Category: Software Debug and Trace

Security through obscurity is not a meaningful means to mitigate malevolent attacks. With the greater forensics capabilities offered by At-Scale Debug (ASD), how are platforms protected?
In Episode 12, I wrote a simple โ€œHello World!โ€ application in โ€˜Cโ€™ using the built-in UEFI shell functions. In Episode 13, I failed in an attempt to re-write that application using standard โ€˜Cโ€™ library functions, such as printf(). Iโ€™ve learned a lot since then โ€“ hereโ€™s how to write more sophisticated programs.
Archives