Question

The ARM implementation of the JTAG standard for this task replaces the TDI and TDO pins with the single bidirectional pin SWDIO. The Morris worm exploited a command injection in a Unix sendmail mode intended for this purpose. This task can be performed using the netlist insertion method, in which an integrated logic analyzer traces the post-synthesis netlist. The x command in one tool for this task executes PEEKTEXT and POKETEXT using the Unix system call (*) ptrace. (10[1])IBM Purity is often used to perform this task for memory occurrences, while gdb and lldb (10[1])are more (10[1])general tools for performing this task. This task can be primitively performed on hardware by inserting breakpoints between instructions or by (-5[1])single-stepping. For 10 points, name this process of removing errors from code. (10[1])■END■

ANSWER: debugging [accept fixing code or finding code errors until “removing errors” is read; accept control flow analysis; prompt on probing; reject “validation” or “verification”]
<KJ, Other Science>
= Average correct buzz position

Back to tossups

Buzzes

PlayerTeamOpponentBuzz PositionValue
Ned TagtmeierChicago ASIUE7610
Yash MandaviaIllinois OrangeChicago B9210
David NickelPurdue BNotre Dame9410
Matthew WestleyPurdue AIllinois Blue115-5
Shardul ParthsarathyIllinois BluePurdue A12710