z-logo
open-access-imgOpen Access
Resource Integrity Vulnerabilities and Protections in RPG Games: A Case Study of Elancia
Author(s) -
Pyo Gil Hong,
Sung Won Lee,
Dohyun Kim
Publication year - 2025
Publication title -
ieee access
Language(s) - English
Resource type - Magazines
SCImago Journal Rank - 0.587
H-Index - 127
eISSN - 2169-3536
DOI - 10.1109/access.2025.3592760
Subject(s) - aerospace , bioengineering , communication, networking and broadcast technologies , components, circuits, devices and systems , computing and processing , engineered materials, dielectrics and plasmas , engineering profession , fields, waves and electromagnetics , general topics for engineers , geoscience , nuclear engineering , photonics and electrooptics , power, energy and industry applications , robotics and control systems , signal processing and analysis , transportation
The rapid advancement of network and internet technologies has profoundly impacted the online gaming industry, particularly in the domain of Massively Multiplayer Online Role-Playing Games (MMORPGs). These games, which allow players to interact in a shared virtual world, have witnessed a surge in popularity. However, the rise of cheating and malicious activities facilitated by rogue users and cheat developers poses a significant threat to the gaming industry and the experiences of fair-playing users. In this study, we analyzed the client resource files of the MMORPG Elancia, developed by Nexon, to understand their structure. Our findings revealed that critical game resource files, including graphics, music, and character settings, could be modified by unauthorized users, with the altered content taking effect during gameplay. To address this vulnerability, we proposed both client-side and server-side integrity verification methods for client resource files. On the client side, we suggested verifying the integrity of resource files by comparing their Merkle Root with the Merkle Root stored on the server. On the server side, we proposed a cloud gaming environment where resource files are not stored on the client; instead, the client sends input to the server, which renders the results and transmits them back to the client. Additionally, the server verifies client inputs and events, storing the results for further validation. To validate the proposed methods, we customized Minecraft’s Forge mod to evaluate the performance of our approaches. The results underscore the critical role of client-side file integrity in maintaining game security and highlight the potential impact of robust protection measures on safeguarding the gaming ecosystem.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom