• Announcements

    • khawk

      Download the Game Design and Indie Game Marketing Freebook   07/19/17

      GameDev.net and CRC Press have teamed up to bring a free ebook of content curated from top titles published by CRC Press. The freebook, Practices of Game Design & Indie Game Marketing, includes chapters from The Art of Game Design: A Book of Lenses, A Practical Guide to Indie Game Marketing, and An Architectural Approach to Level Design. The GameDev.net FreeBook is relevant to game designers, developers, and those interested in learning more about the challenges in game development. We know game development can be a tough discipline and business, so we picked several chapters from CRC Press titles that we thought would be of interest to you, the GameDev.net audience, in your journey to design, develop, and market your next game. The free ebook is available through CRC Press by clicking here. The Curated Books The Art of Game Design: A Book of Lenses, Second Edition, by Jesse Schell Presents 100+ sets of questions, or different lenses, for viewing a game’s design, encompassing diverse fields such as psychology, architecture, music, film, software engineering, theme park design, mathematics, anthropology, and more. Written by one of the world's top game designers, this book describes the deepest and most fundamental principles of game design, demonstrating how tactics used in board, card, and athletic games also work in video games. It provides practical instruction on creating world-class games that will be played again and again. View it here. A Practical Guide to Indie Game Marketing, by Joel Dreskin Marketing is an essential but too frequently overlooked or minimized component of the release plan for indie games. A Practical Guide to Indie Game Marketing provides you with the tools needed to build visibility and sell your indie games. With special focus on those developers with small budgets and limited staff and resources, this book is packed with tangible recommendations and techniques that you can put to use immediately. As a seasoned professional of the indie game arena, author Joel Dreskin gives you insight into practical, real-world experiences of marketing numerous successful games and also provides stories of the failures. View it here. An Architectural Approach to Level Design This is one of the first books to integrate architectural and spatial design theory with the field of level design. The book presents architectural techniques and theories for level designers to use in their own work. It connects architecture and level design in different ways that address the practical elements of how designers construct space and the experiential elements of how and why humans interact with this space. Throughout the text, readers learn skills for spatial layout, evoking emotion through gamespaces, and creating better levels through architectural theory. View it here. Learn more and download the ebook by clicking here. Did you know? GameDev.net and CRC Press also recently teamed up to bring GDNet+ Members up to a 20% discount on all CRC Press books. Learn more about this and other benefits here.
Sign in to follow this  
Followers 0
Dentoid

Security

29 posts in this topic

Quote:
Original post by WitchLord

Maybe it is possible to have the VM analyze the bytecode when loading it to see what operations it is doing and then decide if it is trying to access anything it shouldn't. It should be possible to verify if any absolute addresses are being read from or written to. And the instructions that pushes the address of a stack location on the stack (for future manipulation) can be checked so that the location is within the stack frame of the function. In this pass I can also verify that all function ids are valid, and global variable indices as well.


I think this is what I've been trying to suggest. :)
0

Share this post


Link to post
Share on other sites
I suppose you did [wink] I just didn't see a viable solution until now.

It's still not an easy task but at least I believe I will be able to do it so that it has the same security as script code. I will also have to change how object properties are accessed as the byte code ADDOFF (add offset) alters a pointer in a way that can't be controlled. I've already come up with a solution for it so it's not a show stopper, though it will affect performance slightly.

0

Share this post


Link to post
Share on other sites
So I have read all the posts and this is my point of view :

- You want to send byte code over IP
- You cannot trust client side because some bad guys wants to do what they have to do, bad work, neither you can trust server because bad guys wants to also do their bad work.

The question is :
Why all of those bad guys wants to crash your application ?

If your a client, you don't have really interest in crashing your computer, don't you ?

If your a server you can have interest in crashing your server ? no I don't think so too, but, you can have interest in crash the clients connecting to you ! To do this, your server must be knowed by client ...

So, my point of view wont be to secure scripts, but rather secure your application outside the script part.

Both client and server must trust each other, so, they have to aknowledge each other :
Client : Hello server, my program is version X, with a checksum of Y and I run with ScriptVersion Z. What is your versionS ?
Server : Hello client, you are connecting server version X, with checksum of Y and I run ScriptVersion Z.

Now that client and server knows their versions, checksum, or whatever they want to check (graphic card abilities, processor, memory, etc...) they can trust each other.

Also, timestamping and versionning the messages between client and server can lead to disconnection when timeout comes (bad guy debbuging !).
0

Share this post


Link to post
Share on other sites
Well, if you must send a script over the line to a client, the smartest option would be to sign the script with a DSA. This will allow the client to verify that the script hasn't been tampered with (on the trip from the server to the client). This isn't foolproof however, and using a CA will help to increase the security of the DSA, but none the less, it is one option.
0

Share this post


Link to post
Share on other sites
Quote:
Original post by Washu
Well, if you must send a script over the line to a client, the smartest option would be to sign the script with a DSA. This will allow the client to verify that the script hasn't been tampered with (on the trip from the server to the client). This isn't foolproof however, and using a CA will help to increase the security of the DSA, but none the less, it is one option.


That still doesn't help if the server actually sends bad stuff.
0

Share this post


Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!


Register a new account

Sign in

Already have an account? Sign in here.


Sign In Now
Sign in to follow this  
Followers 0