e-doping.info

Print dossier

Directly changing values stored in game memory during runtime.

Application-Level Webb and Soh Layer 7 (Application) Counted as e-doping 6 articles 0 evidence links
Application-Level Counted as e-doping

Memory Value Alteration

Definition: Directly changing values stored in game memory during runtime.

What OSI Layer This Cheat Affects: Layer 7 (Application)

Other Information: Directly changing values stored in game memory during runtime.

Supporting Academic Articles

GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game

Md Shihabul Islam, Bo Dong, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham

IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 2, 2022

Target: Network traffic-based cheating detection, automated cheat detection

Aim: Islam, M. S., Dong, B., Chandra, S., Khan, L., & Thuraisingham, B. (2022). GCI: A GPU-based transfer learning approach for detecting cheats of computer game. IEEE Transactions on Dependable and Secure Computing, 19(2), 804-816.

Recommendation: (Islam et al., 2022)

Addressing Cheating in Distributed MMOGs

Patric Kabus, Wesley W. Terpstra, Mariano Cilia, Alejandro P. Buchmann

ACM NetGames Conference 2005

Target: Item duplication, information leakage, state manipulation, general MMOG cheats

Aim: Kabus, P., Terpstra, W. W., Cilia, M., & Buchmann, A. P. (2005). Addressing cheating in distributed MMOGs. In Proceedings of the 4th ACM SIGCOMM workshop on Network and system support for games (pp. 1-6). ACM.

Recommendation: (Kabus et al., 2005)

Online Games: Categorization of Attacks

Y. Lyhyaoui, A. Lyhyaoui, S. Natkin

IEEE EUROCON Conference 2005

Target: Multiple attack types: cheating against provider, players, and virtual society including AI bots, asset theft, design flaw exploitation

Aim: Lyhyaoui, Y., Lyhyaoui, A., & Natkin, S. (2005). Online games: Categorization of attacks. In EUROCON 2005 - The International Conference on Computer as a Tool (pp. 1340-1343).

Recommendation: (Lyhyaoui et al., 2005)

Detecting Cheating in Computer Games using Data Mining Methods

Alexandre Philbert

American Journal of Computer Science and Information Technology, Vol. 6, No. 3, 2018

Target: Signature-based cheats, metamorphic/polymorphic cheats, malicious executables, aimbot, wall hack, no recoil, radar hack

Aim: Philbert, A. (2018). Detecting cheating in computer games using data mining methods. American Journal of Computer Science and Information Technology, 6(3), 26.

Recommendation: (Philbert, 2018)

Cheat Detection Through Temporal Inference of Constrained Orders for Subsequences

Jon Rogers, Ramazan Aygun, Letha Etzkorn

IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), 2022

Target: Temporal data duplication, achievement/trophy cheating, save file manipulation, custom firmware (CFW) cheating, timestamp falsification

Aim: Rogers, J., Aygun, R., & Etzkorn, L. (2022). Cheat detection through temporal inference of constrained orders for subsequences. In 2022 IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE) (pp. 45-52).

Recommendation: (Rogers et al., 2022)

Security issues in online games

Jianxin Jeff Yan and Hyun-Jin Choi

The Electronic Library Volume 20 Number 2 2002 pp. 125–133

Target: Comprehensive taxonomy including collusion, password compromises, virtual asset trading cheats, service denial, social engineering, software modification

Aim: Yan, J. J., & Choi, H. J. (2002). Security issues in online games. The Electronic Library, 20(2), 125-133.

Recommendation: (Yan & Choi, 2002)

Supporting or Related White Papers

No approved white papers are linked to this cheat yet.

Other Approved OSINT Sources

No other approved OSINT sources are linked to this cheat yet.

Known Cases

No known cases are linked to this cheat yet.