c++ - Security Of Dynamic Loaded DLL -


i want design simple security system via rolling code system time in dll file. dll have 1 exported function "bool result()" return true or false main application when called. dll loaded dynamically main application "loadlibrary(...)" method , function call after.

but don't have knowledge on hacking , code security.

that's question: can hacker see i'm doing inside dll function operation performed decide result, or can change result i'm returning dynamically loaded dll?

in order understand , write shared libraries, important go though how loader , elf format interact.

the article found helpful ulrich depper's:

http://www.akkadia.org/drepper/dsohowto.pdf

it provides insight how shared libraries loaded, how control visibility of symbols, optimizations , others. pretty vast topic in , take time understand, it's worth it.

if data structures , such stuff, there explanations on how bloom filters, hash table , others used lookup purposes.

can hacker see i'm doing inside dll function operation performed decide result

he can see symbols exported you. there many ways of hiding/exporting symbols. ex: __attribute__((visibility(hidden)))

https://gcc.gnu.org/wiki/visibility

can change result i'm returning dynamically loaded dll?

if input given api's exposed via shared library handled correctly (check buffer overrun, etc) in implementation, should fine guess. user has control on input provided api , influences output. if have missed here, great if can correct me.


Comments

Popular posts from this blog

html - Outlook 2010 Anchor (url/address/link) -

javascript - Why does running this loop 9 times take 100x longer than running it 8 times? -

Getting gateway time-out Rails app with Nginx + Puma running on Digital Ocean -