A Case for Protecting Computer Games With SGX

作者: Erick Bauman , Zhiqiang Lin

DOI: 10.1145/3007788.3007792

关键词:

摘要: The integrity and confidentiality of computer games has long been a concern game developers, both in preventing players from cheating obtaining unlicensed copies the software. Recently, Intel released SGX, which can provide new security guarantees for software developers to achieve an unprecedented level confidentiality. To explore how SGX protect practice, this paper we make first step exploring ways code data, doing so have developed framework design principles integrating with SGX. We applied our demonstrate it be used real world game.

参考文章(13)
Gary McGraw, Exploiting Online Games usenix annual technical conference. ,(2007)
David Urbina, Yufei Gu, Juan Caballero, Zhiqiang Lin, SigPath: A Memory Graph Based Approach for Program Data Introspection and Modification european symposium on research in computer security. pp. 237- 256 ,(2014) , 10.1007/978-3-319-11212-1_14
William Rosenblatt, Stephen Mooney, William Trippe, Digital Rights Management: Business and Technology John Wiley & Sons, Inc.. ,(2001)
William Ku, Chi-Hung Chi, Survey on the Technological Aspects of Digital Rights Management international conference on information security. pp. 391- 403 ,(2004) , 10.1007/978-3-540-30144-8_33
Felix Schuster, Manuel Costa, Cedric Fournet, Christos Gkantsidis, Marcus Peinado, Gloria Mainar-Ruiz, Mark Russinovich, VC3: Trustworthy Data Analytics in the Cloud Using SGX ieee symposium on security and privacy. pp. 38- 54 ,(2015) , 10.1109/SP.2015.10
Marcus Peinado, Galen Hunt, Andrew Baumann, Shielding applications from an untrusted cloud with Haven operating systems design and implementation. pp. 267- 283 ,(2014) , 10.5555/2685048.2685070
Frank McKeen, Ilya Alexandrovich, Alex Berenzon, Carlos V. Rozas, Hisham Shafi, Vedvyas Shanbhogue, Uday R. Savagaonkar, Innovative instructions and software model for isolated execution hardware and architectural support for security and privacy. pp. 10- ,(2013) , 10.1145/2487726.2488368
C.S. Collberg, C. Thomborson, Watermarking, tamper-proofing, and obfuscation - tools for software protection IEEE Transactions on Software Engineering. ,vol. 28, pp. 735- 746 ,(2002) , 10.1109/TSE.2002.1027797
Elie Bursztein, Mike Hamburg, Jocelyn Lagarenne, Dan Boneh, OpenConflict: Preventing Real Time Map Hacks in Online Games ieee symposium on security and privacy. pp. 506- 520 ,(2011) , 10.1109/SP.2011.28
Olga Ohrimenko, Cédric Fournet, Kapil Vaswani, Sebastian Nowozin, Felix Schuster, Aastha Mehta, Manuel Costa, Oblivious multi-party machine learning on trusted processors usenix security symposium. pp. 619- 636 ,(2016)