{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T23:53:15Z","timestamp":1769298795817,"version":"3.49.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030589851","type":"print"},{"value":"9783030589868","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58986-8_4","type":"book-chapter","created":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T12:02:13Z","timestamp":1599998533000},"page":"48-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Employment of Secure Enclaves in Cheat Detection Hardening"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3005-5323","authenticated-orcid":false,"given":"Andr\u00e9","family":"Brand\u00e3o","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0125-4240","authenticated-orcid":false,"given":"Jo\u00e3o S.","family":"Resende","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1838-1417","authenticated-orcid":false,"given":"Rolando","family":"Martins","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"issue":"3","key":"4_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2799647","volume":"33","author":"A Baumann","year":"2015","unstructured":"Baumann, A., Peinado, M., Hunt, G.: Shielding applications from an untrusted cloud with haven. ACM Trans. Comput. Syst. (TOCS) 33(3), 1\u201326 (2015)","journal-title":"ACM Trans. Comput. Syst. (TOCS)"},{"key":"4_CR2","unstructured":"Arnautov, S., et al.: SCONE: secure linux containers with intel SGX. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2016), pp. 689\u2013703 (2016)"},{"key":"4_CR3","unstructured":"Davidovici-Nora, M.: Paid and free digital business models innovations in the video game industry. Digiworld Econ. J. (94), 2nd Q, p. 83 (2014). Available at SSRN: https:\/\/ssrn.com\/abstract=2534022"},{"key":"4_CR4","doi-asserted-by":"publisher","unstructured":"Bauman, E., Lin, Z.: A case for protecting computer games with SGX. In: Proceedings of the 1st Workshop on System Software for Trusted Execution (SysTEX 2016), New York, NY, USA. ACM Article 4, 6 pages. https:\/\/doi.org\/10.1145\/3007788.3007792","DOI":"10.1145\/3007788.3007792"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Korkin, I.: Two challenges of stealthy hypervisors detection: time cheating and data fluctuations. arXiv preprint arXiv:1506.04131 (2015)","DOI":"10.15394\/jdfsl.2015.1200"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Yan, J., Randell, B.: A systematic classification of cheating in online games, pp. 1\u20139 (2005). https:\/\/doi.org\/10.1145\/1103599.1103606","DOI":"10.1145\/1103599.1103606"},{"key":"4_CR7","unstructured":"Pritchard, M.: How to hurt the hackers: the scoop on internet cheating and how you can combat it. Inf. Secur. Bull. (2011)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Schwarz, M., Weiser, S., Gruss, D.: Practical Enclave Malware with Intel SGX (2019)","DOI":"10.1007\/978-3-030-22038-9_9"},{"key":"4_CR9","unstructured":"Intel: IntelR$$\\copyright $$64 and IA-32 Architectures Software Developer\u2019s Manual, Vol-ume 3 (3A, 3B & 3C): System Programming Guide (325384) (2016)"},{"key":"4_CR10","unstructured":"Rostedt, S.: Ftrace kernel hooks: more than just tracing. In: Linux Plumbers Conference (2014)"},{"key":"4_CR11","doi-asserted-by":"publisher","unstructured":"Bauman, E., Wang, H., Zhang, M., Lin, Z.: SGXElide: enabling enclave code secrecy via self-modification. 75\u201386 (2018). https:\/\/doi.org\/10.1145\/3168833","DOI":"10.1145\/3168833"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1002\/spe.973","volume":"40","author":"J Berdajs","year":"2010","unstructured":"Berdajs, J., Bosni\u0107, Z.: Extending applications using an advanced approach to DLL injection and API hooking. Softw. Pract. Exp. 40, 567\u2013584 (2010). https:\/\/doi.org\/10.1002\/spe.973","journal-title":"Softw. Pract. Exp."},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Tuzel, T., et al.: Who watches the watcher? Detecting hypervisor introspection from unprivileged guests. Digit. Invest. 26, S98\u2013S106 (2018)","DOI":"10.1016\/j.diin.2018.04.015"},{"key":"4_CR14","doi-asserted-by":"publisher","unstructured":"Feng, W., Kaiser, E.S., Chluessler, T.: Stealth measurements for cheat detection in on-line games. 15\u201320 (2008). https:\/\/doi.org\/10.1145\/1517494.1517497","DOI":"10.1145\/1517494.1517497"},{"key":"4_CR15","unstructured":"Cox, A., Kuznetsov, A., McHardy, P.: Netlink https:\/\/github.com\/torvalds\/linux\/tree\/master\/net\/netlink. Accessed 212 June 020"},{"key":"4_CR16","doi-asserted-by":"publisher","unstructured":"Deng, Z., Zhang, X., Xu, D.: SPIDER: stealthy binary program instrumentation and debugging via hardware virtualization (2013). https:\/\/doi.org\/10.1145\/2523649.2523675","DOI":"10.1145\/2523649.2523675"},{"key":"4_CR17","unstructured":"Kyte, I., Zavarsky, P., Lindskog, D., Ruhl, R.: Enhanced Side-channel Analysis Method to Detect Hardware Virtualization Based Rootkits (2012)"},{"key":"4_CR18","unstructured":"Tanda, S.: DdiMon Github, 22 September 2018,. https:\/\/github.com\/tandasat\/DdiMon. Accessed 19 Sept 2019"},{"key":"4_CR19","unstructured":"libperflogger - Game performance logging library. https:\/\/github.com\/Lurkki14\/libperflogger. Accessed 19 Sept 2019"},{"key":"4_CR20","unstructured":"Fuzion - Open Source Linux Counter Strike: Global Offensive Cheat. https:\/\/github.com\/LWSS\/Fuzion. Accessed 19 Sept 2019"},{"key":"4_CR21","unstructured":"Counter Strike: Global Offensive benchmark map. https:\/\/steamcommunity.com\/sharedfiles\/filedetails\/?id=500334237. Accessed 19 Sept 2019"},{"key":"4_CR22","unstructured":"GameBlocks, LLC. Fairfight server-sided anti-cheat. https:\/\/gameblocks.com\/. Accessed 19 Sept 2019"},{"key":"4_CR23","unstructured":"Epic Games, Inc., Easy Anti-Cheat. https:\/\/www.easy.ac. Accessed 19 Sept 2019"},{"key":"4_CR24","unstructured":"BattlEye Innovations. BattlEye AntiCheat. https:\/\/www.battleye.com\/. Accessed 19 Sept 2019"},{"key":"4_CR25","unstructured":"Cowley, D.: Epic Games Acquires Kamu, Game Security and Player Services Company, 8 October 2018. https:\/\/www.unrealengine.com\/en-US\/blog\/epic-games-acquires-kamu-game-security-and-player-services-company. Accessed 19 Sept 2019"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58986-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T23:08:13Z","timestamp":1619305693000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58986-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030589851","9783030589868"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58986-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TrustBus","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Trust and Privacy in Digital Business","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bratislava","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovakia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"trustbus2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/trustbus2020","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}