CS 592: Security Practicum Lecture 1 Introduction.

Slides:



Advertisements
Similar presentations
Multiplayer Online Games An-Cheng Huang Bruce Maggs.
Advertisements

Video Game Security Brett Cobbs Matthew Boquist. ONLINE VIDEO GAMES controlled a majority of the computer world for sometime now and have never stopped.
Cheat-Proofing P2P Online-gaming Albert Lee Spring 2008 Comp 424.
Competitive Video Gaming By: Tyler Busby. Overview Landmark competitive games Competitive video game culture Lives of professional gamers.
Introduction: Foundations of Computational Science Dr. Greg Wettstein, Ph.D. Research Support Group Leader Division of Information Technology Adjunct Professor.
Enhancing Education Through Technology Round 9 Competitive.
Acquiring English Through World of Warcraft: A Study of Overt Language Learning Strategies and Their Effects on English Language Development Principle.
A Service Platform for On-Line Games DebanJan Saha, Dambit Sahu, Anees Shaikh (IBM TJ Watson Research Center, NY) Presented by Gary Huang March 17, 2004.
Provisioning On-line Games: A Traffic Analysis of a Busy Counter-Strike Server Wu-chang Feng, Francis Chang, Wu-chi Feng, Jonathan Walpole.
Welcome to CS 450 Internet Security: A Measurement-based Approach.
Computer Game Development Dr. Scott Schaefer. Course Information Instructor: Dr. Schaefer / Dr. Srinivasan Office:HRBB 527B / Langford C 418 Office Hours:
April 13, 2004CS WPI1 CS 562 Advanced SW Engineering General Dynamics, Needham Tuesdays, 3 – 7 pm Instructor: Diane Kramer.
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
Game Development Essentials An Introduction. Chapter 3 Game Elements what are the possibilities?
A role-playing game RPG is a game in which players assume the roles of characters in a fictional setting. Players take responsibility for acting out these.
1 Efficient Management of Data Center Resources for Massively Multiplayer Online Games V. Nae, A. Iosup, S. Podlipnig, R. Prodan, D. Epema, T. Fahringer,
My Hobby is Gaming By: Anthony Lupi World of Warcraft The Elder Scrolls V: Skyrim Team Fortress 2 How I got started How long have you been doing it and.
Welcome to CPCS 214 Computer Organization & Architecture Spring 2008 Muhammad Al-Hashimi Media clips are from the MS Office clip art collection copyright.
1 Lecture 9 Training & Development & Orientation Concept of Training & Development Issues Related to Training Training & Development Process Training Methods.
CT 1503 Network Operating Systems Instructor: Dr. Najla Al-Nabhan 2014.
Type of Software There are two main types of software They are System software Application software Hardware System Software (OS) Application Software.
Digital Marketing Essentials
Tom Chilton Wow graphic designer Tom Chilton tom Chilton, lead designer of blizzard and one of the three main designers of the massive mmorpg (multiplayer.
Introduction to Network Security J. H. Wang Feb. 24, 2011.
James Tam CPSC 203: Introduction To Computers (Independent Study) James Tam.
Embedded Systems Design Summer Instructor: George Rudolph, Summer Instructor Info Instructor: George Rudolph Instructor: George Rudolph.
CSCD 434 Network Security Spring 2014 Lecture 1 Course Overview.
CS525 DATA MINING COURSE INTRODUCTION YÜCEL SAYGIN SABANCI UNIVERSITY.
CS355 Advanced Computer Architecture Fatima Khan Prince Sultan University, College for Women.
CS 390 Unix Programming Summer Unix Programming - CS 3902 Course Details Online Information Please check.
CS 494 Web Development Class Size: Winter, 214: 97 Spring, 214: 81 Summer, 2014: 69.
Standard Grade Physical Education Adaptation. Ways we can adapt activities  Rules  Equipment  Duration  Size/layout  No. of players.
Software Instrumentation of Computer and Video Games T. Bullen and M. Katchabaw Department of Computer Science The University of Western Ontario N. Dyer-Witheford.
Not just fun, but serious strategies: Using meta-cognitive strategies in game-based learning Kim, B., Park, H., & Baek, Y. (2009). Not just fun, but serious.
Multicore Computing Lecture 1 : Course Overview Bong-Soo Sohn Associate Professor School of Computer Science and Engineering Chung-Ang University.
Program “Siberian Region in Russia and the World”.
CS Welcome to CS 5383, Topics in Software Assurance, Toward Zero-defect Programming Spring 2007.
INF 117 Project in Software Engineering Lecture Notes -Winter Quarter, 2008 Michele Rousseau Set 1.
Computer Engineering 1502 Advanced Digital Design Professor Donald Chiarulli Computer Science Dept Sennott Square
Introduction to Information Security J. H. Wang Sep. 18, 2012.
CS5222 Adv. Comp. Arch. Part 0 Page.1 Chi C.H. Fall 2003 NUS CS5222 Advanced Computer Architecture Part 0: Course Introduction Fall Term, 2003/2004 Chi.
1991-current Games development and software production company.
Open Culture Robin Burke GAM 224. Outline Admin Open Culture fan-dom open architectures / tools machinima Cultural Resistance.
Template This is a template to help, not constrain, you. Modify as appropriate. Move bullet points to additional slides as needed. Don’t cram onto a single.
CS 592: Security Practicum Lecture 2 On-line PC games and their cheats.
CS 162 Introduction to Computer Science II Winter, 2014: 60 Spring, 2014: 60 Summer, 2014: 71.
Culminating Project EDUC 3200 Instructional Tech-Media Instructor Brown Presented by: DeShone O. Watson.
Dialogue is changing … * For “Syracuse Collaborative Learning Environment” * … to.
What strategies do we cover? 1. No specialised roles Strategy where players play all the positions (no specialists) Strategy where players play all the.
What do we know from research on:. Key points Digital games for learning have some distinctive features (see slide 3) Digital games for learning can have.
BPA 303 Educational Tutor/ indigohelp. BPA 303 Entire Course BPA 303 Week 1 DQ 1 BPA 303 Week 1 Individual Assignment Theories Paper BPA 303 Week 1 DQ.
Multicore Computing Lecture 1 : Course Overview Bong-Soo Sohn Associate Professor School of Computer Science and Engineering Chung-Ang University.
IBM Rational Development University of Technology Sydney March 6, 2012 John Schilt Academic Initiative Lead IBM Australia / New Zealand
2D Game Programming with XNA 4.0. Principles of Game Programming Game Programming Basics Mouse & Keyboard Controls Sounds Sprites and Animation Collision.
Course Information Andy Wang CIS 5930 Computer Systems Performance Analysis.
What do we know from research on:
Resource Management IB Computer Science.
CMSC 611 Advanced Computer Arch.
EECE 315: Operating Systems
Criminal Justice Careers
CSCD 434 Network Security Spring 2012 Lecture 1 Course Overview.
CS & CS Capstone Project & Software Development Project
CMSC 611 Advanced Computer Arch.
Syllabus.
IMPLEMENTATION TEAM STRUCTURE, ROLES, AND RESPONSIBILITIES
Human Media Multicore Computing Lecture 1 : Course Overview
Human Media Multicore Computing Lecture 1 : Course Overview
CSCD 434 Network Security Spring 2019 Lecture 1 Course Overview.
Factor Game Sample Game.
Term Dr Abdelhafid Bouhraoua
Presentation transcript:

CS 592: Security Practicum Lecture 1 Introduction

Instructor Wu-chang Feng –Office: FAB –Office hours: After class Course information –Join –Goto – es/cs592http:// es/cs592

Good news, Bad news Bad news –This is not the course described in the catalog Good news –You can still drop the course if you do not like what we’ll be doing

What is this course? Precursor to a research project with Intel Hardware mechanisms to detect execution of undesirable software –Focus on cheating in on-line games

Course objectives Examine Intel’s AMT platform Survey a variety of cheats across game genres Understand the software mechanism used by cheat software –How it hooks into OS and game –How it hides from detection Understand anti-cheat software and design anti-cheat mechanisms based on Intel’s AMT platform

Why take this course? Latch onto an on-going research project that is being pursued in conjunction with Intel’s research laboratory Potential for research assistantship position ($) if project funded by Intel Potential for a summer internship if your project is successful Inside track to a future job at Intel

Course organization Teams of two will tackle a particular genre Genres to choose from –Cheats for real-time strategy (RTS) games Maphack for Warcraft 3 –Cheats for massively multiplayer on-line role playing (MMORPG) games WoWGlider for World of Warcraft –Cheats for first-person shooters (FPS) games OGC for Half-Life games –Anti-cheat systems Warden for WoW, PunkBuster for Unreal Tournament

Phase I (1 week) Introduction to course Introduction to Intel’s AMT (Active Management Technology) platform

Phase II (4 weeks) Survey the cheats of your chosen genre Give a slide presentation summarizing results –In class on 5/1/2007 –For each cheat, have the following bullets on your slide Web link for cheat What game does it modify? How does it give a player an advantage? What is its software mechanism? What to turn in: –Tarball that includes slides and software for each cheat (if possible) –Grading will be based on thoroughness of survey

Phase III (3 weeks) Analyze software architecture of a chosen cheat/anti-cheat –Cheats How does it modify the game? How does it avoid detection? –Anti-cheats How does it perform detection? What does it measure and when does it measure it? How can it be subverted? Give a slide presentation summarizing results –In class on 5/22/2007 What to turn in: –Tarball that includes slides and software for chosen cheat

Phase 4 (2 weeks) Apply the AMT system to your chosen cheat/anti- cheat Emulate AMT using a multi-core or multi- processor –Create a monitoring process that detects the presence of the cheat –Examine how to adapt the anti-cheat to the AMT platform Give a slide presentation summarizing results –In class on 6/5/2007 What to turn in: –Tarball that includes slides and/or code that demonstrates the ability to use the AMT approach to properly detect chosen cheat

Evaluation Phase 2 (Survey) = 40% Phase 3 (Disassembly) = 30% Phase 4 (AMT counter-measure) = 30%