Prevent abuse of library loading mechanisms in the operating system and software to load untrusted code by configuring appropriate library loading mechanisms and investigating potential vulnerable software.
Restrict the use of untrusted or unknown libraries, such as remote or unknown DLLs.