Mobile threat defense agents could detect unauthorized operating system modifications by using attestation.