Interview Study:
Security Challenges in Video Game Development
Why do security vulnerabilities sneak into video games in the first place?
... and what can we do?

🏁 We are finished - thanks to you! #

Thank you all for joining our research project! Your participation has been crucial, and we’re grateful for your help.

Our paper was accepted at ACM CCS 2024 and published via ACM.
The paper can be reached under its DOI: 10.1145/3658644.3690190 (backup link).

We are looking forward to conducting further studies in this area. Are you part of the industry and have questions, feedback, cooperation requests or suggestions on the topic? Don’t hesitate to contact us, you can help us to help you!

Our next project is centred around the general problem of cheating in video games.

πŸŽ“ Research Topic

Our research is focused on examining how the video game industry addresses the multifaceted aspects of computer security and privacy within video games. Simply put, we are interested in the day-to-day challenges and experiences of developers in implementing components that might touch security and their secure coding practices.

The goal of our study is to generate insights that can benefit the entire industry. Based on the findings from our interviews, we plan to develop recommendations that can be shared with the industry at large, with the aim of facilitating and enhancing the adoption of robust security practices in the game development process. We greatly appreciate your assistance in contributing to our research efforts. Thank you for your valuable input.

🀫 Confidentiality

We would like to assure you that we take utmost care to anonymize any confidential information that could be linked to you, your projects, or your company. However, due to the nature of our research, we may need to ask specific questions touching on confidential topics to gather relevant data. Nonetheless, each participant has the discretion to choose what information to disclose or which questions to skip. We do not use trick questions or intentionally confuse participants.

Once the write-up of our publication is completed, we will submit our work to scientific venues, who generally make publications online available. Prior to publication, pre-prints will be shared with all participants, allowing you to review, comment, and request changes to any sections of the study that you feel may disclose confidential information.

We value your participation in our study and are committed to maintaining the confidentiality and privacy of your data!

πŸ‘©β€πŸ”¬ Who we are #

We are a research team from the state-funded CISPA Helmholtz Center for Information Security in Germany. Our group studies the intersection of computer security and privacy with human factors. We are particularly interested in investigating end users, administrators, developers, and designers of computer systems and their interdependencies with computer security and privacy mechanisms.

You can find our publications here.

Researchers

Philip Klostermeyer | Researcher & PhD Candidate (CISPA).
Contact: philip.klostermeyer@cispa.de

Sabrina Amft | Researcher & PhD Candidate (CISPA)
Alexander Krause | Researcher & PhD Candidate (CISPA)
Niklas Busch | Researcher & PhD Candidate (CISPA)
Prof. Dr. Sascha Fahl | Principal Investigator, Tenured Faculty (CISPA) & Full Professor (Leibniz University Hannover)

Institutions

CISPA logo

CISPA Helmholtz Center for Information Security

πŸ› οΈ Software Development #

πŸ”’ On Security #

πŸ“° Selected incidents timeline #