Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2505906.2505912acmconferencesArticle/Chapter ViewAbstractPublication PagesmobicomConference Proceedingsconference-collections
research-article

Towards providing security for mobile games

Published: 04 October 2013 Publication History

Abstract

Mobile security for games is often ignored when discussing architectural design of mobile systems. Substantial increase in the power and networking capabilities of smartphones has led to the emergence of mobile games, and mobile gamers now outnumber "core" gamers. These games include many genres of gaming with different and new requirements. Here we discuss existing and potential new avenues of cheating in mobile games and suggest several solutions based on how different existing and novel services can be provided by carriers, ecosystems, and developers to improve the security.

References

[1]
K. Chen, H. K. Pao, and H. C. Chang. Game bot identification based on manifold learning. In NETGAMES. ACM, 2008.
[2]
Comscore smartphone report. http://www.comscore.com/Insights/Press_Releases/2013/5/comScore_Reports_March_2013_U.S._Smartphone_Subscriber_Market_Share, 2013.
[3]
W. Feng, E. Kaiser, and T. Schluessler. Stealth measurements for cheat detection in on-line games. In NETGAMES. ACM, 2008.
[4]
S. Ferretti and M. Roccetti. AC/DC: an algorithm for cheating detection by cheating. In NOSSDAV. ACM, 2006.
[5]
P. Golle and N. Ducheneaut. Preventing bots from playing online games. Computers in Entertainment, 3(3):3, 2005.
[6]
W. He, X. Liu, H. Nguyen, K. Nahrstedt, and T. Abdelzaher. Pda: Privacy-preserving data aggregation in wireless sensor networks. In INFOCOM, pages 2045--2053, may 2007.
[7]
W. He, X. Liu, and M. Ren. Location cheating: A security challenge to location-based social network services. In ICDCS, pages 740--749, 2011.
[8]
NPD, Gfk, IDG, MSFT Estimates. http://news.xbox.com/2013/05/x360-aaron-greenberg-industry-growth, 2013.
[9]
PunkBuster: the original anti-cheat system for online multiplayer games. http://www.evenbalance.com/, 2013.
[10]
S. Saroiu and A. Wolman. I am a sensor, and i approve this message. In HOTMOBILE, pages 37--42. ACM, 2010.
[11]
T. Schluessler, S. Goglin, and E. Johnson. Is a bot at the controls?: Detecting input data attacks. In NETGAMES, pages 1--6. ACM, 2007.
[12]
VAC: valve anti cheat. https://support.steampowered.com/kb_article.php?p_faqid=370, 2013.
[13]
S. D. Webb and S. Soh. Cheating in networked computer games: a review. In DIMEA, pages 105--112. ACM, 2007.
[14]
Z. Xu, K. Bai, and S. Zhu. Taplogger: inferring user inputs on smartphone touchscreens using on-board motion sensors. In WISEC, pages 113--124. ACM, 2012.
[15]
A. Yahyavi, K. Huguenin, J. Gascon-Samson, J. Kienzle, and B. Kemme. Watchmen: Scalable cheat-resistant support for distributed multi-player online games. In ICDCS, 2013.
[16]
A. Yahyavi and B. Kemme. Peer-to-peer archoitectures for massively multiplayer online games: A survey. CSUR, 2013.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MobiArch '13: Proceedings of the eighth ACM international workshop on Mobility in the evolving internet architecture
October 2013
60 pages
ISBN:9781450323666
DOI:10.1145/2505906
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 October 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cheating
  2. detection
  3. games
  4. mobile
  5. prevention
  6. security

Qualifiers

  • Research-article

Conference

MobiCom'13
Sponsor:

Acceptance Rates

MobiArch '13 Paper Acceptance Rate 8 of 16 submissions, 50%;
Overall Acceptance Rate 47 of 92 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 328
    Total Downloads
  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)1
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media