Statistical Effort Modelling of Game Resource Localisation Attacks

📅 2026-03-04
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
This study addresses the lack of quantifiable and scalable modeling approaches for estimating cracking effort in Man-At-The-End (MATE) attacks that require human interaction, such as game asset localization attacks. It introduces, for the first time, a statistical effort modeling methodology tailored to such scenarios, proposing an automated framework that integrates automated data collection, attack strategy feature extraction, and empirical analysis. The approach is validated through two real-world game case studies, where high-predictive-validity effort models are successfully constructed, demonstrating both feasibility and practical utility. This work establishes a novel, scalable, and quantitative paradigm for evaluating software protection mechanisms, offering significant advantages over traditional assessment methods that rely on manual expertise and subjective judgment.

Technology Category

Application Category

📝 Abstract
Evidence on the effectiveness of Man-At-The-End (MATE) software protections, such as code obfuscation, has mainly come from limited empirical research. Recently, however, an automatable method was proposed to obtain statistical models of the required effort to attack (protected) software. The proposed method was sketched for a number of attack strategies but not instantiated, evaluated, or validated for those that require human interaction with the attacked software. In this paper, we present a full instantiation of the method to obtain statistical effort models for game resource localisation attacks, which represent a major step towards creating game cheats, a prime example of MATE attacks. We discuss in detail all relevant aspects of our instantiation and the results obtained for two game use cases. Our results confirm the feasibility of the proposed method and its utility for decision support for users of software protection tools. These results open up a new avenue for obtaining models of the impact of software protections on reverse engineering attacks, which will scale much better than empirical research involving human participants.
Problem

Research questions and friction points this paper is trying to address.

Statistical Effort Modelling
Game Resource Localisation Attacks
Man-At-The-End Attacks
Software Protection
Reverse Engineering
Innovation

Methods, ideas, or system contributions that make the work stand out.

Statistical Effort Modelling
Game Resource Localisation Attacks
Man-At-The-End (MATE) Protection
Software Obfuscation
Automatable Attack Evaluation
🔎 Similar Papers
No similar papers found.
A
Alessandro Sanna
Dipartimento di Ingegneria Elettrica e Elettronica, Università di Cagliari, Via Marengo 3, 09123, Cagliari, Italy
W
Waldo Verstraete
Computer Systems Lab, Ghent University, Technologiepark-Zwijnaarde 126, 9052, Gent, Belgium
Leonardo Regano
Leonardo Regano
Assistant Professor, Università di Cagliari
Software SecurityNetwork SecurityMachine Learning
Davide Maiorca
Davide Maiorca
Associate Professor of Computer Engineering at University of Cagliari, Italy
Computer SecurityPattern RecognitionAdversarial Machine LearningPDFAndroid
B
Bjorn De Sutter
Computer Systems Lab, Ghent University, Technologiepark-Zwijnaarde 126, 9052, Gent, Belgium