psychological finale and game security
DESCRIPTION
Psychological Finale and Game Security. Paul Taylor 2010. Guest Speakers. Adam and David from BigAnt Studios ( http://www.bigant.com/ ) Arrival: Approx 3:30pm I begin hunting for them when they call You all entertain yourselves with relevant YouTube stuff. Psychology Continued. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/1.jpg)
Psychological Finale and Game Security
Paul Taylor 2010
![Page 2: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/2.jpg)
Guest Speakers
• Adam and David from BigAnt Studios (http://www.bigant.com/)
• Arrival: Approx 3:30pm– I begin hunting for them when they call– You all entertain yourselves with relevant YouTube
stuff
![Page 3: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/3.jpg)
Psychology Continued
Based on Neils Clark – Psychology is Fun
So what does this next slide mean?...
![Page 4: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/4.jpg)
![Page 5: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/5.jpg)
Reward Distribution
![Page 6: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/6.jpg)
Continuous Reinforcement
• Duh!• A reward for every correct action.
• Can be used incrementally for behavioural shaping
http://lh5.ggpht.com/riya.reshu/SPNUthNHZmI/AAAAAAAAD_A/Uuhp-4DSimE/Shaping-Pen-stand.JPG
![Page 7: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/7.jpg)
Continuous Reinforcement
The Negatives...
• Most prone to becoming boring, as players can easily recognise it
![Page 8: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/8.jpg)
Fixed Ratios and Fixed Intervals
• Fixed ratios– Simply a reward after x correct responses
• Fixed intervals– A reward after x time has passed
![Page 9: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/9.jpg)
Variable Ratios and Variable Rewards
• Variable Ratio– Reward the player after some number of
responses (with an average number of x)• Variable Rewards– Reward the player with some amount of reward
(with an average of x)
![Page 10: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/10.jpg)
![Page 11: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/11.jpg)
Where do Poker Machines fit?
http://megabonus-home-edition.smartcode.com/images/sshots/megabonus_home_edition_17810.jpeg
![Page 12: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/12.jpg)
![Page 13: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/13.jpg)
2 Minute Design Challenge
• A Gambling game that will HELP problem gamblers........
![Page 14: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/14.jpg)
And now for something completely different...
![Page 15: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/15.jpg)
http://www.guardian.co.uk/technology/2010/oct/04/microsoft-motorola-android-patent-lawsuit
![Page 16: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/16.jpg)
![Page 17: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/17.jpg)
Game Security
http://www.treehugger.com/china-segway-olympics-security.jpg
![Page 18: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/18.jpg)
What is security?
Security:“the state of being free from danger or threat”- OxfordProtection:“the action of protecting, or the state of being
protected”- Oxford
![Page 19: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/19.jpg)
Developing Security
• If it is easy to add the security into your games .......
http://www.yesiamcheap.com/images/oldman.jpg
![Page 20: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/20.jpg)
Lazy, Cheap or Stupid?
http://www.liquidmatrix.org/blog/wp-content/uploads/2009/05/vaderfail.png
![Page 21: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/21.jpg)
Lazy
• We’ll add in security as it’s needed
http://www.proactive-security.com/images/Realme6.gif
![Page 22: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/22.jpg)
An Online Gambling site was hacked to that everyone won 100% of the time
• In the 2 hours it took to take the servers down the company lost 1.9 million.
![Page 23: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/23.jpg)
Bolt-On Security
http://scribalterror.blogs.com/beautiful_english/images/2007/06/04/homemade.jpg
http://www.blogcdn.com/www.engadget.com/media/2008/04/colbert_bot.jpg
![Page 24: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/24.jpg)
Taking Security Seriously...
http://www.geekologie.com/2009/06/you_fool_man_builds_giant_mech.php
![Page 25: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/25.jpg)
How would you protect your Castle?
• Both these photos have used bricks, which would offer you the most protection?
• Why?
http://www.mphohweni.co.za/img/rwanda_brick_laying%5B1%5D.jpg
http://www.instructables.com/files/deriv/FJT/TX50/FXP6OJ7M/FJTTX50FXP6OJ7M.MEDIUM.jpg
![Page 26: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/26.jpg)
http://3.bp.blogspot.com/_thbRorvScz4/SiSxAm-GkXI/AAAAAAAABIw/vp2ZpvKO5oI/s400/bricks.jpghttp://leeharps.com/wp-content/uploads/
2006/03/03-Brick-Pile.gif
![Page 27: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/27.jpg)
Security Systems should be independent
• This doesn’t mean bolt-on, it means manageable, and more importantly each system should be secure in its own right
![Page 28: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/28.jpg)
Chains and Meshes
• You don’t want your security defence to be a chain.
http://tutorialqueen.com/wp-content/uploads/2008/04/3dmodel-link-chain-max-studio-tutorial12.gif
http://www.bombayharbor.com/productImage/0095071001227259954/Chain_Link_Fence.jpg
![Page 29: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/29.jpg)
Industry Protection Methods to date...
• Consoles• DRM / License Management• Online Gaming• Prosecutions
![Page 30: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/30.jpg)
Piracy
http://www.gadgettastic.com/images/software%20piracy.jpg
![Page 31: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/31.jpg)
Preventing DuplicationFAIL
FAIL
![Page 32: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/32.jpg)
Detecting DuplicationFAIL
FAIL
![Page 33: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/33.jpg)
Detecting DuplicationFAIL
FAIL
![Page 34: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/34.jpg)
Disk as a key
FAILFAIL
![Page 35: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/35.jpg)
License Keys
• ID and Checksum• Public key encryption• Online Authorisation
FAILFAIL
![Page 36: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/36.jpg)
Collectables, Feelies, and Stuffz
• People LOVE to collect!– Do NOT google collect, Image #2 moderate, off,
image #3 on strict
WIN
WIN
![Page 37: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/37.jpg)
Battle.Net Authenticator $6.50
• Also in Mobile Phone format
WIN
WIN
![Page 38: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/38.jpg)
Commodore 64• Twin Cassette decks == clones• Sound while copying ~= “It sounded like a Dalek being
flayed alive, but it was actually just the birthing cry of a newly pirated game.”
Source: http://www.gamesradar.com/f/a-brief-history-of-video-game-piracy/a-2010082715101116096
http://static.gamesradar.com/images/mb/GamesRadar/us/Features/2010/08/A%20brief%20history%20of%20piracy/Taping--article_image.jpg
![Page 39: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/39.jpg)
The Nintendo Entertainment System
• The NES contains a lockout chip, the 10NES• IF it detects a fake cart, it sends reset pulses (1
per second) to the console via pin 4.– Guess the solution??
http://www.raphnet.net/electronique/nes_mod/images_lock/lockout_chip2_th.jpg
http://4.bp.blogspot.com/_pJlwRrgGJfk/S-17HldW7AI/AAAAAAAAAVo/kvLQUOMlJx4/s1600/nes-console.jpg
![Page 40: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/40.jpg)
Pirate Consoles
• In the later years, Nintendo even lost console sales to pirates!
• IN Russia Dendy sold as many consoles as
Nintendo!!
http://static.gamesradar.com/images/mb/GamesRadar/us/Features/2010/08/A%20brief%20history%20of%20piracy/NES%20clones--article_image.jpg
http://26.media.tumblr.com/j1FdQE2daikcfffu1yAPYXhDo1_500.jpg
![Page 41: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/41.jpg)
The EVIL anti-piracy techniques used
![Page 42: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/42.jpg)
Lenslok
80’s home computer gamesOnce the cacophonic banshee-wailing of the tape loading
sequence finally came to a merciful end, the game would compound the player’s emotional trauma by flashing up a garbled two-letter code on screen.
http://www.gamesradar.com/f/gamings-most-fiendish-anti-piracy-tricks/a-2010022516730628047
http://farm4.static.flickr.com/3195/2782909930_a20527bfb4.jpg
![Page 43: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/43.jpg)
Lenslok
There were two problems:1) The code had to be manually scaled to make
it readable on different sizes of TV, and the system didn’t work with big or small screens.
2) The codes were incredibly easy to hack, given a bit of coding knowledge.
![Page 44: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/44.jpg)
Batman: Arkham Asylum
Illegal copies of the game worked perfectly apart from one little detail. Batman’s cape glide ability was disabled, making the game playable but uncompleteable.
http://ps3media.ign.com/ps3/image/article/949/949513/batman-arkham-asylum-20090129054204704.jpg
![Page 45: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/45.jpg)
Command & Conquer: Red Alert 2After 30 seconds of play on a pirated
copy of the game, the player’s base and units would detonate.
Like recent EA DRM, the base blasting trick caused all kinds of problems, in particular blowing up the armies of plenty of legitimate players.
Call it a pre-emptive strike just in case they were thinking of passing a copy on.
![Page 46: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/46.jpg)
Operation Flashpoint
Using a system called FADE Dodgy copies would let the game
run Would gradually change the
gameplay in increasingly horrible ways.
Guns lose accuracyEnemies become bullet-sponges The player’s character would gain
the battle resilience of a dead jellyfish.
FADE detected pirate copies by inserting fake errors in the original game code, which CD copiers would clean up, making rip-offs immediately obvious
![Page 47: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/47.jpg)
The Secret of Monkey Island• The game shipped with a cardboard
dial, comprising two circles of different size set one inside the other. Each disc was printed with one half of a series of pirate faces. The game displayed the face of a particular pirate on screen, and the player had to turn the middle disc in order to line up faces and identify the year the pirate was hanged. Typing in the date allowed the game to run.
![Page 48: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/48.jpg)
Metal Gear SolidAt one point in Metal Gear Solid, Snake has to work out how to
contact Meryl via his codec in order to continue the story. The clue is that her codec frequency is on the back of the CD caseCue the world’s unwitting Nintendites searching every object in the
game for hours on end.
http://static.gamesradar.com/images/mb/GamesRadar/us/Features/2010/02/Inventive%20copy%20protection/Metal%20Gear--article_image.jpg
http://blogs.ocweekly.com/heardmentality/Metal_Gear_Solid_ntsc-back.jpg
![Page 49: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/49.jpg)
Dragon Quest V on DS / Final Fantasy Crystal Chronicles: Ring of Fates
The intro sequence in Dragon Quest V looped infinitely in knock-off copies.
FFCC turned into a 20 minute demo, complete with a “Thank you for playing” kick in the stones from a couple of jolly Moogles at the end.
![Page 50: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/50.jpg)
The Silicon Dreams trilogyWhen developer Level 9 released its
Silicon Dreams interactive fiction series in a bundle pack in 1986, it threw in a free, full-length novella as an introduction to the third game’s story.
The book was also used as a password generator. The game asked for the word at a specific page and line reference whenever a saved game was loaded, and given that the source was a full-scale book, no-one was going to bother photocopying all of the content for a mate’s pirating convenience.
It required a binary patch or a lot of photocopying
![Page 51: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/51.jpg)
The Last Resort?
http://thenextweb.com/me/files/2010/07/anti-piracy-measure.jpg
![Page 52: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/52.jpg)
http://static.gamesradar.com/images/mb/GamesRadar/us/Features/2010/08/A%20brief%20history%20of%20piracy/File%20sharing--article_image.jpg
![Page 53: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/53.jpg)
http://www.willisms.com/archives/ramirezsocialsecurity.gif
![Page 54: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/54.jpg)
Threats, Vulnerabilities, and Risk
• These three combine to decide your response
![Page 55: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/55.jpg)
Flash Hacking
• This is why Flash games are not a part of competitions
• http://www.youtube.com/watch?v=dLO2s7SDHJo
• There’s also a Firefox add-on that allows you to tamper with ALL the browser requests
• https://addons.mozilla.org/en-US/firefox/addon/966/
![Page 56: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/56.jpg)
The Military Approach to security
• Protect, Detect, React
• Attack, Defend, counterattack
![Page 57: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/57.jpg)
16 Weeks for one password?
http://imgs.xkcd.com/comics/security.png
http://www.h-online.com/security/news/item/Four-months-jail-for-refusing-to-disclose-password-1102546.html
![Page 58: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/58.jpg)
Nintendo 3DS to have a TPM
• http://au.ds.ign.com/articles/112/1124753p1.html
http://www.tomshw.it/guides/hardware/cpu/20080211/images/tpmchip.jpg
![Page 59: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/59.jpg)
Summary of Security Principles we’ve look over
1. Anything that is easy to add is easy to remove2. Effective Security comes from weaving
together independent systems3. Make your adversary work a lot harder than
you4. If it’s not simple, it’s no secure
![Page 60: Psychological Finale and Game Security](https://reader035.vdocuments.us/reader035/viewer/2022081512/56816777550346895ddc73a1/html5/thumbnails/60.jpg)
References
• http://www.gamasutra.com/view/feature/6145/psychology_is_fun.php
• Protecting Games – Steven Davis