@nesivos don't get confused here...
>>> that UEFI thing has absolutely nothing to do with the lines of code blocking software like Avast in Windows 8. UEFI is not a Windows 8 feature, Windows 8 supports UEFI, which is different. UEFI is implemented at bios level to prevent unwanted stuff from loading when you start your system. UEFI isn't available yet on many motherboards. By supporting UEFI, Windows 8 offers manufacturers the opportunity to implement a hard coded key for Windows 8 (authentication of genuine software for instance) in the motherboard bios chip, hardly related to blocking anything Avast related 
ps: this can be an issue for Linux bootloaders, especially for most distros who have almost no mean to acquire a trusted key.
1. UEFI replaces the BIOS
2. The authentication is not hard coded. It is programed into Firmware that is what the third letter in UEFI stands for. Since it is programmed in firmware it can be changed and updated with a simple software update.
3. W8 uses UEFI to prohibit rootkits especially kernal-mode rootkits. UEFI through authentication prevents unapproved changes to the loader and the software that loads before the operating system loads.
I am not familiar with the technical aspects of Avast products but ISTM that the issue here could be the design of the UEFI and how it handles kernal-mode rootkits along with design of W8 to take advantage of the UEFI security features. The biggest security improvement in W8 is in the root-kit area. Taking advantage of the UEFI design MSFT claims that W8 will prevent kernal-mode rootkits.
When I attempted to load AIS on my W8 DP OS the OS crashed. When it attempted to reboot it crashed again and again but not before displaying an error message that the kernal was corrupted or some such thing like that.
So ISTM that it is not just a simple matter of getting authentication but has more to do with the redesign of the Window kernal.