Redirecting function calls through a protected environment to effect
secure linkage of program modules. In one embodiment, a program module,
such as a player application for example, may make function calls to
secure functions instead of to insecure operating system (OS) services,
thereby deterring attacks on the player's calls to OS services. In one
embodiment, the new secure functions provide similar functionality to the
replaced OS services. Providing a securely loaded function for calling by
a program module in place of calling an insecure OS function includes
obtaining object code for the securely loaded function from a signed
binary description file, performing signature and integrity verification
of the program module using the signed binary description file, loading
the object code for the securely loaded function into memory, and
updating an address for calling the securely loaded function by the
program module.