Advertisement

Final Fantasy – Securing On-Line Gaming with Trusted Computing

  • Shane Balfe
  • Anish Mohammed
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4610)

Abstract

On-line gaming has seen something of a popular explosion in recent years, and is rapidly becoming the predominant focus of many gaming platforms. Unfortunately, honesty is not a virtue favoured by all players in these networks. This paper proposes a Trusted Computing based security framework for gaming consoles that will be resilient to platform modification based cheating mechanisms. In addition to this, we propose a Trusted Computing based auction mechanism that can be used for auctioning in-game items.

Keywords

Trusted Platform Module Access Requestor Trust Computing Policy Decision Point English Auction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hoglund, G., McGraw, G.: Exploiting Online Games: How to Break Multi-user Computer Games. Addison-Wesley, London (2007)Google Scholar
  2. 2.
    Sony Computer Entertainment Inc: DNAS (Dynamic Network Authentication System) (2003), http://www.us.playstation.com/DNAS
  3. 3.
    BBC News: Virtual property market booming (2005), http://news.bbc.co.uk/1/hi/technology/4421496.stm
  4. 4.
    Trusted Computing Group: TCG Trusted Network Connect TNC Architecture for Interoperability. 1.1 revision, 6 edn. (2006)Google Scholar
  5. 5.
    Yan, J., Randell, B.: A systematic classification of cheating in online games. In: NetGames 2005: Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games, pp. 1–9. ACM Press, New York (2005)CrossRefGoogle Scholar
  6. 6.
    Intel Corporation: LaGrande Technology Architectural Overview (2003)Google Scholar
  7. 7.
    Strongin, G.: Trusted computing using AMD Pacifica and Presidio secure virtual machine technology. Information Security Technical Report 10, 120–132 (2005)Google Scholar
  8. 8.
    Abadi, M., Wobber, T.: A logical account of NGSCB. In: de Frutos-Escrig, D., Núñez, M. (eds.) FORTE 2004. LNCS, vol. 3235, pp. 1–12. Springer, Heidelberg (2004)Google Scholar
  9. 9.
    Lemos, R.: World of warcraft hackers using Sony BMG rootkit (2005), http://www.securityfocus.com/news/10232
  10. 10.
    Trusted Computing Group: TPM Main: Part 1 Design Principles. 1.2 revision, 93 edn. (2006)Google Scholar
  11. 11.
    Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A trusted open system. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) E-Commerce and Web Technologies. LNCS, vol. 2738, pp. 86–97. Springer, Heidelberg (2003)Google Scholar
  12. 12.
    Mitchell, C. (ed.): Trusted Computing. IEE Press, New York (2005)Google Scholar
  13. 13.
    Pearson, S. (ed.): Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, Englewood Cliffs (2002)Google Scholar
  14. 14.
    Trusted Computing Group: TPM Main: Part 3 Commands. 1.2 revision, 93 edn. (2006)Google Scholar
  15. 15.
    Group, T.C.: TCG Software Stack Specificiation Version 1.2 Level 1 (2006)Google Scholar
  16. 16.
    Klemperer, P.: Auctions: Theory and Practice (The Toulouse Lectures in Economics). Princeton University Press, Princeton (2004)Google Scholar
  17. 17.
    Ivanova-Stenzel, R., Salmon, T.C.: Revenue equivalence revisited. In: Discussion Papers 175, SFB/TR 15 Governance and the Efficiency of Economic Systems. Free University of Berlin, Humboldt University of Berlin, University of Bonn, University (2006)Google Scholar
  18. 18.
    Omote, K.: A Study on Electronic Auctions. PhD thesis, Japan Advanced Institute of Science and Technology (2002)Google Scholar
  19. 19.
    Trusted Computing Group — TCG Infrastructure Workgroup: Subject Key Attestation Evidence Extension. V1.0 revision, 7 th edn. (2005)Google Scholar
  20. 20.
    Group, T.C.: TPM Main: Part 2 Structures of the TPM. 1.2 revision, 93 rd edn. (2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Shane Balfe
    • 1
  • Anish Mohammed
    • 2
  1. 1.Royal Holloway, University of London, Egham, Surrey, TW20 8XFU.K.
  2. 2.Capgemini UK PLC, Floor 1-5, 76-78 Wardour Street, London, W1F 0UUU.K.

Personalised recommendations