Skip to main content

Combating Computer Vision-Based Aim Assist Tools in Competitive Online Games

  • Conference paper
  • First Online:
Entertainment Computing – ICEC 2023 (ICEC 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14455))

Included in the following conference series:

  • 418 Accesses

Abstract

This work presents a novel approach to the application of adversarial attacks to the domain of video games, specifically, the exploitation of computer vision-based aim assist tools in the first-person shooter genre. As one of the greatest issues plaguing modern shooters, aim assist (also referred to as aimbots) greatly increase the speed and accuracy of cheating players, giving them an unfair advantage over their competitors. The latest versions of these aim assisting tools make use of object detection models such as YOLO (You Only Look Once); fortunately, these models are vulnerable to attack via small perturbations to their input space which results in the misclassification of objects. The purpose of this work is to formulate an attack on a black-box object detection model which can be feasibly implemented in a commercial game environment. What makes our solution unique is the generation of attack images in the form of in-game objects rendered by the game engine itself, instead of a set of screenshots or from a generic differentiable renderer. Results show that our approach is capable of generating adversarial examples which can fool an object detection model in a black-box environment, as well as recreating the game’s original textures such that these perturbations go unnoticed by players.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Goodfellow, I., Shlens, J., Szegedy, C.: Explaining and harnessing adversarial examples. In: ICLR 2015 International Conference On Learning Representations (2015)

    Google Scholar 

  2. Redmon, J., Divvala, S., Girshick, R., Farhadi, A.: You only look once: unified, real-time object detection. In: 2016 IEEE Conference On Computer Vision And Pattern Recognition (CVPR), pp. 779–788 (2016)

    Google Scholar 

  3. Liu, W., et al.: SSD: single shot multibox detector. In: Leibe, B., Matas, J., Sebe, N., Welling, M. (eds.) ECCV 2016. LNCS, vol. 9905, pp. 21–37. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-46448-0_2

    Chapter  Google Scholar 

  4. Huang, S., Papernot, N., Goodfellow, I., Duan, Y., Abbeel, P.: Adversarial attacks on neural network policies. ArXiv Preprint ArXiv:1702.02284 (2017)

  5. Carlini, N., Wagner, D. Towards evaluating the robustness of neural networks. In: 2017 IEEE Symposium on Security and Privacy (SP), pp. 39–57 (2017)

    Google Scholar 

  6. Carlini, N., Katz, G., Barrett, C., Dill, D.: Provably minimally-distorted adversarial examples. ArXiv Preprint ArXiv:1709.10207 (2017)

  7. Athalye, A., Engstrom, L., Ilyas, A., Kwok, K.: Synthesizing robust adversarial examples. In: International Conference on Machine Learning, pp. 284–293 (2018)

    Google Scholar 

  8. Salimans, T., Ho, J., Chen, X., Sutskever, I.: Evolution strategies as a scalable alternative to reinforcement learning. ArXiv Preprint ArXiv:1703.03864 (2017)

  9. Papernot, N., McDaniel, P., Goodfellow, I.: Transferability in machine learning: from phenomena to black-box attacks using adversarial samples. ArXiv Preprint ArXiv:1605.07277 (2016)

  10. Jonnalagadda, A., Frosio, I., Schneider, S., McGuire, M., Kim, J.: Robust Vision-Based Cheat Detection in Competitive Gaming. Proc. ACM Comput. Graphics Interact. Tech. 4, 1–18 (2021)

    Article  Google Scholar 

  11. Yao, P., So, A., Chen, T., Ji, H.: On multiview robustness of 3D adversarial attacks. Practice and Experience In Advanced Research Computing, pp. 372–378 (2020)

    Google Scholar 

  12. Ultralytics YOLOv5. (2021), https://github.com/ultralytics/yolov5

  13. Quigley, K.: Reduce Cheating and Hacking up to 90% with Cyrex GST (2020), https://cyrextech.net/cyrex-gst-cloud-service-stops-90-of-hackers-and-cheaters/

  14. Pinto, S.: Cloud-Based Gaming: A Game Changer For Security? (2021), https://blog.anybrain.gg/cloud-based-gaming-a-game-changer-for-security-70dd0f831869

  15. Chronicle, D.: New cloud-based solution launched to counter cheating in eSports (2019), https://www.deccanchronicle.com/technology/in-other-news/280919/new-cloud-based-solution-launched-to-counter-cheating-in-esports.html

  16. Foundation, T.: Open Neural Network Exchange (2019), https://onnx.ai/

  17. Software, U.: Unity Package Manuals: Introduction to Barracuda (2020), https://docs.unity3d.com/Packages/com.unity.barracuda@1.0/manual/index.html

  18. Software, Unity Real0Time Development Platform (2023), https://unity.com

  19. Lin, T., et al.: Microsoft COCO: common objects in context. In: European Conference On Computer Vision, pp. 740–755 (2014)

    Google Scholar 

  20. Qiu, H., Custode, L., Iacca, G.: Black-box adversarial attacks using evolution strategies. In: Proceedings of The Genetic and Evolutionary Computation Conference Companion, pp. 1827–1833 (2021)

    Google Scholar 

  21. Cunha, P.: Pine (2021), https://github.com/petercunha/Pine

  22. Jonnalagadda, A., Frosio, I., Schneider, S., McGuire, M., Kim, J.: Building towards invisible cloak: robust physical adversarial attack on yolo object detector. In: 2018 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), pp. 368–374 (2018)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Katchabaw .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 IFIP International Federation for Information Processing

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Babin, M., Katchabaw, M. (2023). Combating Computer Vision-Based Aim Assist Tools in Competitive Online Games. In: Ciancarini, P., Di Iorio, A., Hlavacs, H., Poggi, F. (eds) Entertainment Computing – ICEC 2023. ICEC 2023. Lecture Notes in Computer Science, vol 14455. Springer, Singapore. https://doi.org/10.1007/978-981-99-8248-6_24

Download citation

  • DOI: https://doi.org/10.1007/978-981-99-8248-6_24

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-99-8247-9

  • Online ISBN: 978-981-99-8248-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics