An application developer is concerned about safeguarding his application against unauthorized code execution via third-party libraries. Which of the following methods would BEST mitigate the risk of an unauthorized Dynamic-link library (DLL) being injected and executed by the application?
Run the application within a restricted sandbox environment.
Restrict administrative privileges for all application users.
Enforce code signing of the third-party libraries.
Require all dynamic libraries to include a valid digital certificate.