Presented at
Black Hat Europe 2014,
Oct. 17, 2014, 2:15 p.m.
(60 minutes).
Cheaters are a growing problem in multiplayer gaming. As games become increasingly complex, the level of sophistication in cheat detection and anti-cheating strategy is forced to keep pace. While some developers spend the time to create their own protections, many have turned to external anti-cheat libraries. These tools are managed by a central server and offer an ideal target for attackers. We outline two practical attacks against one of the most popular anti-cheat engines and demonstrate the implications of a successful attack against anti-cheat software.
Presenters:
-
Joel St. John
- iSEC Partners
Joel is a Senior Security Consultant with iSEC Partners, Inc. He graduated with a BS in Computer Science and Mathematics from the University of Alaska Fairbanks, with a specific focus on computer security and information assurance.
Joel started at iSEC in 2011 at their Seattle office and has done work with several major software companies. He has a particular interest in Cryptography, Algorithms, and Mathematics in general.
-
Nicolas Guigo
- iSEC Partners
Nicolas is a Senior Security Consultant with iSEC Partners. He graduated with a BS in Applied Mathematics from the University of Paris VIII and a MS in Computer Science from NMSU. He is a former Microsoft employee where he worked as a developer, tester and security engineer on the windows kernel and windows phone drivers. He also gave Microsoft-wide security trainings on generic security bug classes, exploitation techniques, exploit mitigation OS features and the windows security model. Nicolas started at iSEC in 2013 at their Seattle office and has done work with several major software companies. His focus are kernel area with an emphasis on MS Windows and C/C++ general application security.
Links:
Similar Presentations: