Detours: binary interception of Win32 functions
WINSYM'99 Proceedings of the 3rd conference on USENIX Windows NT Symposium - Volume 3
Is a bot at the controls?: Detecting input data attacks
Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games
Fides: remote anomaly-based cheat detection using client emulation
Proceedings of the 16th ACM conference on Computer and communications security
Cheat detection processing: a GPU versus CPU comparison
Proceedings of the 9th Annual Workshop on Network and Systems Support for Games
Server-side verification of client behavior in online games
ACM Transactions on Information and System Security (TISSEC)
Towards providing security for mobile games
Proceedings of the eighth ACM international workshop on Mobility in the evolving internet architecture
Peer-to-peer architectures for massively multiplayer online games: A Survey
ACM Computing Surveys (CSUR)
Hi-index | 0.00 |
As a result of physically owning the client machine, cheaters in network games currently have the upper-hand when it comes to avoiding detection by anti-cheat software. To address this problem and turn the tables on cheaters, this paper examines an approach for cheat detection based on the use of stealth measurements via tamper-resistant hardware. To support this approach, we examine a range of cheat methods and a number of measurements that such hardware could perform to detect them.