CS 592: Security Practicum Lecture 2 On-line PC games and their cheats.

Slides:



Advertisements
Similar presentations
This course is designed for system managers/administrators to better understand the SAAZ Desktop and Server Management components Students will learn.
Advertisements

MicroKernel Pattern Presented by Sahibzada Sami ud din Kashif Khurshid.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely P J Human Resources Pte Ltd presents:
Multiplayer Online Games An-Cheng Huang Bruce Maggs.
CS0004: Introduction to Programming Visual Studio 2010 and Controls.
Online Game Security - Quake III and its Hacks - (related paper: A Systematic Classification of Cheating in Online Games, Jeff Yanand and Brian Randell.
12/13/2001CS 638, Fall 2001 Today Cheat prevention (and cheat techniques) –Great article:
Video Game Security Brett Cobbs Matthew Boquist. ONLINE VIDEO GAMES controlled a majority of the computer world for sometime now and have never stopped.
Stealth Measurements for Cheat Detection in On-line Games Ed Kaiser Wu-chang Feng Travis Schluessler.
Anti-Cheating Mechanisms for Computer Games Michael Rudolph Jason Cook.
Stopping cheaters since By: Tigran Gasparian.
Cheat-Proofing P2P Online-gaming Albert Lee Spring 2008 Comp 424.
Computer Games ► My hobby is computer games. I like playing online with my friends.
29 Oded Moshe, Director of Product Management Beta Release May 3rd, 2010 Official Release May 24, 2010.
2.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 2: Installing Windows Server.
Computer Gaming and Networking By Philip Kostka. MMORGPs Most popular MMORPG is World of Warcraft, with over 1 million subscribers worldwide Most popular.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
An Introduction to Device Drivers Sarah Diesburg COP 5641 / CIS 4930.
Daniel Korycinski CIS 487.  Developer: Valve Corporation  Game Type: First Person Shooter (FPS)  Rated for a mature audience  Price: $19.95.
After word User Interface in Games. Principles of User Interface Design Know your user Know your user's tasks Craft an interface suitable to the user.
Programming mobile devices Part II Programming Symbian devices with Symbian C++
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Malware Fighting Spyware, Viruses, and Malware Ch 4.
Networked Games - consistency and real-time Objectives – –Understand the problems associated with networked games. –Realize the importance of satisfying.
What Can Games Learn From Security Research? Wu-chang Feng.
Online Game Trojan SecurityLabs.websense.com Hermes Li.
Microsoft ® Office 2007 Training Security II: Turn off the Message Bar and run code safely presents:
By Jonathan Orr, Jonathan Harvey, and John Gladman.
PC GAMES Media Technologies Theodoros Nikitopoulos Chamilothoris.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
TEMPLATE DESIGN © Last Resort Animation, Modeling, AI, Networking, and Backend Alex Bunch, Nick Hunter, Austin Lohr, Robert.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
A Distributive Server Alberto Pareja-Lecaros. Introduction Uses of distributive computing - High powered applications - Ever-expanding server so there’s.
Type and specific of game network servers Created by Ruslan Yavdoshak for Nikitova Games, 2008.
An Introduction to Device Drivers Ted Baker  Andy Wang COP 5641 / CIS 4930.
Source Controller software Ianos Schmidt The University of Iowa.
1991-current Games development and software production company.
Lecture 4 Mechanisms & Kernel for NOSs. Mechanisms for Network Operating Systems  Network operating systems provide three basic mechanisms that support.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Connecting to the Network Networking for Home and Small Businesses.
Cheats on Real-time strategy Games
CS 592: Security Practicum Lecture 1 Introduction.
Lecture 5 Rootkits Hoglund/Butler (Chapters 1-3).
Embedded system security
Analysis of Anti-Hacking Software PunkBuster: How to Stop Cheating in Online Games David Nichols.
1. Games Background Let’s Learn Saengthong School, June – August 2016 Teacher: Aj. Andrew Davison, CoE, PSU Hat Yai Campus

VIRTUAL NETWORK COMPUTING SUBMITTED BY:- Ankur Yadav Ashish Solanki Charu Swaroop Harsha Jain.
Trusted Component Deployment Trusted Components Bernd Schoeller January 30 th, 2006.
VMware ESX and ESXi Module 3.
Chapter 2: System Structures
Virtual World Architecture II
Module 8: Securing Network Traffic by Using IPSec and Certificates
The Client/Server Database Environment
TERRA Authored by: Garfinkel, Pfaff, Chow, Rosenblum, and Boneh
An Introduction to Device Drivers
Chap 10 Malicious Software.
Prof. Leonardo Mostarda University of Camerino
Module 8: Securing Network Traffic by Using IPSec and Certificates
Chap 10 Malicious Software.
ONLINE SECURE DATA SERVICE
Intel Active Management Technology
Chapter 13: I/O Systems.
In Today’s Class.. General Kernel Responsibilities Kernel Organization
Presentation transcript:

CS 592: Security Practicum Lecture 2 On-line PC games and their cheats

Popular on-line PC games FPS (First-person shooters) –You control a gun/crosshair –You shoot and kill other players doing the same MMORPG (Massively multi-player on-line role- playing games) –You control an avatar –You kill other avatars to gain loot and power RTS (Real-time strategy) –You control an army –You go head-to-head against another player’s army

Popular FPS games Half-Life/Counter-Strike (1/2), Battlefield (2 & 2142) Wolfenstein: Enemy Territory, Call of Duty (1/2)

Popular MMORPG games World of Warcraft, Lineage (1 & 2) Runescape, Final Fantasy XI, EverQuest (1 & 2)

Popular RTS games Warcraft 3/Starcraft, Age of Empires Warhammer 40000, Command & Conquer 3

Cheats Achilles heel of the PC gaming platform (besides crappy integrated graphics cards) –Must be fixed to compete with consoles –Causes legitimate, paying players to quit –Creates bad word-of-mouth to discourage new players –Wrecks virtual economies in MMORPGs

Types of cheats Information exposure –Wallhacks (OGC), Maphacks (Warcraft 3), Chest hacks (showEQ) Automation –Aimbot (OGC), Troop command macros (Warcraft 3), Auto-looting (WoW QuickLoot), AFK bots Protocol –Reset cheat (Half-Life), Unit fabrication (Warcraft 3), Item duping (MMO), Speed hack (Half-Life), Hit point hack (Diablo), Disconnect cheat Game bugs –Game-specific coding errors that lead to unintended behavior

Information exposure cheats Server or peer sends complete information to other client –Cheat reveals information that should be hidden Wallhack –Quake 4 – released 10/18/2005 –Call of Duty 2 – released 10/25/2005 (Server boycott due to cheats)

Information exposure cheats Maphack (reveal map and enemy units) –Warcraft3 without Maphack

Information exposure cheats Maphack (reveal map and enemy units) –Warcraft3 with Maphack

Information exposure cheats Chest hacks –Information about what loot is available in map exposed –Player goes straight to the locations with the best loot

Automation cheats Automate game activities via Bots Aimbots –OGC –Automate aiming in FPS Macros and game bot farming –MacroQuest for EQ2 –Automate wealth acquisition via programs

Protocol cheats Hit point cheating –Diablo protocol messages indicating damage done to enemy –Inject messages with inflated damage to instantly kill opponent Item duping –Disconnect while dropping item –Ambiguity in whether event happened globally Speed hack –Inject movement messages to make your character move or fire “faster” than normal

Game cheats Exploit inconsistencies and errors in game code –Magic “pizza” machine in The Sims On-line –Vending machine and pawn shop hack in Lucasfilm’s Habitat –Skin cheats in Counter-Strike –Not highly relevant to this course

Software methodology of cheats What they do –Read memory to expose information –Modify display path to add visual aids –Inject protocol messages –Modify game textures and models on disk or in memory –Programmatically play game on behalf of player

Software methodology of cheats How they do it –Proxy Use separate machine to modify network packets (aimproxies) –Program external to game Separate process running at higher privilege level In-kernel modules Graphics/IO drivers (see-through drivers) Additional layer between game and Windows/DirectX –Library that hijacks game calls Runs in address space of game

Software methodology of cheats How they hide from anti-cheats –Ability to disassemble signatures being checked Polymorphism to thwart file and memory signatures –Run in privileged mode or in-kernel to prevent anti-cheat from accessing it –Automatic disable when anti-cheat code is about to run –Automatic disable when new anti-cheat distributed –More sophisticated mechanisms described in next lecture

Anti-cheats HLGuard (United admins) Cheating Death (United admins) PunkBuster Warden Our approach: Intel AMT

Anti-cheats Scanners –Continuously scan memory and filesystem for foreign libraries and cheats Randomize to keep cheats honest Steam and VAC, PunkBuster Heuristics not perfect: Steam and modified OpenGL drivers Remote screenshot –Provide a facility for dumping a player’s screen remotely PunkBuster

Anti-cheats Authentic peripherals –Trusted keyboard/mouse clicks Hardware signing its movement and clicks –Trusted network output Cryptographic timestamping/ordering Prevent look-ahead cheats Continuous player performance monitoring –HLGuard Machine learning of reasonable human reaction time Ban those who react too fast Prone to false positives –Cal-I (Cyberathlete league) players

Cheating links General – – – WoW –WoW Glider –WoW radar, WoW Sharp, ByteBot, GALB –WardenNet, ISXWarden (anti-anti-cheats) –ISXWoW

Cheating links Half-Life –OGC 9http:// 9 EverQuest 2 –MacroQuest

Anti-cheat links WoW Warden – PunkBuster – Valve Anti-Cheat (VAC) – HLGuard, Cheating-Death – Intel’s AMT –