{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T03:56:34Z","timestamp":1763178994238,"version":"3.45.0"},"reference-count":61,"publisher":"Information Processing Society of Japan","issue":"0","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Information Processing"],"published-print":{"date-parts":[[2025]]},"DOI":"10.2197\/ipsjjip.33.901","type":"journal-article","created":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T22:09:54Z","timestamp":1763158194000},"page":"901-912","source":"Crossref","is-referenced-by-count":0,"title":["Gangi: Preventing Memory Tampering Cheats in Online Games"],"prefix":"10.2197","volume":"33","author":[{"given":"Terufumi","family":"Hata","sequence":"first","affiliation":[{"name":"Keio University"}]},{"given":"Kenta","family":"Ishiguro","sequence":"additional","affiliation":[{"name":"Keio University"}]},{"given":"Pierre-Louis","family":"Aublin","sequence":"additional","affiliation":[{"name":"Internet Initiative Japan Inc."}]},{"given":"Kenji","family":"Kono","sequence":"additional","affiliation":[{"name":"Keio University"}]}],"member":"1012","reference":[{"key":"1","unstructured":"[1] ioquake3, available from &lt;https:\/\/ioquake3.org\/&gt;."},{"key":"2","unstructured":"[2] Advanced Micro Devices, I.: AMD SEV-SNP: Strengthening VM Isolation with Integrity Protection and More (2020), available from &lt;https:\/\/www.amd.com\/system\/files\/TechDocs\/SEV-SNP-strengthening-vm-isolation-with-integrity-protection-and-more.pdf&gt;."},{"key":"3","unstructured":"[3] ARM: Arm TrustZone Technology (2021), available from &lt;https:\/\/developer.arm.com\/ip-products\/security-ip\/trustzone&gt;."},{"key":"4","unstructured":"[4] Bahmani, R., Brasser, F., Dessouky, G., Jauernig, P., Klimmek, M., Sadeghi, A.-R. and Stapf, E.: CURE: A Security Architecture with CUstomizable and Resilient Enclaves, <i>30th USENIX Security Symposium<\/i> (<i>USENIX Security 21<\/i>), pp.1073-1090 (2021)."},{"key":"5","doi-asserted-by":"crossref","unstructured":"[5] Bauman, E. and Lin, Z.: A Case for Protecting Computer Games With SGX, <i>Proc. 1st Workshop on System Software for Trusted Execution, SysTEX &apos;16<\/i> (2016).","DOI":"10.1145\/3007788.3007792"},{"key":"6","unstructured":"[6] Biondo, A., Conti, M., Davi, L., Frassetto, T. and Sadeghi, A.-R.: The Guard&apos;s Dilemma: Efficient Code-Reuse Attacks Against Intel SGX, <i>27th USENIX Security Symposium<\/i>, pp.1213-1227 (2018)."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] Brand\u00e3o, A., Resende, J.S. and Martins, R.: Employment of Secure Enclaves in Cheat Detection Hardening, <i>Trust, Privacy and Security in Digital Business<\/i>, Cham, pp.48-62 (2020).","DOI":"10.1007\/978-3-030-58986-8_4"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] Brasser, F., Gens, D., Jauernig, P., Sadeghi, A.-R. and Stapf, E.: SANCTUARY: ARMing TrustZone with user-space enclaves, <i>Proc. 2019 Network and Distributed System Security Symposium<\/i>, Reston, VA, Internet Society (2019).","DOI":"10.14722\/ndss.2019.23448"},{"key":"9","unstructured":"[9] Carruth, C.: Speculative Load Hardening (2018), available from &lt;https:\/\/llvm.org\/docs\/SpeculativeLoadHardening.html&gt;."},{"key":"10","unstructured":"[10] Chen, Z., Vasilakis, G., Murdock, K., Dean, E., Oswald, D. and Garcia, F.D.: VoltPillager: Hardware-based fault injection attacks against Intel SGX Enclaves using the SVID voltage scaling interface, <i>30th USENIX Security Symposium<\/i>, pp.699-716 (2021)."},{"key":"11","unstructured":"[11] Choi, M., Ko, G. and Cha, S.K.: BotScreen: Trust Everybody, but Cut the Aimbots Yourself, <i>32nd USENIX Security Symposium<\/i>, pp.481-498 (2023)."},{"key":"12","unstructured":"[12] CTCaer: hekate (2021), available from &lt;https:\/\/github.com\/CTCaer\/hekate&gt;."},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] Cui, J., Yu, J.Z., Shinde, S., Saxena, P. and Cai, Z.: SmashEx: Smashing SGX Enclaves Using Exceptions, <i>Proc. 2021 ACM SIGSAC Conference on Computer and Communications Security, CCS &apos;21<\/i>, pp.779-793 (2021).","DOI":"10.1145\/3460120.3484821"},{"key":"14","unstructured":"[14] Daniel, S., Soh, S. and Lau, W.: RACS: A referee anti-cheat scheme for P2P gaming (2007)."},{"key":"15","unstructured":"[15] DardFlare: [MK8D] Speed Hacks (2018) (online), available from &lt;https:\/\/youtu.be\/-IEGIHqQlrY&gt;."},{"key":"16","unstructured":"[16] Kaplan, D., Powell, J. and Woller, T.: AMD MEMORY ENCRYPTION (2021), available from &lt;http:\/\/developer.amd.com\/wordpress\/media\/2013\/12\/AMD_Memory_Encryption_Whitepaper_v9-Public.pdf&gt;."},{"key":"17","unstructured":"[17] Eduard: KDMapper (2021), available from &lt;https:\/\/github.com\/TheCruZ\/kdmapper&gt;."},{"key":"18","unstructured":"[18] Engine, C.: Cheat Engine (2021), available from &lt;https:\/\/www.cheatengine.org\/&gt;."},{"key":"19","unstructured":"[19] Feng, E., Lu, X., Du, D., Yang, B., Jiang, X., Xia, Y., Zang, B. and Chen, H.: Scalable Memory Protection in the PENGLAI Enclave, <i>15th USENIX Symposium on Operating Systems Design and Implementation<\/i> (<i>OSDI 21<\/i>), pp.275-294 (2021)."},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] Ferraiuolo, A., Baumann, A., Hawblitzel, C. and Parno, B.: Komodo: Using Verification to Disentangle Secure-Enclave Hardware from Software, <i>Proc. 26th Symposium on Operating Systems Principles, SOSP &apos;17<\/i>, pp.287-305 (2017).","DOI":"10.1145\/3132747.3132782"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] Goodman, J. and Verbrugge, C.: A Peer Auditing Scheme for Cheat Elimination in MMOGs, <i>Proc. 7th ACM SIGCOMM Workshop on Network and System Support for Games<\/i>, pp.9-14 (2008).","DOI":"10.1145\/1517494.1517496"},{"key":"22","unstructured":"[22] Intel: Get Started with the Unity* Entity Component System (ECS), C# Job System, and Burst Compiler, available from &lt;https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/guide\/get-started-with-the-unity-entity-component-system-ecs-c-sharp-job-system-and-burst-compiler.html&gt;."},{"key":"23","unstructured":"[23] Intel: Unreal Engine* New Chaos Physics System Screams With In-Depth Intel CPU Optimizations, available from &lt;https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/articles\/technical\/unreal-engines-new-chaos-physics-system-screams-with-in-depth-intel-cpu-optimizations.html&gt;."},{"key":"24","unstructured":"[24] Intel: Intel Software Guard Extensions (2021), available from &lt;https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/software-guard-extensions.html&gt;."},{"key":"25","unstructured":"[25] Intel: Intel\u00ae Trust Domain Extensions (Intel\u00ae TDX) (2021), available from &lt;https:\/\/www.intel.com\/content\/www\/us\/en\/developer\/tools\/trust-domain-extensions\/overview.html&gt;."},{"key":"26","doi-asserted-by":"crossref","unstructured":"[26] Johannesmeyer, B., Koschel, J., Razavi, K., Bos, H. and Giuffrida, C.: Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel, <i>29th Annual Network and Distributed System Security Symposium<\/i>, The Internet Society (2022).","DOI":"10.14722\/ndss.2022.24221"},{"key":"27","doi-asserted-by":"crossref","unstructured":"[27] Kaiser, E., Feng, W.-C. and Schluessler, T.: Fides: Remote Anomaly-Based Cheat Detection Using Client Emulation, <i>Proc. 16th ACM Conference on Computer and Communications Security, CCS &apos;09<\/i>, pp.269-279 (2009).","DOI":"10.1145\/1653662.1653695"},{"key":"28","doi-asserted-by":"crossref","unstructured":"[28] Kalra, S., Sanghi, R. and Dhawan, M.: Blockchain-Based Real-Time Cheat Prevention and Robustness for Multi-Player Online Games, <i>Proc. 14th International Conference on Emerging Networking EXperiments and Technologies<\/i>, pp.178-190 (2018).","DOI":"10.1145\/3281411.3281438"},{"key":"29","unstructured":"[29] Kaplan, D.: PROTECTING VM REGISTER STATE WITH SEV-ES (2017), available from &lt;https:\/\/www.amd.com\/system\/files\/TechDocs\/Protecting%20VM%20Register%20State%20with%20SEV-ES.pdf&gt;."},{"key":"30","unstructured":"[30] Kenjar, Z., Frassetto, T., Gens, D., Franz, M. and Sadeghi, A.-R.: V0LTpwn: Attacking x86 Processor Integrity from Software, <i>29th USENIX Security Symposium<\/i> (<i>USENIX Security 20<\/i>), pp.1445-1461, USENIX Association (2020)."},{"key":"31","unstructured":"[31] Kennedy, J.: Limiting CPU Threads for Better Game Performance (2024), available from &lt;https:\/\/developer.nvidia.com\/blog\/limiting-cpu-threads-for-better-game-performance\/&gt;."},{"key":"32","doi-asserted-by":"crossref","unstructured":"[32] Kim, K., Kim, C.H., Rhee, J.J., Yu, X., Chen, H., Tian, D.J. and Lee, B.: Vessels: Efficient and Scalable Deep Learning Prediction on Trusted Processors, <i>Proc. 11th ACM Symposium on Cloud Computing, SoCC &apos;20<\/i>, pp.462-476 (2020).","DOI":"10.1145\/3419111.3421282"},{"key":"33","doi-asserted-by":"crossref","unstructured":"[33] Kim, T., Park, J., Woo, J., Jeon, S. and Huh, J.: ShieldStore: Shielded In-Memory Key-Value Storage with SGX, <i>Proc. 14th EuroSys Conference 2019, EuroSys &apos;19<\/i> (2019).","DOI":"10.1145\/3302424.3303951"},{"key":"34","doi-asserted-by":"crossref","unstructured":"[34] Kocher, P., Horn, J., Fogh, A., Genkin, D., Gruss, D., Haas, W., Hamburg, M., Lipp, M., Mangard, S., Prescher, T., Schwarz, M. and Yarom, Y.: Spectre Attacks: Exploiting Speculative Execution, <i>40th IEEE Symposium on Security and Privacy<\/i> (<i>S&amp;P&apos;19<\/i>) (2019).","DOI":"10.1109\/SP.2019.00002"},{"key":"35","doi-asserted-by":"crossref","unstructured":"[35] Kurabayashi, S.: Lambda Containers: A Comprehensive Anti-Tamper Framework for Games by Simulating Client Behavior in a Cloud, <i>2018 IEEE 11th International Conference on Cloud Computing<\/i> (<i>CLOUD<\/i>), pp.598-605 (2018).","DOI":"10.1109\/CLOUD.2018.00083"},{"key":"36","doi-asserted-by":"crossref","unstructured":"[36] Kuvaiskii, D., Oleksenko, O., Arnautov, S., Trach, B., Bhatotia, P., Felber, P. and Fetzer, C.: SGXBOUNDS: Memory Safety for Shielded Execution, <i>Proc. 12th European Conference on Computer Systems, EuroSys &apos;17<\/i>, pp.205-221 (2017).","DOI":"10.1145\/3064176.3064192"},{"key":"37","unstructured":"[37] Lavrijsen, M.: EfiGuard (2025), available from &lt;https:\/\/github.com\/Mattiwatti\/EfiGuard&gt;."},{"key":"38","doi-asserted-by":"crossref","unstructured":"[38] Lee, D., Kohlbrenner, D., Shinde, S., Asanovi\u0107, K. and Song, D.: Keystone: An Open Framework for Architecting Trusted Execution Environments, <i>Proc. 15th European Conference on Computer Systems, EuroSys &apos;20<\/i> (2020).","DOI":"10.1145\/3342195.3387532"},{"key":"39","unstructured":"[39] Lee, J., Jang, J., Jang, Y., Kwak, N., Choi, Y., Choi, C., Kim, T., Peinado, M. and Kang, B.B.: Hacking in Darkness: Return-oriented Programming against Secure Enclaves, <i>26th USENIX Security Symposium<\/i> (<i>USENIX Security 17<\/i>), pp.523-539 (2017)."},{"key":"40","unstructured":"[40] Lee, S., Shih, M.-W., Gera, P., Kim, T., Kim, H. and Peinado, M.: Inferring Fine-grained Control Flow Inside SGX Enclaves with Branch Shadowing, <i>26th USENIX Security Symposium<\/i>, pp.557-574 (2017)."},{"key":"41","unstructured":"[41] Lipp, M., Schwarz, M., Gruss, D., Prescher, T., Haas, W., Fogh, A., Horn, J., Mangard, S., Kocher, P., Genkin, D., Yarom, Y. and Hamburg, M.: Meltdown: Reading Kernel Memory from User Space, <i>27th USENIX Security Symposium<\/i> (<i>USENIX Security 18<\/i>) (2018)."},{"key":"42","unstructured":"[42] MrNosuch: Fall Guys Cheater (Fly Hack) (2023)."},{"key":"43","unstructured":"[43] Oleksenko, O., Trach, B., Krahn, R., Silberstein, M. and Fetzer, C.: Varys: Protecting SGX Enclaves from Practical Side-Channel Attacks, <i>2018 USENIX Annual Technical Conference<\/i>, pp.227-240 (2018)."},{"key":"44","doi-asserted-by":"crossref","unstructured":"[44] Orenbach, M., Lifshits, P., Minkin, M. and Silberstein, M.: Eleos: ExitLess OS Services for SGX Enclaves, <i>Proc. 12th European Conference on Computer Systems<\/i>, pp.238-253 (2017).","DOI":"10.1145\/3064176.3064219"},{"key":"45","doi-asserted-by":"crossref","unstructured":"[45] Park, S., Ahmad, A. and Lee, B.: BlackMirror: Preventing Wallhacks in 3D Online FPS Games, <i>Proc. 2020 ACM SIGSAC Conference on Computer and Communications Security, CCS &apos;20<\/i>, pp.987-1000 (2020).","DOI":"10.1145\/3372297.3417890"},{"key":"46","doi-asserted-by":"crossref","unstructured":"[46] Patrignani, M. and Guarnieri, M.: Exorcising Spectres with Secure Compilers, <i>Proc. 2021 ACM SIGSAC Conference on Computer and Communications Security<\/i>, pp.445-461 (2021).","DOI":"10.1145\/3460120.3484534"},{"key":"47","unstructured":"[47] Playz, T.: Apex Legends Hackers Season 4 Compilation (Fast Heal, Fast Punching, Speed Hack, Fast Reload) (2020), available from &lt;https:\/\/youtu.be\/cJgXdncAy4c?si=wZvrylvnE4XOYnO6&gt;."},{"key":"48","unstructured":"[48] Ruppo: SUPER CHEATER!!! \u2014 AIMBOT + WALLHACK + SPEED HACK + FLY HACK \u2014 PUBG MOBILE (2019), available from &lt;https:\/\/youtu.be\/L_vi9jYSrCQ?si=YvJRwSReMH2nOZvB&gt;."},{"key":"49","doi-asserted-by":"crossref","unstructured":"[49] Seo, J., Lee, B., Kim, S., Shih, M.-W., Shin, I., Han, D. and Kim, T.: SGX-shield: Enabling address space layout randomization for SGX programs, <i>Proc. 2017 Network and Distributed System Security Symposium<\/i>, Internet Society (2017).","DOI":"10.14722\/ndss.2017.23037"},{"key":"50","unstructured":"[50] Jhonson, S., Makaram, R., Santoni, A. and Scarlata, V.: Supporting Intel SGX on Multi-Socket Platforms, available from &lt;https:\/\/www.intel.com\/content\/dam\/www\/public\/us\/en\/documents\/white-papers\/supporting-intel-sgx-on-mulit-socket-platforms.pdf&gt;."},{"key":"51","doi-asserted-by":"crossref","unstructured":"[51] Taassori, M., Shafiee, A. and Balasubramonian, R.: VAULT: Reducing Paging Overheads in SGX with Efficient Integrity Verification Structures, <i>Proc. 23rd International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS &apos;18<\/i>, pp.665-678 (2018).","DOI":"10.1145\/3173162.3177155"},{"key":"52","unstructured":"[52] Unity: Best practices for profiling game performance \u2014 Unity, available from &lt;https:\/\/unity.com\/how-to\/best-practices-for-profiling-game-performance&gt;."},{"key":"53","unstructured":"[53] Unity: Distributed authority topologies \u2014 Unity Multiplayer, available from &lt;https:\/\/docs-multiplayer.unity3d.com\/netcode\/current\/terms-concepts\/distributed-authority\/&gt;."},{"key":"54","unstructured":"[54] UnrealEngine: Threaded Rendering in Unreal Engine \u2014 Unreal Engine 5.5 Documentation \u2014 Epic Developer Community, available from &lt;https:\/\/dev.epicgames.com\/documentation\/en-us\/unreal-engine\/threaded-rendering-in-unreal-engine&gt;."},{"key":"55","doi-asserted-by":"crossref","unstructured":"[55] Van Bulck, J., Moghimi, D., Schwarz, M., Lipp, M., Minkin, M., Genkin, D., Yuval, Y., Sunar, B., Gruss, D. and Piessens, F.: LVI: Hijacking Transient Execution through Microarchitectural Load Value Injection, <i>41th IEEE Symposium on Security and Privacy<\/i> (<i>S&amp;P&apos;20<\/i>) (2020).","DOI":"10.1109\/SP40000.2020.00089"},{"key":"56","unstructured":"[56] WackyJacky101: CATCHING CHEATERS IN PUBG - Cheaters are EVERYWHERE it&apos;s insane! (2021), available from &lt;https:\/\/youtu.be\/tc1NAaOQ0Wk&gt;."},{"key":"57","doi-asserted-by":"crossref","unstructured":"[57] Weiser, S., Werner, M., Brasser, F., Malenko, M., Mangard, S. and Sadeghi, A.-R.: TIMBER-V: Tag-isolated memory bringing fine-grained enclaves to RISC-V, <i>Proc. 2019 Network and Distributed System Security Symposium<\/i>, Internet Society (2019).","DOI":"10.14722\/ndss.2019.23068"},{"key":"58","unstructured":"[58] WerWolv: EdiZon (2020), available from &lt;https:\/\/github.com\/WerWolv\/EdiZon&gt;."},{"key":"59","doi-asserted-by":"crossref","unstructured":"[59] Yahyavi, A., Huguenin, K., Gascon-Samson, J., Kienzle, J. and Kemme, B.: Watchmen: Scalable Cheat-Resistant Support for Distributed Multi-Player Online Games, <i>Proc. 2013 IEEE 33rd International Conference on Distributed Computing Systems, ICDCS &apos;13<\/i>, pp.134-144 (2013).","DOI":"10.1109\/ICDCS.2013.62"},{"key":"60","unstructured":"[60] Zhang, Z., Barthe, G., Chuengsatiansup, C., Schwabe, P. and Yarom, Y.: Ultimate SLH: Taking Speculative Load Hardening to the Next Level, <i>32nd USENIX Security Symposium<\/i>, pp.7125-7142 (2023)."},{"key":"61","doi-asserted-by":"crossref","unstructured":"[61] Zhao, W., Lu, K., Qi, Y. and Qi, S.: MPTEE: Bringing Flexible and Efficient Memory Protection to Intel SGX, <i>Proc. 15th European Conference on Computer Systems, EuroSys &apos;20<\/i> (2020).","DOI":"10.1145\/3342195.3387536"}],"container-title":["Journal of Information Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/ipsjjip\/33\/0\/33_901\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,15]],"date-time":"2025-11-15T03:47:06Z","timestamp":1763178426000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.jstage.jst.go.jp\/article\/ipsjjip\/33\/0\/33_901\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":61,"journal-issue":{"issue":"0","published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.2197\/ipsjjip.33.901","relation":{},"ISSN":["1882-6652"],"issn-type":[{"type":"electronic","value":"1882-6652"}],"subject":[],"published":{"date-parts":[[2025]]}}}