O'Reilly logo

Exploiting Online Games: Cheating Massively Distributed Systems by Gary McGraw, Greg Hoglund

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Infested with Bugs

Figure . 

Bugs and flaws in software account for a majority of computer security risks.[1] This is true for banking applications, and this is also true for online games. So many security-related bugs exist in software, and they’re so pervasive, that software tool vendors like Fortify Software <http://www.fortify.com> have created special tools just to look for them. Not only that, but scientists have published reams of papers on taxonomies for bugs, all of which disagree with each other.

One popular taxonomy is the “seven pernicious kingdoms” described in McGraw’s book Software Security: Building Security In.[2] Briefly, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required