Egaming security


Project Description

Online Gaming represents a huge economic sector these days, even bigger than the movies industry. They enjoy a spectacular and continuous growth. They rely on a number of different business models but, in many games (not to say most of them), there are financial incentives for players to cheat to improve their performances, to attack others to win parties, to rely on external third parties to acquire new privileges/skills, to buy/sell virtual elements of the games against real monetary values, to misuse the games to commit money laundering, etc… Over the last years, a great creativity has taken place among fraudsters to provide techniques, tools, services to cheat and commit fraud. The goal of this project is twofold. First, we will carry out a review of the state of the art in terms of scientific contributions to the field. Second, we will experiment with real attacks, in a confined environment, on real platforms, assess their severity and find ways to mitigate them. Any new attack found in the course of this work will be reported to companies following a responsible disclosure process. You do not need to be an experienced gamer to apply for this project but if you are, it could help. Most importantly, a desire to understand how networks function, an appetite for looking at packets and strange protocols is a must. Python programming is going to be required. Particular attention will be devoted to ethical consideration before experimenting with any of the identified cheating techniques. Any student misusing the knowledge gained during this project, for his own profit or others, will suffer severe consequences
Program - Computer Science
Division - Computer, Electrical and Mathematical Sciences and Engineering
Center Affiliation - Resilient Computing and Cybersecurity Center
Field of Study - Networking security

About the

Marc Dacier

Professor, Computer Science<br/>Associate Director of Resilient Computing and Cybersecurity Center

Marc Dacier

Marc Dacier is a full professor of Computer Science (CS) and a member of the Resilience Computing and Cybersecurity research Center (RC3) at King Abdullah University of Sciences and Technology, Saudi Arabia.

Dr. Dacier obtained his Ph.D. from INPT in 1994 from his work done at LAAS, CNRS, in Toulouse (France). Since then, he has had a balanced career between industry and academia. After his thesis, he worked for one year as a security consultant in Paris, France, for France Telecom and the French ministry of interior. In 1996, he joined IBM Research in Zurich (Switzerland) to create the Global Security Analysis Laboratory (GSAL). In 2002, he became a professor at Eurecom. In 2008, he joined Symantec to build its European Research Labs. Later, he spent two years in the USA to manage all the collaborative research projects, worldwide. In that role, he was in charge of teams in France, Ireland, and in the United States. He was also the university relationship manager for Symantec Research Labs, worldwide. In 2014, he became the director of the cybersecurity research group at QCRI, in Qatar, where he lived for 3 years. In October 2017, Dr. Dacier came back to EURECOM to become the head of the Digital Security department and a full professor. An internationally recognized expert in cybersecurity, Dr. Dacier has served on more than 120 program committees of all major security and dependability conferences and as a member of the editorial board of several top-tier technical peer-reviewed journals.

Desired Project Deliverables

As part of the SeRBER team, the intern will produce a review of the state of the art,. He/She will build a confined networking environment amenable to run repeatable experiments with various games and various game platforms and launch different kinds of attacks against them, while measuring various characteristics of the attack. Mitigation techniques will also be experimented with.