Skip to main content

Anti-Cheat Tool for Detecting Unauthorized User Interference in the Unity Engine Using Blockchain

  • Chapter
  • First Online:
Book cover Data-Centric Business and Applications

Abstract

The purpose of this paper was to analyse problem of cheating in online games and to design a comprehensive tool for the Unity engine that detects and protects the applications against unauthorized interference by the user. The basic functionality of the tool is detecting and blocking unauthorized interference in the device’s memory, detecting the modification of the speed of time flow in the game and detecting time changes in the operating system. The research also examined the current potential of blockchain technology as a secure database for the game. Proposed algorithms where implemented and tested for usability and speed of operation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Feng WC, Kaiser E, Schluessler T (2008). Stealth measurements for cheat detection in on-line games. In: Proceedings of the 7th ACM SIGCOMM workshop on network and system support for games. ACM, pp 15–20

    Google Scholar 

  2. Heo GI, Heo CI, Kim HK (2015) A study on mobile game security threats by analyzing malicious behavior of auto program of clash of clans. J Korea Inst Inf Secur Cryptol 25(6):1361–1376

    Article  Google Scholar 

  3. Bremer J (2013) Automated analysis and deobfuscation of android apps & malware. Freelance Security Researcher

    Google Scholar 

  4. Consalvo M (2007) Cheating: gaining advantage in videogames. Massachusetts Institute of Technology, pp 5–8

    Google Scholar 

  5. McGraw G, Hoglund G (2007) Online games and security. In: IEEE Security & Privacy, vol 5, no 5, pp 76–79

    Google Scholar 

  6. Joshi R Cheating and virtual crimes in massively multiplayer online games. Royal University of London

    Google Scholar 

  7. Tolbaru SA (2011) Cheating in online video games, University of Copenhagen, Datalogisk Institut, 15 Aug 2011

    Google Scholar 

  8. Yeung SF, Lui JCS, Liu J, Yan J (2006) Detecting cheaters for multiplayer games: theory, design and implementation 1178–1182

    Google Scholar 

  9. Yan J, Randell B (2005) A systematic classification of cheating in online games. In: Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games. ACM

    Google Scholar 

  10. Park JK, Han ML, Kim HK (2015) A study of cheater detection in FPS game by using user log analysis. J Korea Game Soc 15(3):177–188

    Article  Google Scholar 

  11. Ahn D, Yoo B (2017). A study of cheating identification and measurement of the effect in online game

    Google Scholar 

  12. Raymond E (1999) The case of the quake cheats, Unpublished manuscript

    Google Scholar 

  13. Baughman N, Levine B (2001) Cheat-proof playout for centralized and distributed online games. In: Proceedings of the twentieth IEEE INFOCOM conference

    Google Scholar 

  14. Li K, Ding S, McCreary D (2004) Analysis of state exposure control to prevent cheating in online games. In: The 14th ACM international workshop on network and operating systems support for digital audio and video (NOSSDAV)

    Google Scholar 

  15. Cano N (2016) Game hacking: developing autonomous bots for online games. No Starch Press

    Google Scholar 

  16. Olleros FX, Zhegu M (2016) Research handbook on digital transformations, Edward Elgar Publishing

    Google Scholar 

  17. Swan M (2015) Blockchain: Blueprint for a new economy, O’Reilly Media

    Google Scholar 

  18. Zyskind G, Nathan O (2015) Decentralizing privacy: using blockchain to protect personal data. In: Security and privacy workshops (SPW), 2015. IEEE, pp 180–184

    Google Scholar 

  19. McDonald J (Valve), Using deep learning to combat cheating in CSGO

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michal Kedziora .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Kedziora, M., Gorka, A., Marianski, A., Jozwiak, I. (2020). Anti-Cheat Tool for Detecting Unauthorized User Interference in the Unity Engine Using Blockchain. In: Poniszewska-Marańda, A., Kryvinska, N., Jarząbek, S., Madeyski, L. (eds) Data-Centric Business and Applications. Lecture Notes on Data Engineering and Communications Technologies, vol 40. Springer, Cham. https://doi.org/10.1007/978-3-030-34706-2_10

Download citation

Publish with us

Policies and ethics