Directly changing values stored in game memory during runtime.
Supporting Academic Articles
GCI: A GPU-Based Transfer Learning Approach for Detecting Cheats of Computer Game
Md Shihabul Islam, Bo Dong, Swarup Chandra, Latifur Khan, Bhavani Thuraisingham
IEEE Transactions on Dependable and Secure Computing, Vol. 19, No. 2, 2022
Target: Network traffic-based cheating detection, automated cheat detection
Aim: Islam, M. S., Dong, B., Chandra, S., Khan, L., & Thuraisingham, B. (2022). GCI: A GPU-based transfer learning approach for detecting cheats of computer game. IEEE Transactions on Dependable and Secure Computing, 19(2), 804-816.
Recommendation: (Islam et al., 2022)
Addressing Cheating in Distributed MMOGs
Patric Kabus, Wesley W. Terpstra, Mariano Cilia, Alejandro P. Buchmann
ACM NetGames Conference 2005
Target: Item duplication, information leakage, state manipulation, general MMOG cheats
Aim: Kabus, P., Terpstra, W. W., Cilia, M., & Buchmann, A. P. (2005). Addressing cheating in distributed MMOGs. In Proceedings of the 4th ACM SIGCOMM workshop on Network and system support for games (pp. 1-6). ACM.
Recommendation: (Kabus et al., 2005)
Online Games: Categorization of Attacks
Y. Lyhyaoui, A. Lyhyaoui, S. Natkin
IEEE EUROCON Conference 2005
Target: Multiple attack types: cheating against provider, players, and virtual society including AI bots, asset theft, design flaw exploitation
Aim: Lyhyaoui, Y., Lyhyaoui, A., & Natkin, S. (2005). Online games: Categorization of attacks. In EUROCON 2005 - The International Conference on Computer as a Tool (pp. 1340-1343).
Recommendation: (Lyhyaoui et al., 2005)
Detecting Cheating in Computer Games using Data Mining Methods
Alexandre Philbert
American Journal of Computer Science and Information Technology, Vol. 6, No. 3, 2018
Target: Signature-based cheats, metamorphic/polymorphic cheats, malicious executables, aimbot, wall hack, no recoil, radar hack
Aim: Philbert, A. (2018). Detecting cheating in computer games using data mining methods. American Journal of Computer Science and Information Technology, 6(3), 26.
Recommendation: (Philbert, 2018)
Cheat Detection Through Temporal Inference of Constrained Orders for Subsequences
Jon Rogers, Ramazan Aygun, Letha Etzkorn
IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), 2022
Target: Temporal data duplication, achievement/trophy cheating, save file manipulation, custom firmware (CFW) cheating, timestamp falsification
Aim: Rogers, J., Aygun, R., & Etzkorn, L. (2022). Cheat detection through temporal inference of constrained orders for subsequences. In 2022 IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE) (pp. 45-52).
Recommendation: (Rogers et al., 2022)
Security issues in online games
Jianxin Jeff Yan and Hyun-Jin Choi
The Electronic Library Volume 20 Number 2 2002 pp. 125–133
Target: Comprehensive taxonomy including collusion, password compromises, virtual asset trading cheats, service denial, social engineering, software modification
Aim: Yan, J. J., & Choi, H. J. (2002). Security issues in online games. The Electronic Library, 20(2), 125-133.
Recommendation: (Yan & Choi, 2002)