Abstract
Over the last years, it has become clear that online games are one of the most used applications on the Internet. This increasing popularity has attracted an influx of players, with some of them trying to gain an unfair advantage for economic reasons, e.g., eSports tournaments, through the use of cheats and exploits. From a different perspective, it is of utmost importance to start analyzing attacks from a defensive perspective to create novel mechanisms that can stop such behaviors. In this work, we introduce a novel solution that extends current anti-cheat solutions through Intel SGX. Our solution moves the core cheat detection engine to a secure enclave provided by SGX while making use of a kernel module for the necessary primitives for system-wide protection. With this, we can prevent client-side tampering in both game code and configuration data by creating a trusted execution environment isolated from the hosting operating system. We are making it capable of preventing the attacker from modifying the cheat detection engine and associated game files. This solution blocks known attacks in games such as CS:GO while maintaining the performance, ensuring gameplay integrity and fairness.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Baumann, A., Peinado, M., Hunt, G.: Shielding applications from an untrusted cloud with haven. ACM Trans. Comput. Syst. (TOCS) 33(3), 1–26 (2015)
Arnautov, S., et al.: SCONE: secure linux containers with intel SGX. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016), pp. 689–703 (2016)
Davidovici-Nora, M.: Paid and free digital business models innovations in the video game industry. Digiworld Econ. J. (94), 2nd Q, p. 83 (2014). Available at SSRN: https://ssrn.com/abstract=2534022
Bauman, E., Lin, Z.: A case for protecting computer games with SGX. In: Proceedings of the 1st Workshop on System Software for Trusted Execution (SysTEX 2016), New York, NY, USA. ACM Article 4, 6 pages. https://doi.org/10.1145/3007788.3007792
Korkin, I.: Two challenges of stealthy hypervisors detection: time cheating and data fluctuations. arXiv preprint arXiv:1506.04131 (2015)
Yan, J., Randell, B.: A systematic classification of cheating in online games, pp. 1–9 (2005). https://doi.org/10.1145/1103599.1103606
Pritchard, M.: How to hurt the hackers: the scoop on internet cheating and how you can combat it. Inf. Secur. Bull. (2011)
Schwarz, M., Weiser, S., Gruss, D.: Practical Enclave Malware with Intel SGX (2019)
Intel: IntelR\(\copyright \)64 and IA-32 Architectures Software Developer’s Manual, Vol-ume 3 (3A, 3B & 3C): System Programming Guide (325384) (2016)
Rostedt, S.: Ftrace kernel hooks: more than just tracing. In: Linux Plumbers Conference (2014)
Bauman, E., Wang, H., Zhang, M., Lin, Z.: SGXElide: enabling enclave code secrecy via self-modification. 75–86 (2018). https://doi.org/10.1145/3168833
Berdajs, J., Bosnić, Z.: Extending applications using an advanced approach to DLL injection and API hooking. Softw. Pract. Exp. 40, 567–584 (2010). https://doi.org/10.1002/spe.973
Tuzel, T., et al.: Who watches the watcher? Detecting hypervisor introspection from unprivileged guests. Digit. Invest. 26, S98–S106 (2018)
Feng, W., Kaiser, E.S., Chluessler, T.: Stealth measurements for cheat detection in on-line games. 15–20 (2008). https://doi.org/10.1145/1517494.1517497
Cox, A., Kuznetsov, A., McHardy, P.: Netlink https://github.com/torvalds/linux/tree/master/net/netlink. Accessed 212 June 020
Deng, Z., Zhang, X., Xu, D.: SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization (2013). https://doi.org/10.1145/2523649.2523675
Kyte, I., Zavarsky, P., Lindskog, D., Ruhl, R.: Enhanced Side-channel Analysis Method to Detect Hardware Virtualization Based Rootkits (2012)
Tanda, S.: DdiMon Github, 22 September 2018,. https://github.com/tandasat/DdiMon. Accessed 19 Sept 2019
libperflogger - Game performance logging library. https://github.com/Lurkki14/libperflogger. Accessed 19 Sept 2019
Fuzion - Open Source Linux Counter Strike: Global Offensive Cheat. https://github.com/LWSS/Fuzion. Accessed 19 Sept 2019
Counter Strike: Global Offensive benchmark map. https://steamcommunity.com/sharedfiles/filedetails/?id=500334237. Accessed 19 Sept 2019
GameBlocks, LLC. Fairfight server-sided anti-cheat. https://gameblocks.com/. Accessed 19 Sept 2019
Epic Games, Inc., Easy Anti-Cheat. https://www.easy.ac. Accessed 19 Sept 2019
BattlEye Innovations. BattlEye AntiCheat. https://www.battleye.com/. Accessed 19 Sept 2019
Cowley, D.: Epic Games Acquires Kamu, Game Security and Player Services Company, 8 October 2018. https://www.unrealengine.com/en-US/blog/epic-games-acquires-kamu-game-security-and-player-services-company. Accessed 19 Sept 2019
Acknowledgments
This work is financed by National Funds through the Portuguese funding agency, FCT - Fundação para a Ciência e a Tecnologia, within project UIDB/50014/2020. This work of João S. Resende was supported by Fundação para a Ciência e Tecnologia (FCT), Portugal, PD/BD/128149/2016. This work of André Brandão is also financed by National Funds through the Portuguese funding agency, FCT - Fundação para a Ciência e a Tecnologia within project CMU/CS/0042/2017 and by the EU H2020-SU-ICT-03-2018 Project No. 830929 CyberSec4Europe (cybersec4europe.eu).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Brandão, A., Resende, J.S., Martins, R. (2020). Employment of Secure Enclaves in Cheat Detection Hardening. In: Gritzalis, S., Weippl, E.R., Kotsis, G., Tjoa, A.M., Khalil, I. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2020. Lecture Notes in Computer Science(), vol 12395. Springer, Cham. https://doi.org/10.1007/978-3-030-58986-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-58986-8_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-58985-1
Online ISBN: 978-3-030-58986-8
eBook Packages: Computer ScienceComputer Science (R0)