Alex Ionescu’s Blog Windows Internals, Thoughts on Security, and Reverse Engineering Anyone reversing “Windows 8” will now find a non-familiar piece of code, whenever a list insertion operation is performed on a LIST_ENTRY: .text:00401B65 mov edx, [eax] .text:00401B67 mov ecx, [eax+4] .text:00401B6A cmp [edx+4], eax .text:00401B6D jnz SecurityAssertion .text:00401B73 cmp [ecx], eax .text:00401B75