e-doping.info

Print dossier

Using modified console firmware to run unauthorized code or manipulate save data.

Infrastructure-Level Webb and Soh Layers 1-2 (Physical / Data Link) Counted as e-doping 4 articles 0 evidence links
Infrastructure-Level Counted as e-doping

Custom Firmware (CFW) & Save File Manipulation

Definition: Using modified console firmware to run unauthorized code or manipulate save data.

What OSI Layer This Cheat Affects: Layers 1-2 (Physical / Data Link)

Other Information: Using modified console firmware to run unauthorized code or manipulate save data.

Supporting Academic Articles

Games based on active NFC Objects: Model and Security Requirements

Florent Fortat, Maryline Laurent, Michel Simatic

NETGAMES 2015: 14th International Workshop on Network and Systems Support for Games

Target: Data modification, firmware retrieval, object counterfeiting, characteristic boosting for NFC-based games

Aim: Fortat, F., Laurent, M., & Simatic, M. (2015). Games based on active NFC objects: Model and security requirements. In 2015 14th International Workshop on Network and Systems Support for Games (NetGames) (pp. 1-3). IEEE.

Recommendation: (Fortat et al., 2015)

Cheating in E-Sports: A Proposal to Regulate the Growing Problem of E-Doping

Jamie Hwang

Northwestern University Law Review, Vol. 116, No. 5, 2022

Target: E-doping (software hacks, cheats, digital doping, mechanical doping)

Aim: Hwang, J. (2022). Cheating in E-Sports: A proposal to regulate the growing problem of e-doping. Northwestern University Law Review, 116(5), 1283-1318.

Recommendation: (Hwang, 2022)

Redefining the risks of kernel-level anti-cheat in online gaming

Anton Maario, Vinod Kumar Shukla, A. Ambikapathy, Purushottam Sharma

IEEE SPIN Conference 2021

Target: Multiple cheat types: aimbot, triggerbot, wallhack, ESP, mobility hacks, hardware cheats

Aim: Maario, A., Shukla, V. K., Ambikapathy, A., & Sharma, P. (2021). Redefining the risks of kernel-level anti-cheat in online gaming. In 2021 8th International Conference on Signal Processing and Integrated Networks (SPIN) (pp. 676-680).

Recommendation: (Maario et al., 2021)

Cheat Detection Through Temporal Inference of Constrained Orders for Subsequences

Jon Rogers, Ramazan Aygun, Letha Etzkorn

IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE), 2022

Target: Temporal data duplication, achievement/trophy cheating, save file manipulation, custom firmware (CFW) cheating, timestamp falsification

Aim: Rogers, J., Aygun, R., & Etzkorn, L. (2022). Cheat detection through temporal inference of constrained orders for subsequences. In 2022 IEEE Fifth International Conference on Artificial Intelligence and Knowledge Engineering (AIKE) (pp. 45-52).

Recommendation: (Rogers et al., 2022)

Supporting or Related White Papers

No approved white papers are linked to this cheat yet.

Other Approved OSINT Sources

No other approved OSINT sources are linked to this cheat yet.

Known Cases

No known cases are linked to this cheat yet.