Abstract
Collusion between partners in Contract Bridge is an oft-used example in cryptography papers and an interesting topic for the development of covert channels. In this paper, a different type of collusion is discussed, where the parties colluding are not part of one team, but instead are multiple independent players, acting together in order to achieve a result that none of them are capable of achieving by themselves. Potential advantages and defences against collusion are discussed. Techniques designed for low-probability-of-intercept spread spectrum radio and multilevel secure systems are also applied in developing covert channels suitable for use in games. An example is given where these techniques were successfully applied in practice, in order to win an online programming competition. Finally, suggestions for further work are explored, including exploiting similarities between competition design and the optimisation of voting systems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
American Contract Bridge League: Law 20. Review and Explanation of Calls, in Laws of Duplicate Contract Bridge, American Edition (1997)
American Contract Bridge League: Laws of Contract Bridge (Rubber Bridge Laws, American Edition) (1993)
Winkler, P.: The advent of cryptology in the game of Bridge. Cryptologia 7, 327–332 (1983)
Gligor, V.D.: DoD NCSC-TG-030 A Guide to Understanding Covert Channel Analysis of Trusted Systems (Light-Pink Book). National Computer Security Center (1993)
Huskamp, J.C.: Covert Communication Channels in Timesharing System. PhD thesis, University of California, Berkeley, California, Technical Report UCBCS- 78-02 (1978)
Kang, M.H., Moskowitz, I.S.: A pump for rapid, reliable, secure communication. In: 1st ACM Conf. on Computer and Communications Security, Fairfax, VA, Center for High Assurance Computer Systems, pp. 119–129 (1993)
Millen, J.K.: Finite-state noiseless covert channels. In: Proceedings of the Computer Security Foundations Workshop, Franconia, New Hampshire, pp. 81–85 (1989)
Knuth, D.E.: The Art of Computer Programming, 3rd edn. Seminumerical Algorithms, vol. 2. Addison-Wesley, Reading (1998)
Cambridge University Computing Society: Winter programming competition (2002), http://www.cucs.ucam.org/competition.html
Allis, L.V.: A knowledge-based approach of connect-four. Master’s thesis, Vrije Universiteit, Amsterdam, The Netherlands (1988), ftp://ftp.cs.vu.nl/pub/victor/connect4.ps.Z
Arrow, K.J.: Social Choice and Individual Values, 2nd edn. Yale Univ. Press, New Haven (1970)
Satterthwaite, M.: Strategy-proofness and Arrow’s condition: Existence and correspondence theorems for voting procedures and social welfare functions. Journal of Economic Theory 10, 187–217 (1975)
Gibbard, A.: Manipulation of voting schemes: a general result. Econometrica 41, 587–601 (1973)
Gärdenfors, P.: Manipulations of social choice functions. Journal of Economic Theory 13, 217–228 (1976)
Dutta, B., Jackson, M.O., Breton, M.L.: Strategic candidacy and voting procedures. Econometrica 69, 1013–1038 (2001)
Dutta, B., Jackson, M.O., Breton, M.L.: Voting by successive elimination and strategic candidacy. Journal of Economic Theory 103, 190–218 (2002)
Yan, J.: Security design in online games. In: 19th Annual Computer Security Applications Conference, Acteve (1993)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Murdoch, S.J., Zieliński, P. (2004). Covert Channels for Collusion in Online Computer Games. In: Fridrich, J. (eds) Information Hiding. IH 2004. Lecture Notes in Computer Science, vol 3200. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30114-1_25
Download citation
DOI: https://doi.org/10.1007/978-3-540-30114-1_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-24207-9
Online ISBN: 978-3-540-30114-1
eBook Packages: Computer ScienceComputer Science (R0)