ABSTRACT

The process of starting a smart device and putting it into a state of readiness for operation is known as the boot process. Also important in this process is the system partition, which is the partitioning of the disk volume containing hardware-specific files that are needed to boot the operating system. A verified boot ensures the integrity of the smart device software starting from a hardware root of trust up to the system partition. Malware with root privileges can avoid detection programs and otherwise mask themselves. The malware can accomplish this because it is often more privileged than the detectors, allowing the software to misrepresent itself to detection programs. During a secure booting process, each phase confirms the integrity of the next phase before executing it. Android calls this feature a verified boot, while Apple’s iOS refers to their fairly similar feature as the secure boot chain. This process helps safeguard that the lowest levels of software have not been altered or compromised by malware. Apple iOS and Android take different approaches to responding to errors that are found during the secure boot process.