CFP last date
20 December 2024
Reseach Article

A Comprehensive Analysis of Game Hacking through Injectors: Exploits, Defenses and Beyond

by Francis Martinson, Dylan Rangel
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 33
Year of Publication: 2023
Authors: Francis Martinson, Dylan Rangel
10.5120/ijca2023923110

Francis Martinson, Dylan Rangel . A Comprehensive Analysis of Game Hacking through Injectors: Exploits, Defenses and Beyond. International Journal of Computer Applications. 185, 33 ( Sep 2023), 56-63. DOI=10.5120/ijca2023923110

@article{ 10.5120/ijca2023923110,
author = { Francis Martinson, Dylan Rangel },
title = { A Comprehensive Analysis of Game Hacking through Injectors: Exploits, Defenses and Beyond },
journal = { International Journal of Computer Applications },
issue_date = { Sep 2023 },
volume = { 185 },
number = { 33 },
month = { Sep },
year = { 2023 },
issn = { 0975-8887 },
pages = { 56-63 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number33/32906-2023923110/ },
doi = { 10.5120/ijca2023923110 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:27:43.396478+05:30
%A Francis Martinson
%A Dylan Rangel
%T A Comprehensive Analysis of Game Hacking through Injectors: Exploits, Defenses and Beyond
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 33
%P 56-63
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The emergence and rapid adoption of online gaming have resulted in massive multiplayer games and virtual landscapes that enable players to interact in real-time within a digital ecosystem. Competitive gaming has led some players to succumb to the temptation of employing illegitimate methods to achieve an unfair advantage over others, thereby compromising the gaming experience's authenticity and fairness. Game hacking is a pervasive problem that challenges the industry and raises crucial questions about the extent and the implications of such behavior in the gaming community. One of the most common methods employed by hackers is the use of injectors to compromise a game's code and modify its structure. As sophisticated software defenses evolve, questions arise as to how effectively developers can deter and combat hackers. This research discusses the mechanisms behind injectors, their methods of exploitation, and the potential strategies employed by game developers and anti-cheat systems to prevent hacking.

References
  1. Arefin, S., Islam, S. S., & Chy, A. M. (2018). Identification of DLL injection technique based malware from process monitoring data. Journal of King Saud University-Computer and Information Sciences, 30(4), 465-474.
  2. Chen, H. T., Chen, S. Y., & Tu, C. H. (2009). Why do people immerse in the subculture of online game hacking: Contextual factors and their interactions. Social Behavior and Personality: An International Journal, 37(10), 1269-1280.
  3. Chen, H. T., Tu, C. H., & Wang, S. Y. (2008). Discovering the Motivation behind the Hacker's Mind: An Integrative Structural Model of Hacking Behaviors. Social Behavior and Personality: An International Journal, 36(2), 237-244Tavel, P. 2007 Modeling and Simulation Design. AK Peters Ltd.
  4. Hamari, J., & Sjöblom, M. (2017). What is eSports and why do people watch it? Internet research, 27(2), 211-232.
  5. Halfond, W. G., Viegas, J., & Orso, A. (2006). A classification of SQL-injection attacks and countermeasures. Proceedings from IEEE International Symposium on Secure Software Engineering, Arlington, VA.
  6. Hutchins, B., & Rowe, D. (2018). eSports, skins betting and wire fraud vulnerability. Communication Research and Practice, 4(2), 145-162.
  7. Klumbyte, N., & Kerner, D. N. (2019). Digital cheating: the case of esports. European Journal for Sport and Society, 16(1), 85-104.
  8. Krebs, B. (2014). The Target breach, by the numbers. KrebsOnSecurity. Retrieved from https://nam06.safelinks.protection.outlook.com/?url=https%3A%2F%2Fkrebsonsecurity.com%2F2014%2F02%2Fthe-target-breach-by-the-numbers%2F&data=05%7C01%7Cfrancis.martinson%40microsoft.com%7C450cfc6861cb40b0fec008db534b447a%7C72f988bf86f141af91ab2d7cd011db47%7C1%7C0%7C638195354962725148%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=pARaQygDrg
  9. Kushner, D. (2013). The real story of Stuxnet. IEEE Spectrum, 1-7.
  10. Li, Y., Yan, G., Xia, Z., Chen, B., Li, H., & Wu, D. D. (2018). Detecting Cheat Activities in Online Game: A Data Mining Approach. Decision Analysis, 15(3), 160-175.
  11. Mansfield-Devine, S. (2009). A short history of hacking. Network Security, 2009(2), 4-6.
  12. Sadeghi, A. R. (2018). The internet of insecure things: End-to-end security and privacy challenges. Proceedings of the IEEE, 106(9), 1706-1710.
  13. Richards, P. (2018). Tackling cheaters and pirates: Strategies for combating digital piracy in the video game industry. Interactive Entertainment Law Review, 1(1), 40-54.
  14. https://developer.valvesoftware.com/wiki/Visibility_optimization
  15. https://developer.valvesoftware.com/wiki/Func_occluder
  16. https://developer.valvesoftware.com/wiki/Source
  17. Ikariiillustration/injector (github.com).
Index Terms

Computer Science
Information Sciences

Keywords

Consoles injectors dynamic link libraries hackers developers modding Real Money Trade (RMT) Piracy Game Hacking.