Abstract
On-line gaming has seen something of a popular explosion in recent years, and is rapidly becoming the predominant focus of many gaming platforms. Unfortunately, honesty is not a virtue favoured by all players in these networks. This paper proposes a Trusted Computing based security framework for gaming consoles that will be resilient to platform modification based cheating mechanisms. In addition to this, we propose a Trusted Computing based auction mechanism that can be used for auctioning in-game items.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Hoglund, G., McGraw, G.: Exploiting Online Games: How to Break Multi-user Computer Games. Addison-Wesley, London (2007)
Sony Computer Entertainment Inc: DNAS (Dynamic Network Authentication System) (2003), http://www.us.playstation.com/DNAS
BBC News: Virtual property market booming (2005), http://news.bbc.co.uk/1/hi/technology/4421496.stm
Trusted Computing Group: TCG Trusted Network Connect TNC Architecture for Interoperability. 1.1 revision, 6 edn. (2006)
Yan, J., Randell, B.: A systematic classification of cheating in online games. In: NetGames 2005: Proceedings of 4th ACM SIGCOMM workshop on Network and system support for games, pp. 1–9. ACM Press, New York (2005)
Intel Corporation: LaGrande Technology Architectural Overview (2003)
Strongin, G.: Trusted computing using AMD Pacifica and Presidio secure virtual machine technology. Information Security Technical Report 10, 120–132 (2005)
Abadi, M., Wobber, T.: A logical account of NGSCB. In: de Frutos-Escrig, D., Núñez, M. (eds.) FORTE 2004. LNCS, vol. 3235, pp. 1–12. Springer, Heidelberg (2004)
Lemos, R.: World of warcraft hackers using Sony BMG rootkit (2005), http://www.securityfocus.com/news/10232
Trusted Computing Group: TPM Main: Part 1 Design Principles. 1.2 revision, 93 edn. (2006)
Peinado, M., Chen, Y., England, P., Manferdelli, J.: NGSCB: A trusted open system. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) E-Commerce and Web Technologies. LNCS, vol. 2738, pp. 86–97. Springer, Heidelberg (2003)
Mitchell, C. (ed.): Trusted Computing. IEE Press, New York (2005)
Pearson, S. (ed.): Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall PTR, Englewood Cliffs (2002)
Trusted Computing Group: TPM Main: Part 3 Commands. 1.2 revision, 93 edn. (2006)
Group, T.C.: TCG Software Stack Specificiation Version 1.2 Level 1 (2006)
Klemperer, P.: Auctions: Theory and Practice (The Toulouse Lectures in Economics). Princeton University Press, Princeton (2004)
Ivanova-Stenzel, R., Salmon, T.C.: Revenue equivalence revisited. In: Discussion Papers 175, SFB/TR 15 Governance and the Efficiency of Economic Systems. Free University of Berlin, Humboldt University of Berlin, University of Bonn, University (2006)
Omote, K.: A Study on Electronic Auctions. PhD thesis, Japan Advanced Institute of Science and Technology (2002)
Trusted Computing Group — TCG Infrastructure Workgroup: Subject Key Attestation Evidence Extension. V1.0 revision, 7 th edn. (2005)
Group, T.C.: TPM Main: Part 2 Structures of the TPM. 1.2 revision, 93 rd edn. (2006)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Balfe, S., Mohammed, A. (2007). Final Fantasy – Securing On-Line Gaming with Trusted Computing. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_15
Download citation
DOI: https://doi.org/10.1007/978-3-540-73547-2_15
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-73546-5
Online ISBN: 978-3-540-73547-2
eBook Packages: Computer ScienceComputer Science (R0)