Video Game Security Brett Cobbs Matthew Boquist. ONLINE VIDEO GAMES controlled a majority of the computer world for sometime now and have never stopped.

Slides:



Advertisements
Similar presentations
Is Online-Gaming for Business or Pleasure? Adam Pyszkowski Tony Zhe Richard Thompson.
Advertisements

What’s new. Amazon Price Check App They’re making it even harder for real-world retailers,– scan and scram. Here’s how it works: you go into a store,
Online Game Security - Quake III and its Hacks - (related paper: A Systematic Classification of Cheating in Online Games, Jeff Yanand and Brian Randell.
Software Piracy. The Impact of Software Piracy By: Andy Ajello.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
It’s more than a game, it’s your life On?. Aims for this Safer Internet Assembly: ‘virtual lives’To create awareness of our ‘virtual lives’ – what does.
Case study Engineering Ethics Mahmoud Darawsheh. Psystar corporation  Psystar Corporation was a company based in Florida, owned by Rudy and Robert Pedraza.
Ksenia Sidorovnina Ph-51. What is online game Early online games Genres of online games Online games and money Danger of online games.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
CHAPTER 2 KNOW YOUR VILLAINS. Who writes it: Malware writers vary in age, income level, location, social/peer interaction, education level, likes, dislikes.
Upgrading Software CIT 1100 Chapter4.
Security for Internet Every Day Use Standard Security Practices and New Threats.
Unit 1 Living in the Digital WorldChapter 4 – Smart Working This presentation will cover the following topics: Software choices Name:
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
A Service Platform for On-Line Games DebanJan Saha, Dambit Sahu, Anees Shaikh (IBM TJ Watson Research Center, NY) Presented by Gary Huang March 17, 2004.
Maple Story By: Nick Martineau. General Game Information Title: Maple Story Company: Wizet\NX Games Type: Side Scrolling 2D MMORPG Price: Free.
VIDEO GAMES Evolution, Development, Sales and Controversy.
Alejandra Garcia Andrew del Mundo Chris Peters Long Vu Katrina Tewksbury.
1 Online game development. 2 Outline of the presentation important terms brief history status quo of present day online gaming Case studies: Runescape.
Interactive Storytelling for Video Games Chapter 11: Fully Player- Driven Stories Josiah Lebowitz Chris Klug.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
1950’s Games were invented as early as the 1950’s. OXO a graphical version of tic-tac-toe was created in 1952 The player would play against the computer.
Revealed Presented by Jaysheel D Bhavsar Jaysheel D Bhavsar.
By Kristina Erickson and Sam Porter. Harder to find products made in the US than in China Harder to find products made in the US than in China China exports.
© Folens 2008 Cultural changes in music Brought about by ICT.
Macrovision Corp. November 18, 2004 David Mizell Mary Voss Wei Wang.
Chapter 4 Application Software: Programs that Let You Work and Play
Daniel Korycinski CIS 487.  Developer: Valve Corporation  Game Type: First Person Shooter (FPS)  Rated for a mature audience  Price: $19.95.
What the hell is. Free software is software that anyone is free to use, copy, improve, examine or distribute, either free of cost or for a price. More.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
Viruses.
In-Game Advertising in China Edward Lehman Managing Director.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Group 06-From Lecture 06 Member 02 Presented by: Xu Wei iTunes B2C SUCCESS STORY&CONTROVERSIAL ISSUES.
Tom Chilton Wow graphic designer Tom Chilton tom Chilton, lead designer of blizzard and one of the three main designers of the massive mmorpg (multiplayer.
Online Game Trojan SecurityLabs.websense.com Hermes Li.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
By Anthony W. Hill & Course Technology1 Common End User Problems.
By Jonathan Orr, Jonathan Harvey, and John Gladman.
Online Goods and Services. Topics Online Shops and Physical Goods Online Shops and Physical Goods Booking Systems Banking Education and Training Gaming.
The Currency of Everquest Platinum Pieces. What is Everquest MMORPG – Massively Multiplayer Online Game MMORPG – Massively Multiplayer Online Game 400,000+
PC GAMES Media Technologies Theodoros Nikitopoulos Chamilothoris.
Question 23 As an accountant of an organization, discuss why it might be necessary to initiate systems analysis. {6 marks} Giving reasons for your answer,
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
Digital Rights Management Maxim Fastovsky. What is DRM? DRM technologies attempt to control use of digital media by preventing access, copying or conversion.
INTERNET SAFETY FOR KIDS
Elevator Pitch According to statistics, one in three people aged 18 to 40 years old interested in computer games. While all players experience some common.
Digital Currency The Cyber World Economy. Cryptocurrency More accurately called “virtual currency”, cryptocurrency is based on the cryptography of exchange.
What is gaming console & platform? A game console is a device which outputs video signal into TV screen to display the video game. A platform is in which.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
1991-current Games development and software production company.
CS 592: Security Practicum Lecture 2 On-line PC games and their cheats.
Society & Computers PowerPoint
Network Security.  With an increasing amount of people getting connected to networks, the security threats that cause massive harm are increasing also.
Professional Ethics Mälardalens högskola Västerås, Mikael Svensson.
"Most people, I think, don't even know what a rootkit is, so why should they care about it?" - Thomas Hesse, President of Sony's Global Digital Business.
Digital Rights Management Maxim Fastovsky. What is DRM? DRM technologies attempt to control use of digital media by preventing access, copying or conversion.
GCSE Computing: A451 Computer Systems & Programming Topic 3 Software System Software (2) Utility Software.
“It’s more than a game, it’s your life”.. Gamers spend on average 8 hours weekly playing online. Young people sleep 2 to 3 hours less per night than 10.
Computers In The Music Industry By: Matt, Chase, and Courtney.
Free Games Online Play Without Downloading The Best Online Games! Awesome action games, puzzle games, exciting sports games, mobile games & radical stunt.
Applications Software. Is a software used to carry out a particular task e.g. a game or word processor.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Matt Jennings.  Introduction  Value Chains  Major value chains in the illegal market  Means of Communication  Conclusion.
Activate your McAfee on Support for McAfee
My hobby is to play on computer.
Ian Ramsey C of E School GCSE ICT Smart working Software choices.
Part 3.
software & cloud computing
Presentation transcript:

Video Game Security Brett Cobbs Matthew Boquist

ONLINE VIDEO GAMES controlled a majority of the computer world for sometime now and have never stopped growing controlled a majority of the computer world for sometime now and have never stopped growing Gaming has always and remains a prime drive of the personal computer market Gaming has always and remains a prime drive of the personal computer market In the past ten years it has grown as quickly as the internet and is in hundred of millions of peoples homes In the past ten years it has grown as quickly as the internet and is in hundred of millions of peoples homes

MMORPG There are many types of genres for video games but the biggest and most security sensitive is the MMORPG (Massive Multi Online Role Playing Game). There are many types of genres for video games but the biggest and most security sensitive is the MMORPG (Massive Multi Online Role Playing Game). A massively multiplayer online role-playing game is a genre of computer role-playing games (CRPGs) in which a large number of players interact with one another in a virtual world A massively multiplayer online role-playing game is a genre of computer role-playing games (CRPGs) in which a large number of players interact with one another in a virtual world

GREATEST OF MMORPGS The most popular of this type of video game is WoW (World of Warcraft) The most popular of this type of video game is WoW (World of Warcraft) At the current time there are around 11 million subscribers to the game that pay a monthly fee of $14 a month to play the game. That is a ridiculous $154 million dollars a month that Blizzard entertainment is making. At the current time there are around 11 million subscribers to the game that pay a monthly fee of $14 a month to play the game. That is a ridiculous $154 million dollars a month that Blizzard entertainment is making. This concentration of money and players is a spawning pool for hackers, cheaters, and criminals that will do anything to take advantage of the game and even make a living out of it. This concentration of money and players is a spawning pool for hackers, cheaters, and criminals that will do anything to take advantage of the game and even make a living out of it.

GAME MONEY = REAL MONEY? In WoW and many online mmorpgs there is an in game virtual economy that is in effect, in which players find items, sell items and, level up characters. In WoW and many online mmorpgs there is an in game virtual economy that is in effect, in which players find items, sell items and, level up characters. Can sell their characters or items through third party programs(A Middle Market) Can sell their characters or items through third party programs(A Middle Market) IGE is the largest company in this middle market netting $400 million per year by acting as the real-world “middle man” for virtual goods. IGE is the largest company in this middle market netting $400 million per year by acting as the real-world “middle man” for virtual goods. Entire industries of sweatshops with hundreds of thousands of workers in China now exist to do just this. Entire industries of sweatshops with hundreds of thousands of workers in China now exist to do just this.

TYPE OF GAME EXPLOITS BOTTING BOTTING DUPING DUPING AIM BOTTING AIM BOTTING sometimes called "auto-aiming", is software that assists the player in aiming at the target. sometimes called "auto-aiming", is software that assists the player in aiming at the target. WALL HACKING WALL HACKING Wall hacking involves changing of wall properties in first-person shooters. Wall hacking involves changing of wall properties in first-person shooters. MAP HACK MAP HACK is a cheat that enables the player to see more of the map than the game intends them to see. is a cheat that enables the player to see more of the map than the game intends them to see.

WALL HACK WALL HACKING WALL HACKING Wall hacking involves changing of wall properties in first- person shooters. Wall hacking involves changing of wall properties in first- person shooters.

MAPHACK MAPHACK MAPHACK is a cheat that enables the player to see more of the map than the game intends them to see. is a cheat that enables the player to see more of the map than the game intends them to see.

AIMBOT AIMBOTTING AIMBOTTING sometimes called "auto-aiming", is software that assists the player in aiming at the target. sometimes called "auto-aiming", is software that assists the player in aiming at the target.

BOTS A bot is a player who runs a third party program to control their character. A bot is a player who runs a third party program to control their character. The bot will kill monsters, loot money, mine, or gain levels automatically without the player having to be in front of the computer. The bot will kill monsters, loot money, mine, or gain levels automatically without the player having to be in front of the computer.

DUPING Duping refers to the practice of exploiting a bug in a video game to illegitimately create duplicates of unique items or currency Duping refers to the practice of exploiting a bug in a video game to illegitimately create duplicates of unique items or currency Currency dupes cause inflation and cause the item to lose value Currency dupes cause inflation and cause the item to lose value This can create a great problem in the games economy and even with real money selling, This can create a great problem in the games economy and even with real money selling, Not sure if real or dupe Not sure if real or dupe

Solving These Security Issues admins/moderators admins/moderators In game playere take care of many of the problems in the game In game playere take care of many of the problems in the game power to ban accounts power to ban accounts Patches Patches fix and exploits or bugs in the game fix and exploits or bugs in the game Third Party Programs Third Party Programs create a secure environment for their game create a secure environment for their game Example: nProtect Game Guard Example: nProtect Game Guard

Pirating The act of downloading or stealing a game without paying for it. Major Security Issue Major Security Issue Severe loss of funding Severe loss of funding Future Games Why make any more? Anyone could be a pirate… Mr. Burmester is not a pirate… as far as we know

Why pirate games? A Known Pirate’s Response! “Why not just buy your games to support the company?” - Matt “Why not just buy your games to support the company?” - Matt “I go to college man, that’s expensive, and video games are all fifty to sixty dollars. I still buy games when I know they will be good, but most of the new video games are not worth thirty dollars.” “I go to college man, that’s expensive, and video games are all fifty to sixty dollars. I still buy games when I know they will be good, but most of the new video games are not worth thirty dollars.” – Anonymous FSU Student

Cliff Harris, owner of Positech Games Harris asked why people pirated his games? Harris asked why people pirated his games? Money Strong dislike of Digital Rights Management locks (SecuROM) Unknown quality

The Designers Strike Back! Class-action lawsuits Class-action lawsuits More, and stricter SecuROM More, and stricter SecuROM

Honest customer suffer, pirates laugh SecuROM had the opposite effect that companies wanted. Man in Pennsylvania files class action lawsuit against EA for installing files not mentioned in his installation manual or End User License Agreement. How far is too far? How far is too far? Should companies have the right to install unwanted, additional software on our machines? Are the machines resources not the customer’s? Why so hard to remove?

SecuROM causing more people to pirate? Spore, a recently released EA Games PC game, was not only pirated, the game’s SecuROM was removed from the pirated version, and being downloaded BEFORE the actual release date. Spore, a recently released EA Games PC game, was not only pirated, the game’s SecuROM was removed from the pirated version, and being downloaded BEFORE the actual release date. Over 500,000 copies of the pirated version of Spore had been downloaded just days after release. Over 500,000 copies of the pirated version of Spore had been downloaded just days after release. Over $13,333,333 loss Over $13,333,333 loss

The harsh SecuROMs are not causing an acceptable solution. Honest customers suffer Honest customers suffer – Unwanted software. – Has been known to cause problems with machines. Developers suffer Developers suffer – Harsh feedback from actual customers. – Game still gets pirated, possibly more so than it would have without the harsh SecuROM. Pirates laugh! They just remove the harsh SecuROM and continue to pirate the games. Pirating becomes more acceptable to honest users to avoid the harsh SecuROM.

Acceptable Solution? Steam. Online video game purchase/storage device. Cheaper, no middle man Easy access Games stored to account, not machine Light on SecuROM since game is guaranteed to be legit. /

Questions?