This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "OWASP Video Game Security Framework"

From OWASP
Jump to: navigation, search
(About the Project)
Line 4: Line 4:
  
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
 
{| style="padding: 0;margin:0;margin-top:10px;text-align:left;" |-
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
+
| valign="top" style="border-right: 1px dotted gray;padding-right:25px;" |
 +
 
  
 
==OWASP Video Game Security Framework (VGSF)==
 
==OWASP Video Game Security Framework (VGSF)==
Line 12: Line 13:
 
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''
 
'''OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models'''
  
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions. With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.
 
  
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''
 
  
 +
Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions.
  
'''1. Identifying and clustering the components of risk within the overall game security space, and then giving instances of each component.'''
 
  
 +
With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.
  
''Components include the following:''
+
''The framework is comprised of five discipline areas that could produce many best practice methodologies:''
 
 
* '''Attack Surfaces''': the various surface areas that can be attacked by attackers in order to cause harm to the gaming ecosystem.
 
 
 
* '''Vulnerabilities''': the specific weaknesses in design or implementation that allows attackers to successfully target a given game.
 
  
* '''Attacker Goals''': a list of the reasons that an attacker might want to attack a given game.
 
  
* '''Negative Outcomes''': a collection of ways that the gaming company could ultimately be impacted negatively by attacks to its game and associated infrastructure.
+
'''I. Business Strategy & Risk'''  
  
  
'''2. A natural language semantic structure for thinking about and articulating game security issues, which uses the modular risk components as sentence structure.'''
+
'''II. Governance & Compliance'''  
  
  
''Example:''
+
'''III. Prevention'''  
  
: "The attacker attacked and edited the <code>LOCAL GAME CLIENT (Attack Surface)</code>,  which had a <code>LACK OF CLIENT INTEGRITY CONTROLS (Vulnerability)</code>, which allowed her to <code>ARTIFICIALLY INCREASE HER ABILITIES (Attacker Goal)</code>, ultimately leading to an <code>UNHAPPY PLAYER BASE (Negative Outcome)</code> and <code>DECLINING GAME REVENUE (Negative Outcome)</code> , which could have been prevented by <code>DEFENSE.</code>”
+
''This will be one of the largest sections as it is comprised of many different aspects of overall cyber security''
  
  
Using this structure, security testers can clearly communicate the various aspects of a game security issue to many different types of stakeholder—from pentesting peers to business executives in the gaming industry.
+
'''IV. Management'''
  
  
'''3. Examples of real-world examples of previous attacks against games, and how the attacks map to the GSF framework components.'''
+
'''V. Service Delivery/ Support'''
  
 
==Licensing==
 
==Licensing==
The OWASP Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
+
The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.
  
 
{{Social Media Links}}
 
{{Social Media Links}}
Line 51: Line 46:
 
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |
 
| style="padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |
  
== What is the OWASP Game Security Framework? ==
+
== What is the OWASP Video Game Security Framework? ==
  
The goal of the OWASP Game Security Framework is to provide a structure for discussing the various aspects around the security of video games.
+
The goal of the OWASP Video Game Security Framework is to provide a structured blueprint to guide the development and deployment of cyber resilience within a video game enterprise operation.
  
 
The target audience for the project includes:
 
The target audience for the project includes:
  
* Gamers
+
* Game Publishers
* QA
+
* Game Developers
* Game designers
+
* Security Professionals
* Penetration testers
+
* Consumer Gamers
* Gaming executives
+
* Quality Assurance Testers
* Anyone else with a vested interest in game security
+
* Business Stakeholders in the Gaming Industry
 +
* Industry Enthusiasts
  
 
== Project Leaders ==
 
== Project Leaders ==
  
* Jason Haddix
+
* Romen Brewer
* Daniel Miessler
 
  
 
== Contributors ==
 
== Contributors ==
* Kevin Hemmingsen
+
* TBD
* Troy Cunefare
 
* Ryan Lawrence
 
* Martin Mendoza
 
* Koray Algan
 
* Tom Simkovic
 
* Matt Espinoza
 
* Chad Lynch
 
  
 
== Related Projects ==
 
== Related Projects ==
  
 +
* [[OWASP Game Security Framework Project]]
 
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]
 
* [[OWASP_Top_Ten_Project|OWASP Web Top 10]]
 
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]
 
* [[OWASP_Mobile_Security_Project|OWASP Mobile Security]]
Line 87: Line 76:
  
 
== Collaboration ==
 
== Collaboration ==
[https://game-security.slack.com The Slack Channel]
+
Join the discord channel:
 +
[https://discord.gg/kS7UBc6]
  
 
== Quick Download ==
 
== Quick Download ==
Line 94: Line 84:
  
 
== News and Events ==
 
== News and Events ==
* January, 2017: Doing a complete redesign of the project.
+
* April, 2019: Site Creation and Discord channel creation.
* March 2017: Presenting version 1.0 at HouSecCon 2017.
+
 
  
 
==Classifications==
 
==Classifications==
Line 113: Line 103:
 
|}
 
|}
  
= Attack Surfaces =
+
= Business Strategy & Risk =
  
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
Line 120: Line 110:
 
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
 
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
  
== Attack Surfaces ==
+
== Business Strategy & Risk ==
  
 
The following is a list of the attack surfaces that can be found in video games of various types.
 
The following is a list of the attack surfaces that can be found in video games of various types.
Line 149: Line 139:
 
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |
 
| style="padding-left:25px;width:300px;border-right: 1px dotted gray;padding-right:25px;" valign="top" |
  
== What is the Attack Surfaces Section? ==
+
== What is the Business Strategy & Risk Section? ==
  
 
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.
 
This section provides an overview of the various places an attacker can target to harm a given game infrastructure.
Line 155: Line 145:
 
== Sub-project Leader ==
 
== Sub-project Leader ==
  
* Daniel Miessler
+
* Romen Brewer
  
 
== Related Projects ==
 
== Related Projects ==
  
 +
* [https://www.owasp.org/index.php/OWASP_Game_Security_Framework_Project]
 
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]
 
* [https://www.owasp.org/index.php/OWASP_Mobile_Security_Project The OWASP Mobile Top 10 Project]
 
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]
 
* [https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project The OWASP Web Top 10 Project]
  
 
== Collaboration ==
 
== Collaboration ==
[https://game-security.slack.com The Slack Channel]
+
Join the discord channel:
 +
[https://discord.gg/kS7UBc6]
  
 
== Quick Download ==
 
== Quick Download ==
Line 173: Line 165:
 
|}
 
|}
  
= Vulnerabilities =
+
= Governance & Compliance =
  
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
Line 180: Line 172:
 
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
 
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
  
== Game Security Vulnerabilities ==
+
== Governance & Compliance ==
  
 
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.
 
The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.
Line 230: Line 222:
 
== Sub-project Leader ==
 
== Sub-project Leader ==
  
* Jason Haddix
+
* ENTER NAME
  
 
== Related Projects ==
 
== Related Projects ==
Line 248: Line 240:
 
|}
 
|}
  
= Exploits =
+
= Prevention =
  
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
Line 255: Line 247:
 
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
 
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
  
== Exploits ==
+
== Prevention ==
  
 
This list refers to what a given attacker might use to take advantage of a given bug within the game.
 
This list refers to what a given attacker might use to take advantage of a given bug within the game.
Line 293: Line 285:
 
== Sub-project Leader ==
 
== Sub-project Leader ==
  
* Daniel Miessler
+
* Romen Brewer
  
 
== Related Projects ==
 
== Related Projects ==
Line 311: Line 303:
 
|}
 
|}
  
= Attacker Goals =
+
= Management =
  
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
Line 318: Line 310:
 
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
 
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
  
== Attacker Goals ==
+
== Management ==
  
 
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.
 
This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.
Line 356: Line 348:
 
== Sub-project Leader ==
 
== Sub-project Leader ==
  
* Daniel Miessler
+
* Romen Brewer
  
 
== Related Projects ==
 
== Related Projects ==
Line 374: Line 366:
 
|}
 
|}
  
= Negative Outcomes =
+
= Service Delivery/ Support =
  
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
Line 381: Line 373:
 
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
 
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
  
== Negative Outcomes ==
+
== Service Delivery/ Support ==
  
 
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.
 
The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.
Line 424: Line 416:
 
== Project Leader ==
 
== Project Leader ==
  
* Daniel Miessler
+
* Romen Brewer
  
 
== Related Projects ==
 
== Related Projects ==
Line 442: Line 434:
 
|}
 
|}
  
= Defenses =
+
= Resources =
  
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
 
<div style="width:100%;height:160px;border:0,margin:0;overflow: hidden;">[[File:OWASP_Project_Header.jpg|link=]]</div>
Line 449: Line 441:
 
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
 
| style="border-right: 1px dotted gray;padding-right:25px;" valign="top" |
  
== Defenses ==
+
== Resources ==
These are some of the common defenses that can be used to counter attacks against various components of a game.
+
This page will list additional resources related to game security that may provide more detailed context.
 +
 
 
{| class="wikitable" style="text-align: left" border="1"
 
{| class="wikitable" style="text-align: left" border="1"
 
! Outcomes
 
! Outcomes
Line 487: Line 480:
 
== Project Leaders ==
 
== Project Leaders ==
  
* Daniel Miessler
+
* Romen Brewer
  
 
== Related Projects ==
 
== Related Projects ==
Line 495: Line 488:
  
 
== Collaboration ==
 
== Collaboration ==
[https://game-security.slack.com The Slack Channel]
+
Join the discord channel:
 +
[https://discord.gg/kS7UBc6]
 +
 
  
 
== Resources ==
 
== Resources ==
Line 504: Line 499:
  
 
|}
 
|}
= Examples =
+
= Trending =
  
== Real-world Examples of Gaming Vulnerabilities==
+
== Video Game Trends==
  
''Vulnerability''
+
''This section is dedicated to trends in gaming and how it can evaluated from a security perspective''
  
 
{| class="wikitable"
 
{| class="wikitable"
Line 597: Line 592:
 
= Community =
 
= Community =
  
We are actively looking for people to help in the following areas:
+
The VGSF team has open opportunities for individuals to collaborate and contribute to the project.
 +
 
 +
 
 
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.
 
* Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.
 
* Adding content to any of the various sections
 
* Adding content to any of the various sections
Line 619: Line 616:
 
| project_description =  
 
| project_description =  
 
| project_license =CC-BY 3.0 for documentation and GPLv3 for code.  
 
| project_license =CC-BY 3.0 for documentation and GPLv3 for code.  
| leader_name1 = Daniel Miessler
+
| leader_name1 = Romen Brewer
 
| leader_email1 =  
 
| leader_email1 =  
 
| leader_username1 =  
 
| leader_username1 =  
Line 625: Line 622:
 
| leader_email2 =  
 
| leader_email2 =  
 
| leader_username2 =  
 
| leader_username2 =  
| contributor_name1 = Justin Klein Keane]
+
| contributor_name1 =  
 
| contributor_email1 =  
 
| contributor_email1 =  
| contributor_username1 = Justin_C._Klein_Keane
+
 
| contributor_name2 = Yunsoul
 
| contributor_email2 =
 
| contributor_username2 = Yunsoul
 
| mailing_list_name =
 
 
| links_url1 =  
 
| links_url1 =  
 
| links_name1 =
 
| links_name1 =

Revision as of 07:32, 9 April 2019

OWASP Project Header.jpg


OWASP Video Game Security Framework (VGSF)

OWASP Video Game Security Framework (VGSF) defines an approach to discovering solutions for strategy, development, operations, and management surrounding security for video game industry business models


Most organizations that operate in the digital landscape approach security as a last afterthought when compared to the overall business strategy and operations. In the recent years it has become more apparent the consequences of such behavior with increasingly amounts of data breaches happening. The cost associated with an organization’s loss of intellectual property and other digital assets has reached the millions.


With the fast growth of the video game industry (174 billion by 2021 - Newzoo Global Game Forecast) in recent years, it is critical that organizations operating in this space have a strong security posture. Cyber-attacks aimed at various components of a business can affect the interoperability, user protected info, end-game product, and overall business model. As more businesses and clients operate in the cyber space its important to leverage security as a way to create sustainable trust, lead competitively, and operate more agile with different types of data.

The framework is comprised of five discipline areas that could produce many best practice methodologies:


I. Business Strategy & Risk


II. Governance & Compliance


III. Prevention

This will be one of the largest sections as it is comprised of many different aspects of overall cyber security


IV. Management


V. Service Delivery/ Support

Licensing

The OWASP Video Game Security Framework is free to use. It is licensed under the http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution-ShareAlike 3.0 license], so you can copy, distribute and transmit the work, and you can adapt it, and use it commercially, but all provided that you attribute the work and if you alter, transform, or build upon this work, you may distribute the resulting work only under the same or similar license to this one.


What is the OWASP Video Game Security Framework?

The goal of the OWASP Video Game Security Framework is to provide a structured blueprint to guide the development and deployment of cyber resilience within a video game enterprise operation.

The target audience for the project includes:

  • Game Publishers
  • Game Developers
  • Security Professionals
  • Consumer Gamers
  • Quality Assurance Testers
  • Business Stakeholders in the Gaming Industry
  • Industry Enthusiasts

Project Leaders

  • Romen Brewer

Contributors

  • TBD

Related Projects

Collaboration

Join the discord channel: [1]

Quick Download

COMING SOON

News and Events

  • April, 2019: Site Creation and Discord channel creation.


Classifications

Owasp-incubator-trans-85.png Owasp-builders-small.png
Owasp-defenders-small.png
Cc-button-y-sa-small.png
Project Type Files DOC.jpg
OWASP Project Header.jpg

Business Strategy & Risk

The following is a list of the attack surfaces that can be found in video games of various types.

Attack Surface Description
Local Game Client The locally running game client that is accessible to the gamer because it's running on his/her machine.
Game Network Traffic The network which game traffic traverses in order to reach the game's server or peers who are playing the game.
Game Server The game server that is hosting the instance that gamers connect to in order to play the game.
Game Economy The economic system that exists within the game.
Game Mechanics The physics engine, logic, and other environmental components within the game.


What is the Business Strategy & Risk Section?

This section provides an overview of the various places an attacker can target to harm a given game infrastructure.

Sub-project Leader

  • Romen Brewer

Related Projects

Collaboration

Join the discord channel: [3]

Quick Download

  • Coming Soon

News and Events

  • Coming Soon
OWASP Project Header.jpg

Governance & Compliance

The following is a list of the vulnerabilities that can be found in video games of various types, and the attack surfaces they're likely to be associated with.

Attack Surface Vulnerability Name
Local Game Client
  • Ability to edit in-game resources
  • Ability to bypass license requirement
Game Network Traffic
  • Network Denial of Service (player)
    • Player bandwidth exhaustion
    • Player game client resource exhaustion
Game Application Traffic
  • Application Level Denial of Service (Player)
    • Player application logic Denial of Service
Game Server
  • Application Level Denial of Service (Server)
    • Server application logic Denial of Service
  • Ability to modify game ladder rankings
  • Ability to modify own player resources
Game Economy
  • Ability to generate unlimited money on client side
  • Ability to generate unlimited money through network/application traffic modification
  • Ability to modify prices for in-game items
  • Ability to replay financial actions such as buying or selling through network/application manipulation


What is the Game Security Vulnerabilities Project?

The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.

Sub-project Leader

  • ENTER NAME

Related Projects

Collaboration

The Slack Channel

Resources

News and Events

  • Coming Soon
OWASP Project Header.jpg

Prevention

This list refers to what a given attacker might use to take advantage of a given bug within the game.

Exploit Description
DDoS Force a player to DC, or attack the game itself so that it cannot serve customers.
Client Modification Modify the client in a way that gives advantage.
Malicious Macros Implementation of macros that perform unwanted actions.
Social Engineering Getting a player, mod, or game staff member to perform an action that helps the attacker.
Use Physics Bug Interact with the world in a way that makes the physics engine do what the attacker wants.
Malform Network Traffic Send modified network traffic that tricks or disrupts an opposing player or the game itself.


The Exploits Project

The Exploits provides information on what types of tools and techniques an attacker might use to accomplish his/her goal.

Sub-project Leader

  • Romen Brewer

Related Projects

Collaboration

The Slack Channel

Resources

News and Events

  • Coming Soon
OWASP Project Header.jpg

Management

This list refers to what a given attacker might be trying to accomplish within the game by performing a given attack. This could relate very closely (or not) with the technical impact or business impact cause by the behavior.

Attacker Goal Description
Avoid Damage Allows the player to avoid being killed by other players or NPCs.
Gain Gear Improve the amount or quality of gear the player has.
Gain In-game Currency Gain more currency than would normally be allowed.
Enhance Gear Give weapons or other gear powers that they wouldn't normally have.
Take Opponent Offline Take a player out of the game so that the attacker's position is improved.
Skip Content Allows player to skip content resuting in a faster completion or objective time


What is the Attacker Goals Project

The Attacker Goals Project provides information on what types of outcomes attackers might try to achieve within or outside of the game they're attacking.

Sub-project Leader

  • Romen Brewer

Related Projects

Collaboration

The Slack Channel

Resources

News and Events

  • Coming Soon
OWASP Project Header.jpg

Service Delivery/ Support

The following is a list of possible negative outcomes that can occur as the result of someone successfully attacking a given game.

Outcomes Description
Currency Magnification A player ends up with more currency than they were supposed to have.
Player Anger Players become extremely agitated by one or more bugs.
Players Stop Playing the Game Players become so frustrated with the bugs and exploits that they stop playing and/or paying for the game.
Invulnerable Positions Locations on the map make bases or players unassailable and therefore invulnerable.
Item Multiplication Items are duplicated, multiplied, or otherwise increased in an unintended way.
Unfair Ladder Victory A victory is scored in favor of a player or team when they should not have won.
Unauthorized Admin Command Use Regular users are somehow able to execute administrative commands.
Lost Revenue The game company loses revenue due to bugs, hacks, and player anger.


What is the Negative Outcomes Project?

The Negative Outcomes Project provides information on what types of situations could manifest within the game if bugs or exploits are not successfully addressed.

Project Leader

  • Romen Brewer

Related Projects

Collaboration

The Slack Channel

Resources

News and Events

  • Coming Soon
OWASP Project Header.jpg

Resources

This page will list additional resources related to game security that may provide more detailed context.

Outcomes Description
Cryptographic Validation of Client Ensure that the client will not run if it has been modified.
Enterprise-level DDoS Protection Implement protection against low to mid-tier DDoS attacks against the core gaming infrastructure.
Basic Application Security Defenses Code-based protections against common application security flaws, such as SQLi, XSS, CSRF, LFI/RFI, etc.
Authentication Lockouts Lock out a user's account after a certain number of failed attempts.
Two-factor Authentication Require use of 2FA on a given player's account.
Better Code Any fixes that can be done in code that aren't covered by other defenses. Could include net code, physics engine, logic fixes, etc.
Server-side Validation Ensure that validations are performed on the server and not (only) the client.


What is the Game Security Vulnerabilities Project?

The Security Vulnerabilities Project provides information on what types of vulnerabilities exist within games, and which attack surfaces they fall under.

Project Leaders

  • Romen Brewer

Related Projects

Collaboration

Join the discord channel: [4]


Resources

News and Events

  • Coming Soon

The VGSF team has open opportunities for individuals to collaborate and contribute to the project.


  • Improving the framework schema, e.g., vulns, attack surfaces, technical impacts, business impacts, defenses, etc.
  • Adding content to any of the various sections
  • Input from avid gamers on how useful this is to them
  • Input from app security experts
  • Input from security types working at gaming companies
  • Input from game company business types

If you have interest in helping, reach out to us and we'll make you a contributor.

Commonly Used Game Hacking Tools



PROJECT INFO
What does this OWASP project offer you?
RELEASE(S) INFO
What releases are available for this project?
what is this project?
Name: OWASP Internet of Things Project
Purpose: N/A
License: CC-BY 3.0 for documentation and GPLv3 for code.
who is working on this project?
Project Leader(s):
  • Romen Brewer
  • Craig Smith
how can you learn more?
Project Pamphlet: Not Yet Created
Project Presentation:
Mailing list: N/A
Project Roadmap: Not Yet Created
Key Contacts
  • Contact Romen Brewer to contribute to this project
  • Contact Romen Brewer to review or sponsor this project
current release
Not Yet Published
last reviewed release
Not Yet Reviewed


other releases