Classification
This dossier summarizes the cheat definition, the affected OSI layer, and the evidence attached to the record.
Using modified console firmware to run unauthorized code or manipulate save data.
This dossier summarizes the cheat definition, the affected OSI layer, and the evidence attached to the record.
Using modified console firmware to run unauthorized code or manipulate save data.
Layers 1-2 (Physical / Data Link)
Using modified console firmware to run unauthorized code or manipulate save data.
Peer-reviewed and academic literature connected to this cheat, with DOI or URL references attached where available.
Florent Fortat, Maryline Laurent, Michel Simatic
NETGAMES 2015: 14th International Workshop on Network and Systems Support for Games
Target: Data modification, firmware retrieval, object counterfeiting, characteristic boosting for NFC-based games
Aim: Fortat, F., Laurent, M., & Simatic, M. (2015). Games based on active NFC objects: Model and security requirements. In 2015 14th International Workshop on Network and Systems Support for Games (NetGames) (pp. 1-3). IEEE.
Recommendation: (Fortat et al., 2015)
No external DOI or URL link is attached yet.
Jamie Hwang
Northwestern University Law Review, Vol. 116, No. 5, 2022
Target: E-doping (software hacks, cheats, digital doping, mechanical doping)
Aim: Hwang, J. (2022). Cheating in E-Sports: A proposal to regulate the growing problem of e-doping. Northwestern University Law Review, 116(5), 1283-1318.
Recommendation: (Hwang, 2022)
No external DOI or URL link is attached yet.
Anton Maario, Vinod Kumar Shukla, A. Ambikapathy, Purushottam Sharma
IEEE SPIN Conference 2021
Target: Multiple cheat types: aimbot, triggerbot, wallhack, ESP, mobility hacks, hardware cheats
Aim: Maario, A., Shukla, V. K., Ambikapathy, A., & Sharma, P. (2021). Redefining the risks of kernel-level anti-cheat in online gaming. In 2021 8th International Conference on Signal Processing and Integrated Networks (SPIN) (pp. 676-680).
Recommendation: (Maario et al., 2021)
No external DOI or URL link is attached yet.
Jon Rogers, Ramazan Aygun, Letha Etzkorn
IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), 2022
Target: Temporal data duplication, achievement/trophy cheating, save file manipulation, custom firmware (CFW) cheating, timestamp falsification
Aim: Rogers, J., Aygun, R., & Etzkorn, L. (2022). Cheat detection through temporal inference of constrained orders for subsequences. In 2022 IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE) (pp. 45-52).
Recommendation: (Rogers et al., 2022)
No external DOI or URL link is attached yet.
Reviewed white papers and adjacent technical reports approved for this dossier.
Reviewed non-academic sources such as news, forums, archives, or enforcement materials.
Named incidents, documented examples, or sanctions associated with this cheat category.