• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Leveraging Trusted Execution Environments to make Online Video Games Cheat-Resistant

Research Project

Project/Area Number 21K17726
Research Category

Grant-in-Aid for Early-Career Scientists

Allocation TypeMulti-year Fund
Review Section Basic Section 60050:Software-related
Research InstitutionInternet Initiative Japan Inc. (Research Laboratory)

Principal Investigator

オブラン ピエールルイ  株式会社インターネットイニシアティブ(技術研究所), 技術研究所 技術研究室, 研究員 (00888886)

Project Period (FY) 2021-04-01 – 2026-03-31
Project Status Granted (Fiscal Year 2023)
Budget Amount *help
¥2,600,000 (Direct Cost: ¥2,000,000、Indirect Cost: ¥600,000)
Fiscal Year 2025: ¥390,000 (Direct Cost: ¥300,000、Indirect Cost: ¥90,000)
Fiscal Year 2024: ¥390,000 (Direct Cost: ¥300,000、Indirect Cost: ¥90,000)
Fiscal Year 2023: ¥390,000 (Direct Cost: ¥300,000、Indirect Cost: ¥90,000)
Fiscal Year 2022: ¥650,000 (Direct Cost: ¥500,000、Indirect Cost: ¥150,000)
Fiscal Year 2021: ¥780,000 (Direct Cost: ¥600,000、Indirect Cost: ¥180,000)
KeywordsTrusted Execution / ARM TrustZone / Intel SGX / RISC-V Keystone / Online video games / TEE / Cheating
Outline of Research at the Start

Even though video games have strong performance requirements, protecting online video games by leveraging TEEs is not a trivial task due to the inherent limitations of TEEs: (i) memory size limitation; (2) no direct access to I/O operations; and (3) non-negligible performance overhead to ensure security properties of the TEE. The challenges of this research project are thus three-fold: 1) how to design an effective method to partition the game code into a secure and unsecure part, to keep the memory footprint small; 2) how to provide trusted I/O; and 3) how to ensure acceptable performance.

Outline of Annual Research Achievements

- Several rounds of submission to Usenix S&P and CCS, but no accept so far.
- Paper accepted at the SysTEX '23 workshop.
- Research paper submitted to the SysTEX '24 workshop, but unfortunately not accepted.
- Started working on securing I/O by leveraging the ARM TrustZone TEE so that a cheater cannot automate his gameplay (e.g., running an aimbot).

Current Status of Research Progress
Current Status of Research Progress

3: Progress in research has been slightly delayed.

Reason

Current results have not been accepted yet to a top-level international conference, so we have to spend more time to strengthen the paper.

In parallel we are continuing working on the other tasks related to the project: small secure memory and absence of trusted I/O.

Strategy for Future Research Activity

Small secure memory: we are actively working on the implementation and evaluation of our solution. We are currently using Qemu, but plan to eventually evaluate our solution on a real RISC-V board.

Trusted I/O: we are working on the implementation of a new system where I/O is protected against a strong attacker, so that a cheater cannot automate his cheats (e.g., running an aimbot). Results with the current prototype, leveraging ARM TrustZone, look promising.

Report

(1 results)
  • 2023 Research-status Report
  • Research Products

    (1 results)

All 2023

All Journal Article (1 results) (of which Int'l Joint Research: 1 results,  Peer Reviewed: 1 results)

  • [Journal Article] Transparent Management of BFT Systems with TEE2023

    • Author(s)
      Li, Bijun and Aublin, Pierre-Louis
    • Journal Title

      Proceedings of the 6th Workshop on System Software for Trusted Execution

      Volume: 1 Pages: 17-19

    • DOI

      10.1145/3578359.3593041

    • Related Report
      2023 Research-status Report
    • Peer Reviewed / Int'l Joint Research

URL: 

Published: 2021-04-28   Modified: 2024-12-25  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi