons of each approach?
c) Can you contrast the IMA paper and the Flicker paper, and discuss the pros and cons of each approach?