A cheat controlled protocol for centralized online multiplayer games
Proceedings of 3rd ACM SIGCOMM workshop on Network and system support for games
Mitigating information exposure to cheaters in real-time strategy games
NOSSDAV '05 Proceedings of the international workshop on Network and operating systems support for digital audio and video
Copilot - a coprocessor-based kernel runtime integrity monitor
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Detours: binary interception of Win32 functions
WINSYM'99 Proceedings of the 3rd conference on USENIX Windows NT Symposium - Volume 3
CAPTCHA: using hard AI problems for security
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
A format-independent architecture for run-time integrity checking of executable code
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
A large-scale study of automated web search traffic
AIRWeb '08 Proceedings of the 4th international workshop on Adversarial information retrieval on the web
A peer auditing scheme for cheat elimination in MMOGs
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games
Stealth measurements for cheat detection in on-line games
Proceedings of the 7th ACM SIGCOMM Workshop on Network and System Support for Games
Not-a-Bot: improving service availability in the face of botnet attacks
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Battle of Botcraft: fighting bots in online games with human observational proofs
Proceedings of the 16th ACM conference on Computer and communications security
Fides: remote anomaly-based cheat detection using client emulation
Proceedings of the 16th ACM conference on Computer and communications security
An algorithm for measurement and detection of path cheating in virtual environments
VECIMS'09 Proceedings of the 2009 IEEE international conference on Virtual Environments, Human-Computer Interfaces and Measurement Systems
Light-weight protocol simulation for binary data exchange over heterogeneous networks
SpringSim '10 Proceedings of the 2010 Spring Simulation Multiconference
Artificial neural network for bot detection system in MMOGs
Proceedings of the 9th Annual Workshop on Network and Systems Support for Games
Small trusted primitives for dependable systems
ACM SIGOPS Operating Systems Review
Server-side verification of client behavior in online games
ACM Transactions on Information and System Security (TISSEC)
Mobile medical application model for heterogeneous networks
Proceedings of the 14th Communications and Networking Symposium
Using cloud computing for medical applications
Proceedings of the 15th Communications and Networking Simulation Symposium
Towards providing security for mobile games
Proceedings of the eighth ACM international workshop on Mobility in the evolving internet architecture
Peer-to-peer architectures for massively multiplayer online games: A Survey
ACM Computing Surveys (CSUR)
Search engine click spam detection based on bipartite graph propagation
Proceedings of the 7th ACM international conference on Web search and data mining
Hi-index | 0.00 |
The use of programmatically generated input data in place of human-generated input data poses problems for many computer applications in use today. Mouse clicks and keyboard strokes can automatically be generated to cheat in online games, or to perpetrate click fraud. The ability to discern whether input data was computationally generated instead of created by a human input device is therefore of paramount importance to these types of applications. This paper describes a method for detecting input data that was computationally modified or fabricated. This includes detecting data that was not directly generated by a physical human input device such as a keyboard or mouse. A prototype of this system was built on existing hardware and was shown to be effective at detecting attacks on a real application. This detection method is capable of addressing the majority of input-based attacks currently in use. When used in conjunction with a trusted peripheral, it offers a robust mechanism for ensuring a computer is not at the controls.