Chip Security Testing 
Binary Security Analysis 
Resources 
Blog
Contact us
Back to all articles
Binary Analysis

Updated Analysis of PatchGuard on Microsoft Windows 10 RS4

1 min read
Edit by Marc Rambert • Mar 8, 2019
Share

Since Windows 64b, PatchGuard has been of great interest in Windows security. In this white-paper, you will access our research done using esReven v2.

 

BANNER_End_2.png

 

For most iterations of its development, several people have analyzed its main mechanisms and internals which, many times, led to a functional bypass. Researchers seem to agree on one thing: bypassing PatchGuard will always be theoretically possible since it runs at the same level as a driver. Which seems true, theoretically. That said, just like vulnerability exploit isn’t about NOP-sled anymore, bypassing PatchGuard isn’t about hooking KeBugCheck anymore.

This paper will present a complete overview of PatchGuard mechanisms, from the initialization to the Blue Screen Of Death, and insights about how we implemented a driver able to disable it. Especially, this research has been conducted using timeless analysis with eShard’s tool esReven. Not a single debugger was used during this entire analysis.

 

BANNER_End_1.png TETRANE is now eShard

 

Share

Categories

All articles
(108)
Binary Analysis
(57)
Chip Security
(43)
Corporate News
(18)
Expert Review
(6)
Time Travel Analysis
(13)

you might also be interested in

Chip Security

The backup superhero of Post-Quantum Cryptography

8 min read
Edit by Jad Zahreddine • Oct 24, 2025
CopyRights eShard 2026.
All rights reserved
Privacy policy | Legal Notice
CHIP SECURITY
esDynamicExpertise ModulesInfraestructureLab Equipments