참고문헌
- 유동영, 서동남, 김휘강, 최진영, "온라인게임 서비스 분야에 정보보호 사전진단 적용시 효과성에 관한 연구", 한국IT서비스학회지, 10(2), pp. 293-308, June 2011. https://doi.org/10.9716/KITS.2011.10.2.293
- Jiyoung Woo, Huy Kang Kim, "Survey and Research Direction on Online Game Security," Workshop at ACM SIGGRAPH ASIA 2012, pp. 19-25, November 2012.
- 곽병일, 김휘강. "온라인 게임에서의 이상 징후 탐지 기법 조사 및 분류." 정보보호학회논문지 25.5 (2015): 1097-1114. https://doi.org/10.13089/JKIISC.2015.25.5.1097
- Zhongqqiang Zhang et al. "Detection of illegal players in massively multiplayer online role playing game by classification algorithms." Advanced Information Networking and Applications (AINA), 2015 IEEE 29th International Conference on. IEEE, 2015.
- Atsushi Fujita, Hiroshi Itsuki, and Hitoshi Matsubara. "Detecting Real Money Traders in MMORPG by Using Trading Network." AIIDE. 2011.
- Mitterhofer Stefan, Platzer Christian, Kruegel Christopher, Kirda Engin. "Server-side bot detection in massive multiplayer online games," IEEE Security and Privacy, pp. 29-36, Vol. 7, No. 3, 2009
- Yeounoh Chung et al. "Game bot detection approach based on behavior analysis and consideration of various play styles." ETRI Journal 35.6 (2013): 1058-1067. https://doi.org/10.4218/etrij.13.2013.0049
- Eunjo Lee et al. "You are a Game Bot!: Uncovering Game Bots in MMORPGs via Self-similarity in the Wild." NDSS. 2016.
- Lee Jina, Jiyoun Lim, Wonjun Cho, Huy Kang Kim, "I know what the BOTs did yesterday: Full action sequence analysis using Naïve Bayesian algorithm," Annual Workshop on Network and Systems Support for Games, pp. 1-2, Dec. 2013
- Ah Reum Kang, Jiyoung Woo, Juyong Park, Huy Kang Kim, "Online game bot detection based on party-play log analysis," Computers & Mathematics with Applications, Vol. 65, No. 9, pp. 1384-1395, May. 2013 https://doi.org/10.1016/j.camwa.2012.01.034
- Seong Hoon Jeong, Ah Reum Kang, Huy Kang Kim. "Analysis of Game Bot's Behavioral Characteristics in Social Interaction Networks of MMORPG." ACM SIGCOMM Computer Communication Review. Vol. 45. No. 4. ACM, 2015.
- Hyukmin Kwon et al. "Crime scene reconstruction: Online gold farming network analysis." IEEE Transactions on Information Forensics and Security 12.3 (2017): 544-556. https://doi.org/10.1109/TIFS.2016.2623586
- Intel, "SGX Tutorial," ISCA 2015. http://software.intel.com/sites/default/files/332680-002.pdf, Jun. 2015.
- Prerit Jain, Soham Desai, Seongmin Kim, Ming-Wei Shih, JaeHyuk Lee, Changho Choi, Youjung Shin, Taesoo Kim, Brent Byunghoon Kang, Dongsu Han, "OpenSGX: An Open Platform for SGX Research," The Network and Distributed System Security Symposium, 2016.
- Andrew Baumann, Marcus Peinado and Galen Hunt, "Shielding Applications from an Untrusted Cloud with Haven, ACM Transactions on Computer Systems (TOCS) Volume 33 Issue 3, September 2015 Article No. 8
- Ittai Anati, Shay Gueron, Simon P Johnson and Vincent R Scarlata, "Innovative Technology for CPU Based Attestation and Sealing," In HASP, 2013.
- Bauman, Erick, and Zhiqiang Lin. "A Case for Protecting Computer Games With SGX." Proceedings of the 1st Workshop on System Software for Trusted Execution. ACM, 2016.