From the course: iOS Development: Security

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

The Secure Boot

The Secure Boot - iOS Tutorial

From the course: iOS Development: Security

Start my 1-month free trial

The Secure Boot

- [Instructor] Security in iOS starts when switching on your device. That's the earliest point to prevent possible threats. There is a range of known malware and rootkits specifically designed to infect at boot level. During the initial boot-up sequence, the secure boot chain mechanism ensures that only legitimate software gets loaded. Each low-level software component is cryptographically signed by Apple. The system verifies these components one by one, and it interrupts the startup process if any of them was compromised. This integrity check, called the chain of trust, is a sequence of steps where each step ensures that the next step was signed by Apple. The boot process starts by loading the code from the Boot ROM. This code gets burnt into the chip in the factory and can't be changed after that. The Boot ROM holds Apple's public key. The system uses the public key to verify that the Apple bootloader is signed with Apple's private key. If it passes the validation, iBoot verifies…

Contents