Classification
This dossier summarizes the cheat definition, the affected OSI layer, and the evidence attached to the record.
Abusing software errors, glitches, or programming discrepancies for competitive advantage.
This dossier summarizes the cheat definition, the affected OSI layer, and the evidence attached to the record.
Abusing software errors, glitches, or programming discrepancies for competitive advantage.
Layer 7 (Application)
Abusing software errors, glitches, or programming discrepancies for competitive advantage.
Peer-reviewed and academic literature connected to this cheat, with DOI or URL references attached where available.
Wilma Alice Bainbridge, William Sims Bainbridge
Social Science Computer Review, Volume 25 Number 1, Spring 2007, 61-77
Target: Glitches (software errors/bugs) and cheats (tricks circumventing official rules), Easter eggs, programming discrepancies
Aim: Bainbridge, W. A., & Bainbridge, W. S. (2007). Creative uses of software errors: Glitches and cheats. Social Science Computer Review, 25(1), 61-77.
Recommendation: (Bainbridge & Bainbridge, 2007)
No external DOI or URL link is attached yet.
Arianna Boldi, Amon Rapp
International Journal of Human–Computer Interaction, 2024, Vol. 40, No. 15, 4021-4041
Target: Third-party software cheats (wallhacks, aimbots, aimlock), game glitch exploitation, technological advantages (VPNs, expensive hardware)
Aim: Boldi, A., & Rapp, A. (2024). "Is It Legit, To You?". An Exploration of Players' Perceptions of Cheating in a Multiplayer Video Game: Making Sense of Uncertainty. International Journal of Human–Computer Interaction, 40(15), 4021-4041.
Recommendation: (Boldi & Rapp, 2024)
No external DOI or URL link is attached yet.
Patric Kabus, Wesley W. Terpstra, Mariano Cilia, Alejandro P. Buchmann
ACM NetGames Conference 2005
Target: Item duplication, information leakage, state manipulation, general MMOG cheats
Aim: Kabus, P., Terpstra, W. W., Cilia, M., & Buchmann, A. P. (2005). Addressing cheating in distributed MMOGs. In Proceedings of the 4th ACM SIGCOMM workshop on Network and system support for games (pp. 1-6). ACM.
Recommendation: (Kabus et al., 2005)
No external DOI or URL link is attached yet.
Y. Lyhyaoui, A. Lyhyaoui, S. Natkin
IEEE EUROCON Conference 2005
Target: Multiple attack types: cheating against provider, players, and virtual society including AI bots, asset theft, design flaw exploitation
Aim: Lyhyaoui, Y., Lyhyaoui, A., & Natkin, S. (2005). Online games: Categorization of attacks. In EUROCON 2005 - The International Conference on Computer as a Tool (pp. 1340-1343).
Recommendation: (Lyhyaoui et al., 2005)
No external DOI or URL link is attached yet.
Steven Daniel Webb and Sieteng Soh
DIMEA '07 Perth Western Australia (ACM)
Target: Comprehensive taxonomy including game-level, application-level, protocol-level, and infrastructure-level cheats; bug exploitation, information exposure, bots, denial of service
Aim: Webb, S. D., & Soh, S. (2007). Cheating in networked computer games – A review. In Proceedings of the 2007 Conference on Future Play (pp. 105-112). ACM.
Recommendation: (Webb & Soh, 2007)
No external DOI or URL link is attached yet.
Reviewed white papers and adjacent technical reports approved for this dossier.
Reviewed non-academic sources such as news, forums, archives, or enforcement materials.
Named incidents, documented examples, or sanctions associated with this cheat category.