{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T15:14:50Z","timestamp":1723130090144},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","funder":[{"name":"National Research Foundation","award":["NRF-2019R1C1C1006095"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,30]]},"DOI":"10.1145\/3372297.3417890","type":"proceedings-article","created":{"date-parts":[[2020,11,2]],"date-time":"2020-11-02T18:27:04Z","timestamp":1604341624000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["BlackMirror: Preventing Wallhacks in 3D Online FPS Games"],"prefix":"10.1145","author":[{"given":"Seonghyun","family":"Park","sequence":"first","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]},{"given":"Adil","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Byoungyoung","family":"Lee","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}]}],"member":"320","published-online":{"date-parts":[[2020,11,2]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Global games market report. https:\/\/newzoo.com\/products\/reports\/global-games-market-report\/. Global games market report. https:\/\/newzoo.com\/products\/reports\/global-games-market-report\/."},{"key":"e_1_3_2_2_2_1","unstructured":"Report: Cheating is becoming a big problem in online gaming. https:\/\/www.forbes.com\/sites\/nelsongranados\/2018\/04\/30\/report-cheating-is-becoming-a-big-problem-in-online-gaming. Report: Cheating is becoming a big problem in online gaming. https:\/\/www.forbes.com\/sites\/nelsongranados\/2018\/04\/30\/report-cheating-is-becoming-a-big-problem-in-online-gaming."},{"key":"e_1_3_2_2_3_1","unstructured":"Battleye: The anti-cheat gold standard. https:\/\/www.battleye.com. Accessed: 2020-01-03. Battleye: The anti-cheat gold standard. https:\/\/www.battleye.com. Accessed: 2020-01-03."},{"key":"e_1_3_2_2_4_1","unstructured":"Valve anti-cheat system (vac). https:\/\/support.steampowered.com\/kb\/7849-RADZ-6869\/#whatisvac. Accessed: 2020-01-03. Valve anti-cheat system (vac). https:\/\/support.steampowered.com\/kb\/7849-RADZ-6869\/#whatisvac. Accessed: 2020-01-03."},{"key":"e_1_3_2_2_5_1","unstructured":"Easy anti-cheat. https:\/\/www.easy.ac\/en-us\/. Accessed: 2020-01-03. Easy anti-cheat. https:\/\/www.easy.ac\/en-us\/. Accessed: 2020-01-03."},{"key":"e_1_3_2_2_6_1","first-page":"2019","author":"Noguera Joel","year":"2019","journal-title":"Recon Montreal"},{"key":"e_1_3_2_2_7_1","unstructured":"Cheat engine. https:\/\/www.cheatengine.org\/. Accessed: 2020-01-02. Cheat engine. https:\/\/www.cheatengine.org\/. Accessed: 2020-01-02."},{"key":"e_1_3_2_2_8_1","volume-title":"January","author":"Noguera Joel","year":"2019"},{"key":"e_1_3_2_2_9_1","volume-title":"October","author":"Schou Carl","year":"2019"},{"key":"e_1_3_2_2_10_1","volume-title":"Unite LA","author":"Andreasen Peter","year":"2018"},{"key":"e_1_3_2_2_11_1","unstructured":"Quake 2 gpl release. https:\/\/github.com\/id-Software\/Quake-2. Quake 2 gpl release. https:\/\/github.com\/id-Software\/Quake-2."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"e_1_3_2_2_13_1","unstructured":"Ittai Anati Shay Gueron Simon P Johnson and Vincent R Scarlata. Innovative technology for cpu based attestation and sealing. Ittai Anati Shay Gueron Simon P Johnson and Vincent R Scarlata. Innovative technology for cpu based attestation and sealing."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3029806.3029822"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00036"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24112"},{"key":"e_1_3_2_2_17_1","volume-title":"Proceedings of the 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Volos Stavros","year":"2018"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304021"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.45"},{"key":"e_1_3_2_2_20_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (Security)","author":"Bulck Jo Van","year":"2017"},{"key":"e_1_3_2_2_21_1","volume-title":"11th USENIX Workshop on Offensive Technologies (WOOT 17)","author":"Brasser Ferdinand","year":"2017"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152701.3152706"},{"key":"e_1_3_2_2_23_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (Security)","author":"Bulck Jo Van","year":"2018"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00002"},{"key":"e_1_3_2_2_25_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (Security)","author":"Lipp Moritz","year":"2018"},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the 26th USENIX Security Symposium (Security)","author":"Lee Jaehyuk","year":"2017"},{"key":"e_1_3_2_2_27_1","volume-title":"Proceedings of the 27th USENIX Security Symposium (Security)","author":"Biondo Andrea","year":"2018"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23037"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064192"},{"key":"e_1_3_2_2_30_1","first-page":"2014","author":"Guigo Nicilas","year":"2014","journal-title":"Black Hat Europe"},{"key":"e_1_3_2_2_31_1","unstructured":"Playerunknown's battleground. https:\/\/www.pubg.com. Accessed: 2020-04--30. Playerunknown's battleground. https:\/\/www.pubg.com. Accessed: 2020-04--30."},{"key":"e_1_3_2_2_32_1","unstructured":"Osiris. https:\/\/github.com\/danielkrupinski\/Osiris. Osiris. https:\/\/github.com\/danielkrupinski\/Osiris."},{"key":"e_1_3_2_2_33_1","unstructured":"Charlatano. https:\/\/github.com\/Jire\/Charlatano. Charlatano. https:\/\/github.com\/Jire\/Charlatano."},{"key":"e_1_3_2_2_34_1","unstructured":"Onebytewallhack. https:\/\/github.com\/danielkrupinski\/OneByteWallhack. Onebytewallhack. https:\/\/github.com\/danielkrupinski\/OneByteWallhack."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.28"},{"key":"e_1_3_2_2_36_1","unstructured":"imgui. https:\/\/github.com\/ocornut\/imgui. imgui. https:\/\/github.com\/ocornut\/imgui."},{"key":"e_1_3_2_2_37_1","volume-title":"Proceedings of the 2017 USENIX Annual Technical Conference (ATC)","author":"Tsai Chia","year":"2017"},{"key":"e_1_3_2_2_38_1","unstructured":"Swiftshader. https:\/\/github.com\/google\/swiftshader. Swiftshader. https:\/\/github.com\/google\/swiftshader."},{"key":"e_1_3_2_2_39_1","unstructured":"Xigncode3. https:\/\/www.wellbia.com\/home\/en\/pages\/xigncode3\/. Accessed: 2020-01-03. Xigncode3. https:\/\/www.wellbia.com\/home\/en\/pages\/xigncode3\/. Accessed: 2020-01-03."},{"key":"e_1_3_2_2_40_1","unstructured":"Riot's approach to anti-cheat. https:\/\/technology.riotgames.com\/news\/riots-approach-anti-cheat. Accessed: 2019--12--28. Riot's approach to anti-cheat. https:\/\/technology.riotgames.com\/news\/riots-approach-anti-cheat. Accessed: 2019--12--28."},{"key":"e_1_3_2_2_41_1","volume-title":"February","author":"Schou Carl","year":"2019"},{"key":"e_1_3_2_2_42_1","volume-title":"Proceedings of the 25th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)","author":"Shen Youren","year":"2020"},{"key":"e_1_3_2_2_43_1","volume-title":"Proceedings of the 26th ACM Conference on Computer and Communications Security (CCS)","author":"Chen Guoxing","year":"2018"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23284"},{"key":"e_1_3_2_2_45_1","volume-title":"Proceedings of the 12th European Conference on Computer Systems (EuroSys)","author":"Orenbach Meni","year":"2017"},{"key":"e_1_3_2_2_46_1","volume-title":"Overview of protected file system library using software guard extensions","author":"Selvaraj Surenthar","year":"2016"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755919"},{"key":"e_1_3_2_2_48_1","volume-title":"Proceedings of the 23rd International Conference on Supercomputing (ICS)","author":"Gajinov Vladimir","year":"2009"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.62"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594835.1504183"},{"key":"e_1_3_2_2_51_1","unstructured":"ccQ2RTX. https:\/\/github.com\/NVIDIA\/Q2RTX. ccQ2RTX. https:\/\/github.com\/NVIDIA\/Q2RTX."},{"key":"e_1_3_2_2_52_1","unstructured":"ccQ2PRO. https:\/\/github.com\/skullernet\/q2pro. ccQ2PRO. https:\/\/github.com\/skullernet\/q2pro."},{"key":"e_1_3_2_2_53_1","unstructured":"Masked software occlusion culling. https:\/\/github.com\/gametechdev\/maskedocclusionculling. Masked software occlusion culling. https:\/\/github.com\/gametechdev\/maskedocclusionculling."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/2977336.2977340"},{"key":"e_1_3_2_2_55_1","unstructured":"ccARB_occlusion_query. https:\/\/www.khronos.org\/registry\/OpenGL\/extensions\/ARB\/ARB_occlusion_query.txt. ccARB_occlusion_query. https:\/\/www.khronos.org\/registry\/OpenGL\/extensions\/ARB\/ARB_occlusion_query.txt."},{"key":"e_1_3_2_2_56_1","unstructured":"Xonotic. https:\/\/github.com\/xonotic\/xonotic. Xonotic. https:\/\/github.com\/xonotic\/xonotic."},{"key":"e_1_3_2_2_57_1","unstructured":"Red eclipse 2. https:\/\/github.com\/redeclipse\/base. Red eclipse 2. https:\/\/github.com\/redeclipse\/base."},{"key":"e_1_3_2_2_58_1","unstructured":"Visibilty and occlusion culling. https:\/\/docs.unrealengine.com\/en-US\/Engine\/Rendering\/VisibilityCulling\/index.html. Visibilty and occlusion culling. https:\/\/docs.unrealengine.com\/en-US\/Engine\/Rendering\/VisibilityCulling\/index.html."},{"key":"e_1_3_2_2_59_1","unstructured":"Skinned mesh renderer. https:\/\/docs.unity3d.com\/Manual\/class-SkinnedMeshRenderer.html. Accessed: 2020--5--1. Skinned mesh renderer. https:\/\/docs.unity3d.com\/Manual\/class-SkinnedMeshRenderer.html. Accessed: 2020--5--1."},{"key":"e_1_3_2_2_60_1","volume-title":"Advaned Micro Devices","author":"Kaplan David","year":"2016"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3214292.3214301"},{"key":"e_1_3_2_2_62_1","volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Haeberlen Andreas","year":"2010"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007788.3007792"},{"key":"e_1_3_2_2_64_1","volume-title":"ACM SIGGRAPH 2011 Talks, SIGGRAPH '11","author":"Valient Michal","year":"2011"}],"event":{"name":"CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event USA","acronym":"CCS '20","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3372297.3417890","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T00:44:46Z","timestamp":1673225086000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3372297.3417890"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10,30]]},"references-count":64,"alternative-id":["10.1145\/3372297.3417890","10.1145\/3372297"],"URL":"https:\/\/doi.org\/10.1145\/3372297.3417890","relation":{},"subject":[],"published":{"date-parts":[[2020,10,30]]},"assertion":[{"value":"2020-11-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}