Copy Protection of Computer Games

Richard Hyams

(2008)

Richard Hyams (2008) Copy Protection of Computer Games.

Our Full Text Deposits

Full text access: Open

Full Text - 932.15 KB

Links to Copies of this Item Held Elsewhere


Abstract

In this dissertation we look at the effectiveness of copy protection for computer games distributed on physical media such as CD and digitally, over the internet. To set the scene a history of computer game piracy is described and the threats to today's computer games in terms of piracy are reviewed. A demonstration of how to obtain a pirated game is performed to show how easy this has become since the growth of the internet. Copy protection techniques are then described initially from an historical perspective and then by looking at the state of the art for both physical media and online distributed copy prevention. Each is reviewed by looking at the capabilities and shortcomings along with the possible methods of attacking each type of protection. We find that at present with the new techniques that online distribution bring that it is far more effective than physical media protection. The technique of making the consumer bind their game to an account which allows them to play online has been particularly effective. Finally it is demonstrated that online copy protection is effective in the real world, by investigating how long it takes for a copy protection to be bypassed for a number of computer games released either on physical media or online. It was found that none of the games released online had any pirated copies available online leading to the conclusion that this protection had not been bypasses yet. It was however noted that most of the computer game titles with large sales were released both online and on physical media and therefore the attack will be towards the physical media copy protection rather than online and so until games are only distributed online can we be really totally sure of the online copy protection effectiveness.

Information about this Version

This is a Published version
This version's date is: 15/01/2008
This item is peer reviewed

Link to this Version

https://repository.royalholloway.ac.uk/items/a8bd498c-2fba-bc1b-9bac-0a843ad4db02/1/

Item TypeMonograph (Technical Report)
TitleCopy Protection of Computer Games
AuthorsHyams, Richard
DepartmentsFaculty of Science\Mathematics

Deposited by () on 24-Jun-2010 in Royal Holloway Research Online.Last modified on 15-Dec-2010

Notes

References

[BA06] Business Software Alliance - FOURTH ANNUAL BSA AND IDC GLOBAL
SOFTWARE PIRACY STUDY -2006
http://www.bsa.org/globalstudy/upload/2007-Global-Piracy-Study-EN.pdf (visited
May 2007)

[BC03] BBC News – Half-life 2 code leaked online – 2003
http://news.bbc.co.uk/1/hi/technology/3162074.stm (visited 12 June 07)

[[BC04] BBC news – Chinas online sales double -2004
http://news.bbc.co.uk/1/hi/business/3402011.stm (visited 17 July 07)

[BC05] BBC News – xbox360 copy protection cracks – 2005
http://news.bbc.co.uk/1/hi/technology/4530702.stm (visited - 17 June 2007)

[BB01] Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit
Sahai, Salil Vadhan and Ke Yang - On the (Im)possibility of Obfuscating Programs -
Advances in Cryptology - CRYPTO `01, vol. 2139 of Lecture Notes in Computer
Science- 2001. Springer-Verlag.

[BG04] Ben Garrett – Online software piracy of the last millennium – 2004
http://www.defacto2.net/web.pages/online software piracy of the last millennium.pdf
(visited 5 June 2007)

[BL07] Emulation of battlenet FAQ -
http://www.battle.net/support/emulationfaq.shtml (visited 2 June 2007)

[BS92] Bruce sterling – The hacker crackdown, Law and order on the electronic
frontier 1992 ISBN 0-553-56370-X 1992

[CU07] Hacker Group – Curse-x, http://forum.curse-x.com/older-applications/15426-
game-hacker-group-app.html (visited 2 June 2007)

[DT07] Daemon tools – http://www.daemon-tools.cc/ (visited 5 august 2007)

[JD01] Jana Dittermann, P Wohlmacher, R Ackermann – Conditional and user
specific access to services and resources using annotation watermarks –
communications and multimedia security issues of the new century – 2001- Kluwer
academic publishers

[EC96] ECMA International - Standard ECMA-130 Data Interchange on Read-only
120 mm Optical Data Disks CD-ROM - 1996
http://www.ecma-international.org/publications/standards/Ecma-130.htm (visited 12
August 2006)

[EI07] Eidos – www.eidos.com (visited 6 July 2007)

[ES06]Entertainment software association – Top 10 industry facts
http://www.theesa.com/facts/top_10_facts.php (visited 1 June 2007)

[FR05] Tamar Polgar - Freax: Volume 1 2005 - ISBN 3981049403

[GC06] Galactic civilisations forum – Galactic Civilizations II, copy Protection and
piracy - http://forums.galciv2.com/index.aspx?forumid=161&aid=106741&c=1
(visited June 2006)

[GM06] Ginger Miles, Stefan Nusser –content protection of games- IBM systems
journal- Vol 45 no 1 -2006

[Gm06b] Ginger miles -Preventing Piracy within the games industry - The
international digital media & arts association journal vol2 no1 - ISSN: 1554-0405- 2005

[HC01] H Chang, M.G Atallah – protecting software code by guards. ACM workshop
on security and privacy in digital rights management –CCS -8 DRM 2001 ISBN 3-
540-43677-4 Springer

[II07] International Intellectual Property Alliance - 2007 Special 301 Report
http://www.iipa.com/2007_SPEC301_TOC.htm (visited 12 June 07)

[JB05] Dr Jo Bryce, Dr Jason Rutter - FAKE nation –A Study into an Everyday
Crime. Organised Crime Task Force, Northern Ireland Office (Belfast). - 2005
http://www.nio.gov.uk/fake_nation_-_a_study_into_an_everyday_crime.pdf or
http://www.cric.ac.uk/cric/staff/Jason_Rutter/papers/FakeNation.pdf

[JL07] John Leyden -The Register – Blu-ray DRM defeated
http://www.theregister.co.uk/2007/01/23/blu_ray_drm_cracked- (visited 17 June
2007)

[KK02]Larry Korba, Steve Kenny – Towards meeting the privacy challenge: adapting
CS-9 Workshop DRM 2002 Springer ISBN 3-540-40410-4
[KK04] Kris Kaspersky – CD cracking uncovered, Protection against unsanctioned
CD copying – 2004 A List LLC – ISBN 1-931769-33-8

[LI00] D Lie, C Thekkath, M Mitchell, P Lincoln, D Bohen – Architectural support
for copy and tamper resistant software – Proceedings of the ninth International
conference on architectural support for programming languages and operating systems
– ACM -2000

[LA90] Lucasarts – the secret of monkey island -1990
http://www.mobygames.com/game/secret-of-monkey-island (visited 2 June 2007)

[MA07] Macrovision –http://www.macrovision.com – makers of the Activemark
system.
http://www.macrovision.com/solutions/distribution_commerce/game_publishers_port
als/game_access_control.htm (visited 12 July 2007)

[MC07] http://www.mod-chip.com/ (visited 12 July 2007)

[MS02]Mark Stamp – digital rights management: the technology behind the hype,
Cupertino, CA http://home.earthlink.net/~mstamp1/papers/DRMpaper.pdf (visited 4
July 2007)

[NS02] New scientist – Philips says copy-protected CDs have no future -Vol 2324 –
5th Jan 2002
http://www.newscientist.com/article.ns?id=dn1783 (visited august 2007)

[NV06a] National vulnerability database – Vulnerability summary CVE-2006-0858,
star force vulnerability. http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-0858
(visited July 2007)

[NV06b] National vulnerability database – Vulnerability summary CVE-2006-1197,
safe disk vulnerability. http://nvd.nist.gov/nvd.cfm?cvename=CVE-2006-1197
(visited July 2007)

[PB02] Peter Biddle - The darknet and the future of content protection digital rights
management ACM CCS-9 workshop DRM 2002 ISBN 3-540-40410-4 Springer

[QL03] Qiong Liu, Reihaneh Safavi-Naini, Nicholas Paul Sheppard – Digital Rights
management for content Distribution- Australasian Information security workshop
2003, Conferences in research and practice in Information technology , Vol 21

[RI01]Renato Iannella – Digital Rights Management Architectures -D-LIB Magazine
Vol 7 no 6 – June 2001 – ISSN 1082-9873

[RL07] release log - Tomb Raider Anniversary-R55 – 2007
http://www.rlslog.net/tomb-raider-anniversary-r55/ (visited 12 June 07)

[ST07] http://www.steampowered.com/ (visited 3 July 2007)

[TM84] T Maude and D Maude – Hardware protection against software piracy –
communications of the ACM 27 1984

[TT07] – Top ten game cop software reviews - http://game-copy-softwarereview.
toptenreviews.com/ - (visited 1 august 2007)

[TR07] Trusted computing Group home –trusted computing grouphttp://
www.trustedcomputinggroup.org/home - (visited 17 June 2007)

[VA07] Valve - http://www.valvesoftware.com/ (visited 2 July 2007)


Details