A Study on Countermeasures for Personal Data Breach and Security Threats of Social Network Game
Sang Won Lee,Huy Kang Kim,Eunjin Kim +2 more
- Vol. 15, Iss: 1, pp 77-88
Reads0
Chats0
TLDR
This research investigates the weak points of SNG through memory manipulation experiments based on the currently provided SNG services and presents counter measures and security enforcements that are light in service load and simplistic which can be applied in the developing process.Abstract:
As the smart phone market is drastically expanding, there is a steady growth of recent vicious activities such as data manipulation, billing fraud, identity theft, and leakage of personal information that are security threats to Social Network Games(SNG). Due to the threats, Strong development standard is required for security enhancement of SNG. Nonetheless, short life-spans, additional expenses, and the necessities to provide a sound game service hinders developers from reaching their security goals. Therefore, this research investigates the weak points of SNG through memory manipulation experiments based on the currently provided SNG services. In addition, the research presents counter measures and security enforcements that are light in service load and simplistic which can be applied in the developing process.Keywords : Social Network Games, Android Game Security, Memory Manipulation Received: Nov. 13, 2014 Revised: Dec. 15, 2014 Accepted: Dec. 29, 2014Corresponding Author: Eun Jin Kim(Kyonggi University)E-mail: ejkim777@kgu.ac.krISSN: 1598-4540 / eISSN: 2287-8211Ⓒ The Korea Game Society. All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.otg/licenses/by-nc/3.0), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.read more
Citations
More filters
References
More filters
Proceedings ArticleDOI
Survey and research direction on online game security
Jiyoung Woo,Huy Kang Kim +1 more
TL;DR: This study surveys academic research efforts and industry practices related to the various threats associated with game bots and gold farmers, and examines the actual illegal activities and look at countermeasures being adopted in the field.
Journal ArticleDOI
Structural and Functional Analyses of ProGuard Obfuscation Tool
TL;DR: This paper thoroughly analyzes obfuscation mechanisms applied in ProGuard, investigates its limitations, and gives some direction about its improvement.
Journal ArticleDOI
A study on the vulnerability of integrity verification functions of android-based smartphone banking applications
TL;DR: This study suggests the vulnerabilities of the integrity verification functions of banking apps by using Android reverse engineering analysis techniques and suggests the specific solutions to those vulnerabilities, which will contribute to improving the security level of smartphone financial transaction environment against the application forgery attacks.
Proceedings ArticleDOI
Modeling of bot usage diffusion across social networks in MMORPGs
TL;DR: The experimental results showed that the diffusion model can explain the spread of malicious behavior in the adoption of a game bot among players connected via goal-oriented communities.
Journal ArticleDOI
Classification of Smartphone Game based on Mechanics
TL;DR: A new method to categorize smartphone games through game mechanics of principal design components is proposed, which aims to simplify the classification of these new smartphone games due to their new input and output interface.