{"id":69,"date":"2008-01-20T04:11:44","date_gmt":"2008-01-20T12:11:44","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/01\/20\/online-game-security\/"},"modified":"2008-01-20T04:12:59","modified_gmt":"2008-01-20T12:12:59","slug":"online-game-security","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/20\/online-game-security\/","title":{"rendered":"Online Game Security"},"content":{"rendered":"<p>http:\/\/www.securityfocus.com\/columnists\/461\/1<\/p>\n<p>Recently, a freelancer named Federico Biancuzzi published a book with his co-author, Greg Hoglund, about exploiting online games&#8217; vulnerabilities. The article is an interview with Federico. He talked about one of the vulnerabilities in MMORPG is the fact that the server stores states in the client machines to have these client machines do some of the computations. This allows adversaries to be able to hack within their own machines to gain various benefits. This is because virtual assets in games now days hold great values. Federico also mentioned various ways to improve the online game security. One of which was having the game architecture server-side focus.<\/p>\n<p><!--more--><\/p>\n<p>The reason that Federico and Greg published this book is to increase the awareness of online game security to various stakeholders such as game companies, developers,  and the clients who wish their virtual assets to be secure. In addition, according to Federico, the current methods of game architectures and controls are not secure enough due to the difficulty of running an online game efficiently with a huge number of clients.<\/p>\n<p>A broader issue here would be how can gamers protect their assets. Online gaming is such a huge market, but with these vulnerabilities revealed, how would the gamers, developers, and game companies react since the vulnerabilities can affect the MMORPG industry negatively. For example, less gamer will play the game because they do not want to take the risk of having their virtual assets stolen. This will lead to decrease revenue for the game industry. Also, the author mentioned that not only game information can be modified, it is possible for adversaries to attack other machines to steal other informations that is not game related. This can cause a bigger problem of personal information from the clients can be stolen also.<\/p>\n<p>I believe there are definitely possible reactions besides from the ones that the authors mentioned. First, an increase of awareness of the security issue with online games is needed for the potential victims. Then, for the game industry, they should start putting more emphases on protecting clients&#8217; virtual assets because they are very valuable to the clients. Third, creating laws for online game security would make adversaries think twice before committing the attacks. Hopefully, with the book published, more gamers and game companies will be aware of the online game security situations and start finding ways to prevent these attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>http:\/\/www.securityfocus.com\/columnists\/461\/1 Recently, a freelancer named Federico Biancuzzi published a book with his co-author, Greg Hoglund, about exploiting online games&#8217; vulnerabilities. The article is an interview with Federico. He talked about one of the vulnerabilities in MMORPG is the fact that &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/01\/20\/online-game-security\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[207,56,55,16],"class_list":["post-69","post","type-post","status-publish","format-standard","hentry","category-current-events","tag-current-events","tag-mmorpg","tag-online-game","tag-security"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/69","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=69"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/69\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=69"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=69"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=69"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}