Log In
24 votes

Dynamic linking can cause security concerns because

  1. Security is dynamic
  2. The path for searching dynamic libraries is not known till runtime
  3. Linking is insecure
  4. Cryptographic procedures are not available for dynamic linking
in Operating System 3.4k views

4 Answers

44 votes
Best answer
  1. Nonsense option, No idea why it is here.
  2. The path for searching dynamic libraries is not known till runtime -> This seems most correct answer.
  3. This is not true. Linking in itself not insecure.
  4. There is no relation between Cryptographic procedures & Dynamic linking.

edited by
Lol! nice answer for option A.
i liked option a answer :P :D
how can  option (B) cause security concerns?
Anyone explain the B option ....

process should access only area which is allocated to it .if it has permission then only it can access the other process resource.with hardware we can restrict the process to access the addresses between base and limit.

In case of dynamic linking process may access the resource of other process so OS should take care of it .

In case malware try to access the other process resource which it should not ,OS must take care of such unauthorized access.

also check this:

In dynamic linkin, all external references are that of a stub.

A stub is a piece of code which knows how to locate and load the appropriate memory resident library routine which is needed.

So, if this stub contains the address of a malicious code, then security is a concern.
great explanation
17 votes
Dynamic linking is type of linking in which libraries required by the program are linked during run time.

And evaluating all options B seems correct one.
@Bikram Sir Dynamic linking is not making any sense with cryptography  for security, option B seems to be correct.
yes there is no relation between cryptography and dynamic linking.
Thanks, Sir.
@Bikram sir

option B is true.  but how can  it cause security concerns ?

sir give me some real time example  please
2 votes
b.   path is not  not  known  so it's  not  easy to intruder to place malicious program.
Is this can be a logic?
0 votes

People finding explanation on option B may go to the following link:

Specially see @smsubham answer. May read my short answer as well.


Related questions

18 votes
1 answer
The optimal page replacement algorithm will select the page that Has not been used for the longest time in the past Will not be used for the longest time in the future Has been used least number of times Has been used most number of times
asked Sep 16, 2014 in Operating System Kathleen 3.7k views
22 votes
5 answers
Which of the following scheduling algorithms is non-preemptive? Round Robin First-In First-Out Multilevel Queue Scheduling Multilevel Queue Scheduling with Feedback
asked Sep 16, 2014 in Operating System Kathleen 4k views
20 votes
3 answers
The following solution to the single producer single consumer problem uses semaphores for synchronization. #define BUFFSIZE 100 buffer buf[BUFFSIZE]; int first = last = 0; semaphore b_full = 0; semaphore b_empty = BUFFSIZE void producer() { while(1) { produce an ... $p2$, immediately after $c1$ and immediately before $c2$ so that the program works correctly for multiple producers and consumers.
asked Sep 16, 2014 in Operating System Kathleen 3.1k views
38 votes
5 answers
Relation $R$ is decomposed using a set of functional dependencies, $F$, and relation $S$ is decomposed using another set of functional dependencies, $G$. One decomposition is definitely $\text{BCNF}$, the other is definitely $3NF$, but it is not known which ... (Assume that the closures of $F$ and $G$ are available). Dependency-preservation Lossless-join $\text{BCNF}$ definition $3NF$ definition
asked Sep 16, 2014 in Databases Kathleen 5.3k views