Emerging Cyberworld Attack Vectors: Modification, Customization, Secretive Communications, and Digital Forensics in PC Video Games

Michael Ebrahimi, Lei Chen

Research output: Contribution to book or proceedingChapter

Abstract

Complexity of customization in video games threatens to provide people with malicious intent a new vector for the secretive transmission of messages as well as data. This paper explores six different games including some of the most popular games of early 2013: World of Warcraft (WoW), League of Legends (LoL), Defense of the Ancients 2 (DotA 2), StarCraft 2 (SC2), Battlefield 3 (BF3), and Garry's Mod (GMod). Our research has shown that each of these games have at least one feature that an attacker may exploit in order to transfer information. Since video game forensics is still in an infantile stage, an investigator may not suspect video games and their data files as accomplices to crime. Within this paper, we will describe methods and methodology for hiding, displaying, and transferring data in video games and their related applications. Additionally, we will offer recommendations on how an investigator might search for any hidden data such as comparing hashes of unaltered game files to the altered game files on a suspect's machine. To the best of our knowledge, this is the first systematic research on the modification and forensics of popular games.
Original languageAmerican English
Title of host publicationProceedings of the International Conference on Computing, Networking, and Communications
DOIs
StatePublished - Feb 3 2014

Keywords

  • BF3
  • Battlefield 3
  • Bot
  • Defense of the ancients 2
  • Digital forensics
  • DotA 2
  • Exploit
  • GMod
  • Games invesitgation
  • Garry's mod
  • Hidden data
  • Hidden message
  • League of legends
  • LoL
  • SC2
  • Starcraft 2
  • Steganography
  • WoW
  • World of warcraft

DC Disciplines

  • Databases and Information Systems

Fingerprint

Dive into the research topics of 'Emerging Cyberworld Attack Vectors: Modification, Customization, Secretive Communications, and Digital Forensics in PC Video Games'. Together they form a unique fingerprint.

Cite this