메뉴 건너뛰기




Volumn , Issue , 2008, Pages 15-20

Stealth measurements for cheat detection in on-line games

Author keywords

[No Author keywords available]

Indexed keywords

CHEAT DETECTION; CLIENT MACHINE; IN-NETWORK; ON-LINE GAMES; TAMPER-RESISTANT;

EID: 70349101151     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1517494.1517497     Document Type: Conference Paper
Times cited : (28)

References (13)
  • 2
    • 74049119193 scopus 로고    scopus 로고
    • Even Balance, Inc, Online Countermeasures
    • Even Balance, Inc. PunkBuster Online Countermeasures. http://evenbalance.com.
    • PunkBuster
  • 3
  • 5
    • 70349142321 scopus 로고    scopus 로고
    • Hacking World of Warcraft: An Exercise in Advanced Rootkit Design
    • G. Hoglund. Hacking World of Warcraft: An Exercise in Advanced Rootkit Design. In Black Hat, 2006.
    • (2006) Black Hat
    • Hoglund, G.1
  • 8
    • 84869627875 scopus 로고    scopus 로고
    • Lavish Software
    • Lavish Software. On Warden Blog. http://onwarden.blogspot.com/.
    • On Warden Blog
  • 9
    • 74049155700 scopus 로고    scopus 로고
    • netCoders. The Unerring Punkbuster⋯ http://forum.netcoders.cc/ announcements/14061-unerring-punkbuster.html.
    • The Unerring Punkbuster⋯
  • 10
    • 58049215444 scopus 로고    scopus 로고
    • Is a Bot at the Controls - Detecting Input Data Attacks
    • October
    • T. Schluessler, E. Johnson, and S. Goglin. Is a Bot at the Controls - Detecting Input Data Attacks. In NetGames, October 2007.
    • (2007) NetGames
    • Schluessler, T.1    Johnson, E.2    Goglin, S.3
  • 11
    • 70349098890 scopus 로고    scopus 로고
    • Solar Designer. Getting Around Non-executable Stack (and Fix), August 1997. Bugtraq Mailing List.
    • Solar Designer. Getting Around Non-executable Stack (and Fix), August 1997. Bugtraq Mailing List.
  • 12
    • 70349126802 scopus 로고    scopus 로고
    • Runtime Integrity and Presence Verification for Software Agents
    • December
    • T. Schluessler et. al. Runtime Integrity and Presence Verification for Software Agents. In Technology@Intel Magazine, December 2005.
    • (2005) Technology@Intel Magazine
    • Schluessler, T.1    et., al.2
  • 13
    • 77949482440 scopus 로고    scopus 로고
    • Hardware Virtualization-Based Rootkits
    • D. Zovi. Hardware Virtualization-Based Rootkits. In Black Hat, 2006.
    • (2006) Black Hat
    • Zovi, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.