Classification
This dossier summarizes the cheat definition, the affected OSI layer, and the evidence attached to the record.
Directly changing values stored in game memory during runtime.
This dossier summarizes the cheat definition, the affected OSI layer, and the evidence attached to the record.
Directly changing values stored in game memory during runtime.
Layer 7 (Application)
Directly changing values stored in game memory during runtime.
Peer-reviewed and academic literature connected to this cheat, with DOI or URL references attached where available.
Md Shihabul Islam, Bo Dong, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham
IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 2, 2022
Target: Network traffic-based cheating detection, automated cheat detection
Aim: Islam, M. S., Dong, B., Chandra, S., Khan, L., & Thuraisingham, B. (2022). GCI: A GPU-based transfer learning approach for detecting cheats of computer game. IEEE Transactions on Dependable and Secure Computing, 19(2), 804-816.
Recommendation: (Islam et al., 2022)
No external DOI or URL link is attached yet.
Patric Kabus, Wesley W. Terpstra, Mariano Cilia, Alejandro P. Buchmann
ACM NetGames Conference 2005
Target: Item duplication, information leakage, state manipulation, general MMOG cheats
Aim: Kabus, P., Terpstra, W. W., Cilia, M., & Buchmann, A. P. (2005). Addressing cheating in distributed MMOGs. In Proceedings of the 4th ACM SIGCOMM workshop on Network and system support for games (pp. 1-6). ACM.
Recommendation: (Kabus et al., 2005)
No external DOI or URL link is attached yet.
Y. Lyhyaoui, A. Lyhyaoui, S. Natkin
IEEE EUROCON Conference 2005
Target: Multiple attack types: cheating against provider, players, and virtual society including AI bots, asset theft, design flaw exploitation
Aim: Lyhyaoui, Y., Lyhyaoui, A., & Natkin, S. (2005). Online games: Categorization of attacks. In EUROCON 2005 - The International Conference on Computer as a Tool (pp. 1340-1343).
Recommendation: (Lyhyaoui et al., 2005)
No external DOI or URL link is attached yet.
Alexandre Philbert
American Journal of Computer Science and Information Technology, Vol. 6, No. 3, 2018
Target: Signature-based cheats, metamorphic/polymorphic cheats, malicious executables, aimbot, wall hack, no recoil, radar hack
Aim: Philbert, A. (2018). Detecting cheating in computer games using data mining methods. American Journal of Computer Science and Information Technology, 6(3), 26.
Recommendation: (Philbert, 2018)
No external DOI or URL link is attached yet.
Jon Rogers, Ramazan Aygun, Letha Etzkorn
IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), 2022
Target: Temporal data duplication, achievement/trophy cheating, save file manipulation, custom firmware (CFW) cheating, timestamp falsification
Aim: Rogers, J., Aygun, R., & Etzkorn, L. (2022). Cheat detection through temporal inference of constrained orders for subsequences. In 2022 IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE) (pp. 45-52).
Recommendation: (Rogers et al., 2022)
No external DOI or URL link is attached yet.
Jianxin Jeff Yan and Hyun-Jin Choi
The Electronic Library Volume 20 Number 2 2002 pp. 125–133
Target: Comprehensive taxonomy including collusion, password compromises, virtual asset trading cheats, service denial, social engineering, software modification
Aim: Yan, J. J., & Choi, H. J. (2002). Security issues in online games. The Electronic Library, 20(2), 125-133.
Recommendation: (Yan & Choi, 2002)
No external DOI or URL link is attached yet.
Reviewed white papers and adjacent technical reports approved for this dossier.
Reviewed non-academic sources such as news, forums, archives, or enforcement materials.
Named incidents, documented examples, or sanctions associated with this cheat category.