π We are finished - thanks to you! #
Thank you all for joining our research project! Your participation has been crucial, and we’re grateful for your help.
Our paper was accepted at ACM CCS 2024 and published via ACM.
The paper can be reached under its DOI:
10.1145/3658644.3690190 (backup link).
We are looking forward to conducting further studies in this area. Are you part of the industry and have questions, feedback, cooperation requests or suggestions on the topic? Don’t hesitate to contact us, you can help us to help you!
Our next project is centred around the general problem of cheating in video games.
π Research Topic
Our research is focused on examining how the video game industry addresses the multifaceted aspects of computer security and privacy within video games. Simply put, we are interested in the day-to-day challenges and experiences of developers in implementing components that might touch security and their secure coding practices.
The goal of our study is to generate insights that can benefit the entire industry. Based on the findings from our interviews, we plan to develop recommendations that can be shared with the industry at large, with the aim of facilitating and enhancing the adoption of robust security practices in the game development process. We greatly appreciate your assistance in contributing to our research efforts. Thank you for your valuable input.
π€« Confidentiality
We would like to assure you that we take utmost care to anonymize any confidential information that could be linked to you, your projects, or your company. However, due to the nature of our research, we may need to ask specific questions touching on confidential topics to gather relevant data. Nonetheless, each participant has the discretion to choose what information to disclose or which questions to skip. We do not use trick questions or intentionally confuse participants.
Once the write-up of our publication is completed, we will submit our work to scientific venues, who generally make publications online available. Prior to publication, pre-prints will be shared with all participants, allowing you to review, comment, and request changes to any sections of the study that you feel may disclose confidential information.
We value your participation in our study and are committed to maintaining the confidentiality and privacy of your data!
π©βπ¬ Who we are #
We are a research team from the state-funded CISPA Helmholtz Center for Information Security in Germany. Our group studies the intersection of computer security and privacy with human factors. We are particularly interested in investigating end users, administrators, developers, and designers of computer systems and their interdependencies with computer security and privacy mechanisms.
You can find our publications here.
Researchers
Philip Klostermeyer | Researcher & PhD Candidate (CISPA).
Contact: philip.klostermeyer@cispa.de
Sabrina Amft | Researcher & PhD Candidate (CISPA)
Alexander Krause | Researcher & PhD Candidate (CISPA)
Niklas Busch | Researcher & PhD Candidate (CISPA)
Prof. Dr. Sascha Fahl | Principal Investigator, Tenured Faculty (CISPA) & Full Professor (Leibniz University Hannover)
π Related work #
π οΈ Software Development #
- [2022] Ullmann et al.: Video Game Project Management Anti-patterns (GAS)
- [2014] Murphy-Hill et al.: Cowboys, Ankle Sprains, and Keepers of Quality: How is Video Game Development Different from Software Development? (ICSE)
- [2009] Kanode et al.: Software Engineering Challenges in Game Development (ITNG)
π On Security #
- [2018] Zhao: Cyber security issues in online games (AIP)
- [2011] Mohr et al.: IT Security Issues Within the Video Game Industry (IJCSIT)
- [2008] Chang et al.: The Security System Design in Online Game for u Entertainment (AINAW)
- [2004] Ki et al.: Taxonomy of online game security (Electronic Library)
π° Selected incidents timeline #
- [2024] League Of Legendsβ New Anti-Cheat Software Isnβt Bricking PCs, Riot Says (kotaku.com)
- [2024] HelloKitty ransomware rebrands, releases CD Projekt and Cisco data (bleepingcomputer.com)
- [2024] Steam Hit Ready Or Not Source Code Stolen In Massive Hack (kotaku.com)
- [2024] Clearing up misconceptions about the Apex Legends Global Series hack (reddit.com)
- [2023] The catastrophe of the Insomniac hack goes way beyond leaked games (polygon.com)
- [2023] Counter-Strike 2 HTML injection bug exposes playersβ IP addresses (bleepingcomputer.com)
- [2023] Near-Complete Far Cry Source Code Leaks Online (kotaku.com)
- [2023] CS:GO: From Zero to 0-day (neodyme.io)
- [2023] Fans Freak Out As Zelda: Tears Of The Kingdom Leaks Two Weeks Early (kotaku.com)
- [2023] The Diablo 4 beta has been bricking graphics cards (techspot.com)
- [2023] Dota 2 Under Attack: How a V8 Bug Was Exploited in the Game (decoded.avast.io)
- [2022] Dark Souls servers taken down due to an exploit βthat could let someone take over your PCβ (videogameschronicle.com)
- [2022] Hackers abuse Genshin Impact anti-cheat system to disable antivirus (bleepingcomputer.com)
- [2022] Grand Theft Auto 6 leak: who hacked Rockstar and what was stolen? (theguardian.com)
- [2021] Battle.net has recovered from DDoS attack, Blizzard says (theverge.com)
- [2021] Ubisoft confirms Just Dance data breach amid developer exodus (zdnet.com)
- [2021] Amazon’s New World beta is reportedly destroying RTX 3090 cards (techspot.com)
- [2021] CD Projekt Red says it was hacked but won’t pay the ransom (engadget.com)
- [2021] Source Engine remote code execution via game invites (secret.club)
- [2021] Valve Patches Exploit That Let You Add Infinite Steam Wallet Money (kotaku.com)
- [2020] A Directory Traversal Attack on Punkbuster Server can be Leveraged to Gain Remote Code Execution (medium.com)
- [2020] Ubisoft Hacked And Private User Data Posted (happygamer.com)
- [2019] XSS slip-up exposed Fortnite gamers to account hijack (portswigger.net)
- [2019] Game Over for Hackers: Critical Account Takeover Vulnerability Discovered and Patched in EA Games (cyberint.com)
- [2019] Zero-day in EAβs Origin exposes gamers to yet more RCE pwnage (portswigger.net)