\chapter{Introduction} All about motivation of doing this masterthesis \begin{itemize} \item introduction in project digidow \item privacy \item integrity \end{itemize} \chapter{Concept} The theoretical tool that should be formed to one whole system implementation in this thesis \section{Attack Vectors and Threat Model} \section{Trust and Security} \section{Systems of Trust} \subsection{Secure Boot, TXT, \ldots} \subsection{TPM1.2} \subsection{TPM2.0} \section{Verify Trust (DA and DAA)} \chapter{Handling Biometric Data} \section{Extend the Trust to External Hardware} \section{Mitigation of Attack Vectors} \chapter{Implemtentation and Limitations} \section{Trusted Boot} \section{Linux Kernel Integrity Tools} \chapter{Conclusion and Outlook} It is yet very hard to implement a system of this kind. The tools are available, but the documentation is not. I did at least figure out what a prototype can look like. \autoref{tab:example} is an example of a table, in which the numbers are aligned at the comma, every second line is colored and the commands \texttt{\textbackslash toprule}, \texttt{\textbackslash midrule} and \texttt{\textbackslash bottomrule} are used \cite{arthur15}. \begin{table}[ht] \centering \caption{Example} \label{tab:example} \rowcolors{2}{lightgray}{white} \begin{tabular}{SSS} \toprule \multicolumn{1}{c}{Länge $l$ in m} & \multicolumn{1}{c}{Breite $b$ in m} & \multicolumn{1}{c}{Höhe $h$ in m} \\ \midrule 12.454 & 1.24 & 335.3 \\ 543.22 & 32.123 & 33.21 \\ 353.0 & 33.0 & 33.0 \\ 23.3 & 333.2 & 32.4 \\ \bottomrule \end{tabular} \end{table}