lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1ea4ea7a050701174138906685@mail.gmail.com> Date: Sat Jul 2 01:41:41 2005 From: johnlacour at gmail.com (John LaCour) Subject: plz suggest security for DLL functions Another suggestion - also not bullet proof - but largely effective: 1) Write a kernel mode driver that hooks the Win32 APIs to load DLLs and filter any calls by programs other than your own. 2) Ensure your driver protects itself. There's a long list of things to do including: - protect the registry key / hive - protect the driver file - protect access to physical memory - etc. etc. 3) Ensure that attacks to undo API hooks are prevented. See http://www.security.org.sg/code/sdtrestore.html as an example of these attacks (which can be used for evil or good in the case of undoing rootkit hooks). As others have mentioned, the above made be significantly more expensive than the good EULA and lawyers route. -John On 6/30/05, Gaurav Kumar <gkverma@...il.com> wrote: > friends, > > We are developing a software that makes use of a COM DLL. The whole > logic lies in the dll. The User Interface is in VC++. DLL exposes > functions, application calls it and displays result. Now, we found > that anybody can copy the DLL, register it and make use of those > functions. > > Please guide us in making those functions secret or encrypted so that > others cannt use our functions. > > thanks and regards, > gaurav > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ >
Powered by blists - more mailing lists