Question

The ARM implementation of the JTAG standard for this task replaces the TDI and TDO pins with the single bidirectional pin SWDIO. The Morris worm exploited a command injection in a Unix sendmail mode intended for this purpose. This task can be performed using the netlist insertion method, in which an integrated logic analyzer traces the post-synthesis netlist. The x command in one tool for this task executes PEEKTEXT and POKETEXT using the Unix system call (*) ptrace. IBM Purity is often used to perform this task for memory occurrences, while gdb and lldb (10[1])are more general tools (-5[1])for performing this task. This task can be primitively performed on hardware by inserting breakpoints between instructions or by single-stepping. For 10 points, name this process of removing errors from code. (10[1])■END■

ANSWER: debugging [accept fixing code or finding code errors until “removing errors” is read; accept control flow analysis; prompt on probing; reject “validation” or “verification”]
<KJ, Other Science>
= Average correct buzz position

Back to tossups

Buzzes

PlayerTeamOpponentBuzz PositionValue
Ryan SunBerkeley BStanford9210
Eve FleisigBerkeley ABerkeley Past96-5
Shahar SchwartzBerkeley PastBerkeley A12710