Model checking for programming languages using VeriSoft
Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages
Terra: a virtual machine-based platform for trusted computing
SOSP '03 Proceedings of the nineteenth ACM symposium on Operating systems principles
Java-MaC: A Run-Time Assurance Approach for Java Programs
Formal Methods in System Design
CMC: a pragmatic approach to model checking real code
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Identifying MMORPG bots: a traffic analysis approach
Proceedings of the 2006 ACM SIGCHI international conference on Advances in computer entertainment technology
Support for resilient Peer-to-Peer gaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
Cheating in networked computer games: a review
Proceedings of the 2nd international conference on Digital interactive media in entertainment and arts
Hydra: a massively-multiplayer peer-to-peer architecture for the game developer
Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games
Enhanced mirrored servers for network games
Proceedings of the 6th ACM SIGCOMM workshop on Network and system support for games
Cheating detection through game time modeling: A better way to avoid time cheats in P2P MOGs?
Multimedia Tools and Applications
AC/DC: an algorithm for cheating detection by cheating
Proceedings of the 2006 international workshop on Network and operating systems support for digital audio and video
Hack-proof synchronization protocol for multi-player online games
Multimedia Tools and Applications
Identifying MMORPG bots: a traffic analysis approach
EURASIP Journal on Advances in Signal Processing - Special issue on signal processing applications in network intrusion detection systems
Server-side verification of client behavior in online games
ACM Transactions on Information and System Security (TISSEC)
Behaviour-Based cheat detection in multiplayer games with event-b
IFM'12 Proceedings of the 9th international conference on Integrated Formal Methods
Hi-index | 0.00 |
We investigate the prospect of applying runtime verification to cheat detection. Game implementation bugs are extensively exploited by cheaters, especially in massively multiplayer games. As games are implemented on larger scales and game object interactions become more complex, it becomes increasingly difficult to guarantee that high-level game rules are enforced correctly in the implementation. We observe that although implementing high-level rules in code is complex because of interference between rules, checking for rule compliance at runtime is simple because only a single rule is involved in each check. We demonstrate our idea by applying the Java-MaC runtime verification system to a simple game to detect a transaction bug that is common in massively multiplayer games.