- Learning iOS Penetration Testing
- Swaroop Yermalkar
- 190字
- 2021-07-23 14:49:16
iOS secure boot chain
The iOS secure boot chain system uses secure boot chain mechanism to provide security in the booting process. We have seen many rootkits and malware that infect at boot level. The iOS secure boot chain ensures that low-level software is not compromised and iOS is running on validated iDevice.
The following figure is the block diagram for an iOS secure boot chain:

Let's study iOS secure boot chain step by step, as follows:
- Boot ROM
- This is implicitly trusted
- It is known as a hardware root of trust
- This code is contained in the processor and cannot be updated or changed
- This also contains the Apple root certificate with authentic public key and uses it to verify that the low-level boot loader is properly signed and has not been tampered before loading
- Low-level boot loader
- This is the lowest level of code that can be updated
- It also verifies the signatures of firmware of iBoot before loading it
- iBoot
- It verifies the signature of the iOS kernel before starting the kernel
- This secure boot chain also prevents any malwares that can affect at the boot level
推薦閱讀
- DevOps:軟件架構師行動指南
- Mastering Concurrency Programming with Java 8
- Google Flutter Mobile Development Quick Start Guide
- 零基礎學Visual C++第3版
- Learning Cython Programming(Second Edition)
- vSphere High Performance Cookbook
- JavaFX Essentials
- 少年輕松趣編程:用Scratch創作自己的小游戲
- Mastering Python Scripting for System Administrators
- 薛定宇教授大講堂(卷Ⅳ):MATLAB最優化計算
- 零基礎學Java程序設計
- 概率成形編碼調制技術理論及應用
- R Deep Learning Cookbook
- Integrating Facebook iOS SDK with Your Application
- Kubernetes源碼剖析