摘要 |
<p>Software loading is effected by means of a header (40) and software modules STUBl, STUB2 etc. The header (40) calls each stub in appropriate order, installing the stub in a loader region (42), executing the stub and then removing it. The STUBS may be encrypted and may be installed at random or pseudo- random locations in the region (42). Generic breaches of security, such as 'riding the loader' are prevented because the stubs appear only transiently and at unpredictable positions. Security may be further improved by selecting each stub from a group of alternatives which are differently coded but functionally equivalent.</p> |