Cheat dossier

Memory Value Alteration

Directly changing values stored in game memory during runtime.

Overview

Classification

This dossier summarizes the cheat definition, the affected OSI layer, and the evidence attached to the record.

6 Academic articles
0 Linked evidence
0 Known cases
Dossier Facts

Definition

Directly changing values stored in game memory during runtime.

What OSI Layer This Cheat Affects

Layer 7 (Application)

Other Information

Directly changing values stored in game memory during runtime.

Academic Evidence

Supporting Academic Articles

Peer-reviewed and academic literature connected to this cheat, with DOI or URL references attached where available.

GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game

Md Shihabul Islam, Bo Dong, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham

IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 2, 2022

Target: Network traffic-based cheating detection, automated cheat detection

Aim: Islam, M. S., Dong, B., Chandra, S., Khan, L., & Thuraisingham, B. (2022). GCI: A GPU-based transfer learning approach for detecting cheats of computer game. IEEE Transactions on Dependable and Secure Computing, 19(2), 804-816.

Recommendation: (Islam et al., 2022)

No external DOI or URL link is attached yet.

Addressing Cheating in Distributed MMOGs

Patric Kabus, Wesley W. Terpstra, Mariano Cilia, Alejandro P. Buchmann

ACM NetGames Conference 2005

Target: Item duplication, information leakage, state manipulation, general MMOG cheats

Aim: Kabus, P., Terpstra, W. W., Cilia, M., & Buchmann, A. P. (2005). Addressing cheating in distributed MMOGs. In Proceedings of the 4th ACM SIGCOMM workshop on Network and system support for games (pp. 1-6). ACM.

Recommendation: (Kabus et al., 2005)

No external DOI or URL link is attached yet.

Online Games: Categorization of Attacks

Y. Lyhyaoui, A. Lyhyaoui, S. Natkin

IEEE EUROCON Conference 2005

Target: Multiple attack types: cheating against provider, players, and virtual society including AI bots, asset theft, design flaw exploitation

Aim: Lyhyaoui, Y., Lyhyaoui, A., & Natkin, S. (2005). Online games: Categorization of attacks. In EUROCON 2005 - The International Conference on Computer as a Tool (pp. 1340-1343).

Recommendation: (Lyhyaoui et al., 2005)

No external DOI or URL link is attached yet.

Detecting Cheating in Computer Games using Data Mining Methods

Alexandre Philbert

American Journal of Computer Science and Information Technology, Vol. 6, No. 3, 2018

Target: Signature-based cheats, metamorphic/polymorphic cheats, malicious executables, aimbot, wall hack, no recoil, radar hack

Aim: Philbert, A. (2018). Detecting cheating in computer games using data mining methods. American Journal of Computer Science and Information Technology, 6(3), 26.

Recommendation: (Philbert, 2018)

No external DOI or URL link is attached yet.

Cheat Detection Through Temporal Inference of Constrained Orders for Subsequences

Jon Rogers, Ramazan Aygun, Letha Etzkorn

IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), 2022

Target: Temporal data duplication, achievement/trophy cheating, save file manipulation, custom firmware (CFW) cheating, timestamp falsification

Aim: Rogers, J., Aygun, R., & Etzkorn, L. (2022). Cheat detection through temporal inference of constrained orders for subsequences. In 2022 IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE) (pp. 45-52).

Recommendation: (Rogers et al., 2022)

No external DOI or URL link is attached yet.

Security issues in online games

Jianxin Jeff Yan and Hyun-Jin Choi

The Electronic Library Volume 20 Number 2 2002 pp. 125–133

Target: Comprehensive taxonomy including collusion, password compromises, virtual asset trading cheats, service denial, social engineering, software modification

Aim: Yan, J. J., & Choi, H. J. (2002). Security issues in online games. The Electronic Library, 20(2), 125-133.

Recommendation: (Yan & Choi, 2002)

No external DOI or URL link is attached yet.

White Papers

Supporting or Related White Papers

Reviewed white papers and adjacent technical reports approved for this dossier.

No approved white papers are linked to this dossier yet.
OSINT Sources

Other Approved OSINT Sources

Reviewed non-academic sources such as news, forums, archives, or enforcement materials.

No other approved OSINT sources are linked to this dossier yet.
Cases

Known Cases

Named incidents, documented examples, or sanctions associated with this cheat category.

No known cases are linked to this dossier yet.