This document discusses techniques used by Patchguard, a mechanism in Windows 8.1 and 10 that protects the kernel from modifications. Patchguard uses code obfuscation, anti-debugging tricks, and periodic checksum validation to prevent unauthorized kernel patches. The document outlines various approaches that could be used to bypass Patchguard such as patching the kernel image, hooking functions, modifying checkers, or descheduling the context verification processes used by Patchguard. It provides details on specific functions and methods involved in Patchguard's context verification and suggests ways these could be descheduled to bypass the mechanism.