A system providing methodology for securing interfaces of executable files
is described. In one embodiment, for example, a method is described for
securing a program comprised of a plurality of interoperable components,
the method comprises steps of: extracting information about a function of
a first component of the program that is callable by at least one other
component of the program; securing the extracted information; in response
to an attempt by a second component of the program to invoke the function
of the first component, validating authenticity of the second component;
and if the second component is validated, providing access to the
function of the first component using the secured extracted information.