Skip to main content

Final Fantasy – Securing On-Line Gaming with Trusted Computing

  • Conference paper
Autonomic and Trusted Computing (ATC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4610))

Included in the following conference series:

Abstract

On-line gaming has seen something of a popular explosion in recent years, and is rapidly becoming the predominant focus of many gaming platforms. Unfortunately, honesty is not a virtue favoured by all players in these networks. This paper proposes a Trusted Computing based security framework for gaming consoles that will be resilient to platform modification based cheating mechanisms. In addition to this, we propose a Trusted Computing based auction mechanism that can be used for auctioning in-game items.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Hoglund, G., McGraw, G.: Exploiting Online Games: How to Break Multi-user Computer Games. Addison-Wesley, London (2007)

    Google Scholar 

  2. Sony Computer Entertainment Inc: DNAS (Dynamic Network Authentication System) (2003), http://www.us.playstation.com/DNAS

  3. BBC News: Virtual property market booming (2005), http://news.bbc.co.uk/1/hi/technology/4421496.stm

  4. Trusted Computing Group: TCG Trusted Network Connect TNC Architecture for Interoperability. 1.1 revision, 6 edn. (2006)

    Google Scholar 

  5. Yan, J., Randell, B.: A systematic classification of cheating in online games. In: NetGames 2005: Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games, pp. 1–9. ACM Press, New York (2005)

    Chapter  Google Scholar 

  6. Intel Corporation: LaGrande Technology Architectural Overview (2003)

    Google Scholar 

  7. Strongin, G.: Trusted computing using AMD Pacifica and Presidio secure virtual machine technology. Information Security Technical Report 10, 120–132 (2005)

    Google Scholar 

  8. Abadi, M., Wobber, T.: A logical account of NGSCB. In: de Frutos-Escrig, D., Núñez, M. (eds.) FORTE 2004. LNCS, vol. 3235, pp. 1–12. Springer, Heidelberg (2004)

    Google Scholar 

  9. Lemos, R.: World of warcraft hackers using Sony BMG rootkit (2005), http://www.securityfocus.com/news/10232

  10. Trusted Computing Group: TPM Main: Part 1 Design Principles. 1.2 revision, 93 edn. (2006)

    Google Scholar 

  11. Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A trusted open system. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) E-Commerce and Web Technologies. LNCS, vol. 2738, pp. 86–97. Springer, Heidelberg (2003)

    Google Scholar 

  12. Mitchell, C. (ed.): Trusted Computing. IEE Press, New York (2005)

    Google Scholar 

  13. Pearson, S. (ed.): Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, Englewood Cliffs (2002)

    Google Scholar 

  14. Trusted Computing Group: TPM Main: Part 3 Commands. 1.2 revision, 93 edn. (2006)

    Google Scholar 

  15. Group, T.C.: TCG Software Stack Specificiation Version 1.2 Level 1 (2006)

    Google Scholar 

  16. Klemperer, P.: Auctions: Theory and Practice (The Toulouse Lectures in Economics). Princeton University Press, Princeton (2004)

    Google Scholar 

  17. Ivanova-Stenzel, R., Salmon, T.C.: Revenue equivalence revisited. In: Discussion Papers 175, SFB/TR 15 Governance and the Efficiency of Economic Systems. Free University of Berlin, Humboldt University of Berlin, University of Bonn, University (2006)

    Google Scholar 

  18. Omote, K.: A Study on Electronic Auctions. PhD thesis, Japan Advanced Institute of Science and Technology (2002)

    Google Scholar 

  19. Trusted Computing Group — TCG Infrastructure Workgroup: Subject Key Attestation Evidence Extension. V1.0 revision, 7 th edn. (2005)

    Google Scholar 

  20. Group, T.C.: TPM Main: Part 2 Structures of the TPM. 1.2 revision, 93 rd edn. (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bin Xiao Laurence T. Yang Jianhua Ma Christian Muller-Schloer Yu Hua

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Balfe, S., Mohammed, A. (2007). Final Fantasy – Securing On-Line Gaming with Trusted Computing. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73547-2_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73546-5

  • Online ISBN: 978-3-540-73547-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics