scispace - formally typeset
Open AccessJournal ArticleDOI

A Study on Countermeasures for Personal Data Breach and Security Threats of Social Network Game

Reads0
Chats0
TLDR
This research investigates the weak points of SNG through memory manipulation experiments based on the currently provided SNG services and presents counter measures and security enforcements that are light in service load and simplistic which can be applied in the developing process.
Abstract
As the smart phone market is drastically expanding, there is a steady growth of recent vicious activities such as data manipulation, billing fraud, identity theft, and leakage of personal information that are security threats to Social Network Games(SNG). Due to the threats, Strong development standard is required for security enhancement of SNG. Nonetheless, short life-spans, additional expenses, and the necessities to provide a sound game service hinders developers from reaching their security goals. Therefore, this research investigates the weak points of SNG through memory manipulation experiments based on the currently provided SNG services. In addition, the research presents counter measures and security enforcements that are light in service load and simplistic which can be applied in the developing process.Keywords : Social Network Games, Android Game Security, Memory Manipulation Received: Nov. 13, 2014 Revised: Dec. 15, 2014 Accepted: Dec. 29, 2014Corresponding Author: Eun Jin Kim(Kyonggi University)E-mail: ejkim777@kgu.ac.krISSN: 1598-4540 / eISSN: 2287-8211Ⓒ The Korea Game Society. All rights reserved. This is an open-access article distributed under the terms of the Creative Commons Attribution Non-Commercial License (http://creativecommons.otg/licenses/by-nc/3.0), which permits unrestricted non-commercial use, distribution, and reproduction in any medium, provided the original work is properly cited.

read more

Citations
References
More filters
Proceedings ArticleDOI

Survey and research direction on online game security

TL;DR: This study surveys academic research efforts and industry practices related to the various threats associated with game bots and gold farmers, and examines the actual illegal activities and look at countermeasures being adopted in the field.
Journal ArticleDOI

Structural and Functional Analyses of ProGuard Obfuscation Tool

TL;DR: This paper thoroughly analyzes obfuscation mechanisms applied in ProGuard, investigates its limitations, and gives some direction about its improvement.
Journal ArticleDOI

A study on the vulnerability of integrity verification functions of android-based smartphone banking applications

TL;DR: This study suggests the vulnerabilities of the integrity verification functions of banking apps by using Android reverse engineering analysis techniques and suggests the specific solutions to those vulnerabilities, which will contribute to improving the security level of smartphone financial transaction environment against the application forgery attacks.
Proceedings ArticleDOI

Modeling of bot usage diffusion across social networks in MMORPGs

TL;DR: The experimental results showed that the diffusion model can explain the spread of malicious behavior in the adoption of a game bot among players connected via goal-oriented communities.
Journal ArticleDOI

Classification of Smartphone Game based on Mechanics

TL;DR: A new method to categorize smartphone games through game mechanics of principal design components is proposed, which aims to simplify the classification of these new smartphone games due to their new input and output interface.
Related Papers (5)