Recon 2024

JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and DCI/EXDI
06-29, 14:00–15:00 (US/Eastern), Grand Salon

For the first time, JTAG debugging tools for x64 are available to the general public. Using EXDI to connect WinDbg with the SourcePoint debugger, and Intel Direct Connect Interface (DCI) on the AAEON UP Xtreme i11, Windows Hyper-V and Secure Kernel can be debugged as never before. This presentation and demonstration will cover run-control, VMM breakpoints, Intel Processor Trace, Architectural Event Trace and other new technologies on an off-the-shelf HV/SK/VBS enabled target.

See also: Charts for "JTAG debug of Windows Hyper-V / Secure Kernel with WinDbg and DCI/EXDI" (1.8 MB)

Ivan Rouzanov is a seasoned software engineer with over three decades of experience, focusing on debugging software within the Windows environment. Throughout his career, he has had the privilege of contributing his expertise to esteemed tech companies such as Microsoft, CrowdStrike, and Intel. With a genuine passion for untangling the intricate web of software bugs, Ivan has debugged and resolved numerous issues, amassing a wealth of experience along the way. He is dedicated to continuous learning and improvement, and firmly believes in sharing knowledge!

Although he does have a day job, Alan Sguigna has been moonlighting for 10+ years doing JTAG debug of UEFI targets. Having tired of that, he convinced a bunch of developers to enhance their existing UEFI tools to debug the Windows kernel as well, including Hyper-V and VBS-enabled targets.
Author of The MinnowBoard Chronicles and a prolific blogger on technical topics, Alan enjoys simplifying complex topics, and making knowledge accessible to all.

This speaker also appears in: