This article'stone or style may not reflect theencyclopedic tone used on Wikipedia. See Wikipedia'sguide to writing better articles for suggestions.(January 2009) (Learn how and when to remove this message) |
| SoftICE | |
|---|---|
| Original author | NuMega |
| Developer | Compuware |
| Initial release | 1987; 38 years ago (1987) (DOS) |
| Final release | |
| Operating system | Microsoft Windows |
| Type | Debugger |
| License | Proprietary |
SoftICE is akernel modedebugger forDOS andWindows up toWindows XP. It is designed to run underneath Windows, so that theoperating system is unaware of its presence. Unlike an application debugger, SoftICE is capable of suspending all operations in Windows when instructed. Due to its low-level capabilities, SoftICE is also popular as asoftware cracking tool.
Microsoft offers two kernel-mode debuggers,WinDbg and KD, without charges. However, the full capabilities of WinDbg and KD are available only when two interlinked computers are used. SoftICE, therefore, is an exceptionally useful tool for difficult driver-related development. The last released version was for Windows XP.
Older versions exist for DOS and compatible operating systems. SoftICE was originally produced by the companyNuMega, and was subsequently acquired byCompuware in 1997, which in turn sold the property toMicro Focus in 2009. Currently, Micro Focus owns thesource code and patents, but is not actively maintaining SoftICE.
"Soft" refers to software, and "ICE" is anallusion toin-circuit emulator.
The originalSoftICE for DOS was written in 1987 by NuMega founders Frank Grossman and Jim Moskun. The program, written in80386assembly language, played the role of an operating system and ran software invirtual 8086 mode. It sold for $386.
SoftICE/W (for Windows) was developed in the 1990s, and was instrumental in the Writing of "Undocumented Windows", by Andrew Schulman, David Maxey andMatt Pietrek. SoftICE/W was derived from an earlier, lesser known product,SoftICE forNetWare (32-bitprotected mode). One of the key advantages it had over Microsoft's debuggers is that it enabled single machine debugging, rather than requiring a second machine to be connected over a serial port.
The principal developers of SoftICE were Dom Basile ('Mr. SoftICE'), Tom Guinther (Kitchen Sink, Symbol Engine), Gerald Ryckman (Video drivers andKitchen Sink), Ray Hsu (Video drivers forWindows 95), and Dan Babcock (SoftICE/NT 3.1/3.5: Universal video driver, symbol engine), with contributions by a variety of NuMega developers including Frank Grossman, Jim Moskun and Matt Pietrek.
In 1998, thecodebase forSoftICE/95 was ported to run on theWindows NT platform.
Newer versions of SoftICE patch deep into Microsoft Windows. As such, old versions of SoftICE are rarely compatible with new versions of Windows. Compuware therefore offered SoftICE as a subscription so that it could be kept up to date and in sync with the latest Microsoft Windows version.
SoftICE was previously offered as part of Compuware's DriverStudio package, but was discontinued in April 2006.
As of April 3, 2006, the DriverStudio product family has been discontinued because of "a variety of technical and business issues as well as general market conditions". Maintenance support was offered until March 31, 2007.
Software vendors have put in place a wide range of countermeasures to protect themselves from people employing SoftICE as a tool to analyse software.
For example, here is code some vendors used to detect the presence of SoftICE running in the same machine as an early countermeasure:
moveax,dwordptr[pIDT+2]; eax -> IDTaddeax,8; eax -> int 1 vectormovebx,[eax]; ebx == int 1 vectoraddeax,16; eax -> int 3 vectormoveax,[eax]; eax == int 3 vectorandeax,0FFFFh; strip the selectorandebx,0FFFFh; part of itsubeax,ebx; find displacementcmpeax,10hjneHackedVector; not equal, then chances are; SoftICE had tampered with these vectors
More and better such measures have evolved since. While most of them can only deter the less experienced and determined hackers, SoftICE is no longer a tool of choice for someone new to analysing software.
Modern software anti-analysis methods are based on more sophisticated packers/protectors, e.g. Themida, Armadillo or ASProtect which pack the program code and tamper with entry point addresses so it is hard to find the program's original entry point (OEP). That is also true for the program'simport address table (IAT). However, tools for hiding SoftICE are also available, such as IceStealth and IceExt for Windows NT, or Icedump and IcePatch forWindows 9x.[2]
In 1989,BYTE listed Soft-ICE among the "Distinction" winners of the BYTE Awards, stating that, "If you're developing8086-based applications on an 80386 machine, this is an essential and affordable tool".[3]
A commercialkernel-level debugger called Syser claims to continue where SoftICE left off.
Ashareware debugger, but free to use,OllyDbg is a32-bit assembler-level debugger from Oleh Yuschuk. However, it can only be used for user-mode debugging.
An open source kernel debugger similar to SoftICE namedRasta Ring 0 Debugger (RR0D) is available.[4][5] It provides low-level debugging forMicrosoft Windows,Linux,OpenBSD,NetBSD, andFreeBSD. This project does not seem to be actively maintained. As of June 2016[update], the last change in itsGitHubsource code repository occurred in December 2008.[6]
A debugger called BugChecker is a 32-bit single-host kernel debugger forWindows 2000 and XP, developed and made available as open source for educational purposes. BugChecker allows users to trace into both user and kernel code, both on uniprocessor andmultiprocessor versions of Windows 2000 and XP.[7]
A modern successor to SoftICE named BugChecker (unrelated to the one mentioned above) was released by Vito Plantamura in 2023. Unlike the other local kernel debuggers, it supports Windows XP to Windows 11, both 32-bit and 64-bit. To achieve this, the debugger spoofs the machine as being debugged by a second system by intercepting serial cable communication, and then and draws its display directly to theframebuffer. This method significantly improves stability and compatibility compared to previous approaches, including that of SoftICE itself.[8]
Many hypervisors allow debugging the kernel running in thevirtual machine through exposing some kind of debugger interface that can control thevirtualized processor directly. This allows debugging even if the kernel does not have native debugging facilities.