e-doping.info

Print dossier

Abusing software errors, glitches, or programming discrepancies for competitive advantage.

Game-Level Webb and Soh Layer 7 (Application) Counted as e-doping 5 articles 0 evidence links
Game-Level Counted as e-doping

Bug/Glitch Exploitation

Definition: Abusing software errors, glitches, or programming discrepancies for competitive advantage.

What OSI Layer This Cheat Affects: Layer 7 (Application)

Other Information: Abusing software errors, glitches, or programming discrepancies for competitive advantage.

Supporting Academic Articles

Creative Uses of Software Errors: Glitches and Cheats

Wilma Alice Bainbridge, William Sims Bainbridge

Social Science Computer Review, Volume 25 Number 1, Spring 2007, 61-77

Target: Glitches (software errors/bugs) and cheats (tricks circumventing official rules), Easter eggs, programming discrepancies

Aim: Bainbridge, W. A., & Bainbridge, W. S. (2007). Creative uses of software errors: Glitches and cheats. Social Science Computer Review, 25(1), 61-77.

Recommendation: (Bainbridge & Bainbridge, 2007)

"Is It Legit, To You?". An Exploration of Players' Perceptions of Cheating in a Multiplayer Video Game: Making Sense of Uncertainty

Arianna Boldi, Amon Rapp

International Journal of Human–Computer Interaction, 2024, Vol. 40, No. 15, 4021-4041

Target: Third-party software cheats (wallhacks, aimbots, aimlock), game glitch exploitation, technological advantages (VPNs, expensive hardware)

Aim: Boldi, A., & Rapp, A. (2024). "Is It Legit, To You?". An Exploration of Players' Perceptions of Cheating in a Multiplayer Video Game: Making Sense of Uncertainty. International Journal of Human–Computer Interaction, 40(15), 4021-4041.

Recommendation: (Boldi & Rapp, 2024)

Addressing Cheating in Distributed MMOGs

Patric Kabus, Wesley W. Terpstra, Mariano Cilia, Alejandro P. Buchmann

ACM NetGames Conference 2005

Target: Item duplication, information leakage, state manipulation, general MMOG cheats

Aim: Kabus, P., Terpstra, W. W., Cilia, M., & Buchmann, A. P. (2005). Addressing cheating in distributed MMOGs. In Proceedings of the 4th ACM SIGCOMM workshop on Network and system support for games (pp. 1-6). ACM.

Recommendation: (Kabus et al., 2005)

Online Games: Categorization of Attacks

Y. Lyhyaoui, A. Lyhyaoui, S. Natkin

IEEE EUROCON Conference 2005

Target: Multiple attack types: cheating against provider, players, and virtual society including AI bots, asset theft, design flaw exploitation

Aim: Lyhyaoui, Y., Lyhyaoui, A., & Natkin, S. (2005). Online games: Categorization of attacks. In EUROCON 2005 - The International Conference on Computer as a Tool (pp. 1340-1343).

Recommendation: (Lyhyaoui et al., 2005)

Cheating in networked computer games – A review

Steven Daniel Webb and Sieteng Soh

DIMEA '07 Perth Western Australia (ACM)

Target: Comprehensive taxonomy including game-level, application-level, protocol-level, and infrastructure-level cheats; bug exploitation, information exposure, bots, denial of service

Aim: Webb, S. D., & Soh, S. (2007). Cheating in networked computer games – A review. In Proceedings of the 2007 Conference on Future Play (pp. 105-112). ACM.

Recommendation: (Webb & Soh, 2007)

Supporting or Related White Papers

No approved white papers are linked to this cheat yet.

Other Approved OSINT Sources

No other approved OSINT sources are linked to this cheat yet.

Known Cases

No known cases are linked to this cheat yet.