c++ - Security Of Dynamic Loaded DLL -
i want design simple security system via rolling code system time in dll file. dll have 1 exported function "bool result()" return true or false main application when called. dll loaded dynamically main application "loadlibrary(...)" method , function call after.
but don't have knowledge on hacking , code security.
that's question: can hacker see i'm doing inside dll function operation performed decide result, or can change result i'm returning dynamically loaded dll?
in order understand , write shared libraries, important go though how loader , elf format interact.
the article found helpful ulrich depper's:
http://www.akkadia.org/drepper/dsohowto.pdf
it provides insight how shared libraries loaded, how control visibility of symbols, optimizations , others. pretty vast topic in , take time understand, it's worth it.
if data structures , such stuff, there explanations on how bloom filters, hash table , others used lookup purposes.
can hacker see i'm doing inside dll function operation performed decide result
he can see symbols exported you. there many ways of hiding/exporting symbols. ex: __attribute__((visibility(hidden)))
https://gcc.gnu.org/wiki/visibility
can change result i'm returning dynamically loaded dll?
if input given api's exposed via shared library handled correctly (check buffer overrun, etc) in implementation, should fine guess. user has control on input provided api , influences output. if have missed here, great if can correct me.
Comments
Post a Comment