{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:27:40Z","timestamp":1758266860079,"version":"3.41.0"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2008,12,26]],"date-time":"2008-12-26T00:00:00Z","timestamp":1230249600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["7.57E+19"],"award-info":[{"award-number":["7.57E+19"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst. Secur."],"published-print":{"date-parts":[[2011,12]]},"abstract":"<jats:p>\n            Online gaming is a lucrative and growing industry but one that is slowed by cheating that compromises the gaming experience and hence drives away players (and revenue). In this paper we develop a technique by which game developers can enable game operators to validate the behavior of game clients as being consistent with valid execution of the sanctioned client software. Our technique employs symbolic execution of the client software to extract constraints on client-side state implied by each client-to-server message, and then uses constraint solving to determine whether the sequence of client-to-server messages can be \u201cexplained\u201d by any possible user inputs, in light of the server-to-client messages already received. The requisite constraints and solving components can be developed either simultaneously with the game or retroactively for existing games. We demonstrate our approach in three case studies on the open-source game\n            <jats:italic>XPilot<\/jats:italic>\n            , a game similar to\n            <jats:italic>Pac-Man<\/jats:italic>\n            of our own design, and an open-source multiplayer version of\n            <jats:italic>Tetris<\/jats:italic>\n            .\n          <\/jats:p>","DOI":"10.1145\/2043628.2043633","type":"journal-article","created":{"date-parts":[[2011,12,27]],"date-time":"2011-12-27T15:22:22Z","timestamp":1324999342000},"page":"1-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Server-side verification of client behavior in online games"],"prefix":"10.1145","volume":"14","author":[{"given":"Darrell","family":"Bethea","sequence":"first","affiliation":[{"name":"University of North Carolina at Chapel Hill, NC"}]},{"given":"Robert A.","family":"Cochran","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill, NC"}]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[{"name":"University of North Carolina at Chapel Hill, NC"}]}],"member":"320","published-online":{"date-parts":[[2008,12,26]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Alexander L. 2008. World of warcraft hits 10 million subscribers. http:\/\/www.gamasutra.com\/php-bin\/news_index.php?story=17062.  Alexander L. 2008. World of warcraft hits 10 million subscribers. http:\/\/www.gamasutra.com\/php-bin\/news_index.php?story=17062."},{"volume-title":"Proceedings of IEEE INFOCOM.","author":"Baughman N. E.","key":"e_1_2_1_2_1"},{"volume-title":"Proceedings of the 17th ISOC Network and Distributed System Security Symposium. 21--36","author":"Bethea D.","key":"e_1_2_1_3_1"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.41"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2007.17"},{"volume-title":"Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation.","author":"Cadar C.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1178823.1178829"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1517494.1517498"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294265"},{"volume-title":"Proceedings of the 2nd International Conference on Application and Development of Computer Games.","author":"Cronin E.","key":"e_1_2_1_11_1"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1016540.1016553"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1517494.1517497"},{"volume-title":"Analyst: Online games now $11b of $44b worldwide game market","year":"2009","author":"Gamasutra Staff","key":"e_1_2_1_14_1"},{"volume-title":"Proceedings of the 19th International Conference on Computer Aided Verification (CAV'07)","author":"Ganesh V.","key":"e_1_2_1_15_1"},{"volume-title":"Proceedings of the 11th USENIX Security Symposium.","author":"Giffin J. T.","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1517494.1517496"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526785"},{"key":"e_1_2_1_19_1","unstructured":"Hoglund G. and McGraw G. 2007. Exploiting Online Games: Cheating Massively Distributed Systems. Addison-Wesley Professional.   Hoglund G. and McGraw G. 2007. Exploiting Online Games: Cheating Massively Distributed Systems. Addison-Wesley Professional."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1952.273898"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1230040.1230056"},{"key":"e_1_2_1_22_1","unstructured":"Jager I. and Brumley D. 2010. Efficient directionless weakest preconditions. Tech. rep. CMU-CyLab-10-002 Cylab Carnegie Mellon University.  Jager I. and Brumley D. 2010. Efficient directionless weakest preconditions. Tech. rep. CMU-CyLab-10-002 Cylab Carnegie Mellon University."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.16"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103599.1103607"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653695"},{"volume-title":"Proceedings of the 14th USENIX Security Symposium. 161--176","author":"Kruegel C.","key":"e_1_2_1_26_1"},{"volume-title":"Proceedings of the International Conference on Computer as a Tool (EUROCON).","author":"Lyhyaoui Y.","key":"e_1_2_1_27_1"},{"key":"e_1_2_1_28_1","unstructured":"Magiera M. 2009. Videogames sales bigger than DVD-Blu-ray for first time. http:\/\/www.videobusiness. com\/article\/CA6631456.html.  Magiera M. 2009. Videogames sales bigger than DVD-Blu-ray for first time. http:\/\/www.videobusiness. com\/article\/CA6631456.html."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.78"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1230040.1230087"},{"key":"e_1_2_1_31_1","unstructured":"Mulligan J. and Patrovsky B. 2003. Developing Online Games: An Insider's Guide. New Riders Publishing.   Mulligan J. and Patrovsky B. 2003. Developing Online Games: An Insider's Guide. New Riders Publishing."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/146941.146943"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1326257.1326258"},{"key":"e_1_2_1_34_1","unstructured":"Spohn D. Cheating in online games. http:\/\/internetgames.about.com\/od\/gamingnews\/a\/cheating.htm.  Spohn D. Cheating in online games. http:\/\/internetgames.about.com\/od\/gamingnews\/a\/cheating.htm."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653685"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653703"},{"key":"e_1_2_1_37_1","unstructured":"Ward M. 2005. Warcraft game maker in spying row. http:\/\/news.bbc.co.uk\/2\/hi\/technology\/4385050.stm.  Ward M. 2005. Warcraft game maker in spying row. http:\/\/news.bbc.co.uk\/2\/hi\/technology\/4385050.stm."},{"key":"e_1_2_1_38_1","first-page":"34","article-title":"A survey on network game cheats and P2P solutions","volume":"9","author":"Webb S.","year":"2008","journal-title":"Aust. J. Intell. Inform. Process. Syst."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324198.1324205"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103599.1103606"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.7"}],"container-title":["ACM Transactions on Information and System Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043628.2043633","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043628.2043633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:19Z","timestamp":1750240459000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043628.2043633"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,12,26]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["10.1145\/2043628.2043633"],"URL":"https:\/\/doi.org\/10.1145\/2043628.2043633","relation":{},"ISSN":["1094-9224","1557-7406"],"issn-type":[{"type":"print","value":"1094-9224"},{"type":"electronic","value":"1557-7406"}],"subject":[],"published":{"date-parts":[[2008,12,26]]},"assertion":[{"value":"2010-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2011-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2008-12-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}