• DocumentCode
    124637
  • Title

    Emerging cyberworld attack vectors: Modification, customization, secretive communications, and digital forensics in PC video games

  • Author

    Ebrahimi, Mojtaba ; Lei Chen

  • Author_Institution
    Dept. of Comput. Sci., Sam Houston State Univ., Huntsville, TX, USA
  • fYear
    2014
  • fDate
    3-6 Feb. 2014
  • Firstpage
    939
  • Lastpage
    944
  • Abstract
    Complexity of customization in video games threatens to provide people with malicious intent a new vector for the secretive transmission of messages as well as data. This paper explores six different games including some of the most popular games of early 2013: World of Warcraft (WoW), League of Legends (LoL), Defense of the Ancients 2 (DotA 2), StarCraft 2 (SC2), Battlefield 3 (BF3), and Garry´s Mod (GMod). Our research has shown that each of these games have at least one feature that an attacker may exploit in order to transfer information. Since video game forensics is still in an infantile stage, an investigator may not suspect video games and their data files as accomplices to crime. Within this paper, we will describe methods and methodology for hiding, displaying, and transferring data in video games and their related applications. Additionally, we will offer recommendations on how an investigator might search for any hidden data such as comparing hashes of unaltered game files to the altered game files on a suspect´s machine. To the best of our knowledge, this is the first systematic research on the modification and forensics of popular games.
  • Keywords
    computer games; digital forensics; steganography; BF3; Battlefield 3; Defense of the Ancients 2; DotA 2; GMod; Garry Mod; League of Legends; LoL; PC video games; SC2; StarCraft 2; WoW; World of Warcraft; cyberworld attack vectors; digital forensics; hidden data; hidden message; secretive communications; secretive message transmission; unaltered game files; video game customization; video game forensics; Communities; Engines; Games; Matched filters; Servers; Solid modeling; Vectors; BF3; Battlefield 3; Defense of the Ancients 2; DotA 2; GMod; Garry´s Mod; League of Legends; LoL; SC2; StarCraft 2; WoW; World of Warcraft; bot; digital forensics; exploit; games investigation; hidden data; hidden message; steganography;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computing, Networking and Communications (ICNC), 2014 International Conference on
  • Conference_Location
    Honolulu, HI
  • Type

    conf

  • DOI
    10.1109/ICCNC.2014.6785463
  • Filename
    6785463