Now a bit popular games are likely to be hack, and there are many convenient online tools can be used, single-cell phone also said that the most common memory modifier has eight artifacts, sesame cake modifier. Recently, for these two memory modifiers to do some protection processing, a simple record. Of course, however persuasive, outsmart, the treatment here is only a certain degree of anti-cheating, the best way is to do service-side verification.
1. Encrypt the memory data
That is, when the storage is actually stored encrypted data, and read the decryption process. This way, the modifier cannot locate the data, nor can it modify or lock the memory data. However, this may bring down the performance of the game, the encryption and decryption process is still an efficient problem. So choose the right encryption algorithm according to your needs. This approach is the simplest and easiest to implement.
2. Perform signature check on memory data
That is, the stored text is still plaintext, but the signature information corresponding to that data is stored, and the signature is used for verification at the appropriate time . Using this method, it is required to update the corresponding signature information once the data has been modified, otherwise it will not succeed at the time of verification, it is easy to cause manslaughter, and in order to store its signature information need to occupy additional memory space. However, in some cases, this approach can be considered when the first method is inconvenient to use.
In the final analysis, these two methods correspond to cryptography and the concept of signature in cryptography ~
Analysis of game client memory anti-modification