Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3555858.3555948acmotherconferencesArticle/Chapter ViewAbstractPublication PagesfdgConference Proceedingsconference-collections
research-article
Open access

The Sincerest Form of Flattery: Large-Scale Analysis of Code Re-Use in Atari 2600 Games

Published: 04 November 2022 Publication History

Abstract

The Atari 2600 was a prominent early video game console that had broad cultural impact, and possessed an extensive catalog of games that undoubtedly helped shape the fledgling game industry. How were these games created? We examine one development practice, code re-use, across a large-scale corpus of 1,984 ROM images using an analysis system we have developed. Our system allows us to study code re-use at whole-corpus granularity in addition to finer-grained views of individual developers and companies. We combine this corpus analysis with a case study: one of the co-authors was a third-party developer for Atari 2600 games in the early 1980s, providing insight into why code re-use could occur through both oral history and artifacts preserved for over forty years. Finally, we frame our results about this development practice with an interdisciplinary, bigger-picture archaeological view of humans and technology.

References

[1]
M. S. Ackerman and G. Parker. 18 November 1986. Process for Displaying a Plurality of Objects on a Video Screen. United States Patent #4,623,147.
[2]
N. Altice. 2015. I AM ERROR: The Nintendo Family Computer / Entertainment System Platform. MIT Press.
[3]
D. Andriesse, X. Chen, V. van der Veen, A. Slowinska, and H. Bos. 2016. An In-Depth Analysis of Disassembly on Full-Scale x86/x64 Binaries. In Proceedings of the 25th USENIX Security Symposium. 583–600.
[4]
J. Aycock and K. Biittner. 2019. Inspecting the Foundation of Mystery House. Journal of Contemporary Archaeology 19, 2 (2019), 183–205.
[5]
J. Aycock and K. Biittner. 2020. LeGACy Code: Studying How (Amateur) Game Developers Used Graphic Adventure Creator. In 15th International Conference on the Foundations of Digital Games. Article 23, 7 pages.
[6]
J. Aycock and T. Copplestone. 2019. Entombed: An archaeological examination of an Atari 2600 game. The Art, Science, and Engineering of Programming 3, 4(2019), 33 pages. https://doi.org/10.22152/programming-journal.org/2019/3/4
[7]
D. B. Bamforth. 1986. Technological Efficiency and Tool Curation. American Antiquity 51, 1 (1986), 38–50.
[8]
L. R. Binford. 1973. Interassemblage Variability– the Mousterian and the “Functional” Argument. In The Explanation of Culture Change: Models in Prehistory, C. Renfrew (Ed.). Duckworth, 227–254.
[9]
L. R. Binford. 1977. Forty-seven Trips: A Case Study in the Character of Archaeological Formation Processes. In Stone Tools as Cultural Markers: Change, Evolution and Complexity, R. V. S. Wright (Ed.). Humanities Press, 24–36.
[10]
L. R. Binford. 1979. Organization and Formation Processes: Looking at Curated Technologies. Journal of Anthropological Research 35 (1979), 255–273.
[11]
L. R. Binford. 1983. Working at Archaeology. Academic Press.
[12]
P. Bleed. 1986. The Optimal Design of Hunting Weapons: Maintainability or Reliability. American Antiquity 51, 4 (1986), 737–747.
[13]
Christian Collberg and Jasvir Nagra. 2010. Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection. Addison-Wesley.
[14]
C. C. Colton. 1837. Lacon: or Many Things in Few Words. Longman, Orme, Brown, Green, & Longmans.
[15]
Computer Magic, Inc.1981. MagiCard Instruction Manual. https://atariage.com/software_page.php?SoftwareLabelID=281. Accessed 27 March 2022.
[16]
J. Decuir. 2015. Atari Video Computer System: Bring Entertainment Stories Home. IEEE Consumer Electronics Magazine 4, 3 (2015), 60–66.
[17]
L. M. Dennis. 2016. Archaeogaming, ethics, and participatory standards. SAA Archaeological Record 16, 5 (2016), 29–33.
[18]
P. Deutsch and J-L. Gailly. 1996. ZLIB Compressed Data Format Specification version 3.3. RFC 1950.
[19]
T. Donovan. 2010. Replay: The History of Video Games. Yellow Ant.
[20]
M. R. Farhadi, B. C. M. Fung, P. Charland, and M. Debbabi. 2014. BinClone: Detecting Code Clones in Malware. In 8th International Conference on Software Security and Reliability. 78–87.
[21]
J. M. Gero. 1989. Assessing Social Information in Material Objects: How Well Do Lithics Measure Up?In Time, Energy and Stone Tools, R. Torrence (Ed.). Cambridge University Press, 92–105.
[22]
B. Hayden, E. Bakewell, and R. Gargett. 1996. World’s Longest-Lived Corporate Group: Lithic Analysis Reveals Prehistoric Social Organization near Lillooet, British Columbia. American Antiquity 61(1996), 341–356.
[23]
R. N. Horspool and N. Marovac. 1980. An approach to the problem of detranslation of computer programs. Comput. J. 23, 3 (1980), 223–229.
[24]
Y. Hu, Y. Zhang, J. Li, and D. Gu. 2017. Binary Code Clone Detection across Architectures and Compiling Configurations. In IEEE 25th International Conference on Program Comprehension. 88–98.
[25]
S. Hugg. 2016. Making Games for the Atari 2600. CreateSpace.
[26]
[26] G. Kitchen (@kitchengarry).15 December 2021. Tweet. https://twitter.com/kitchengarry/status/1471158746302713860?s=20&t=vJgYcAH4GGoSimgcv2owBQ
[27]
T. Lapetino. 2016. Art of Atari. Dynamite Entertainment.
[28]
J. Lendino. 2018. Adventure: The Atari 2600 at the Dawn of Console Gaming. Ziff Davis.
[29]
M. Li, X. Chen, X. Li, B. Ma, and P. M. B. Vitányi. 2004. The Similarity Metric. IEEE Transactions on Information Theory 50, 12 (2004), 3250–3264.
[30]
L. Luo, J. Ming, D. Wu, P. Liu, and S. Zhu. 2017. Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection. IEEE Transactions on Software Engineering 43, 12 (2017), 1157–1177.
[31]
U. Manber and G. Myers. 1990. Suffix Arrays: A New Method for On-Line String Searches. In Proceedings of the First Annual ACM-SIAM Symposium on Discrete Algorithms. 319–327.
[32]
A. L. McDivitt. 2020. Hot Tubs and Pac-Man: Gender and the Early Video Game Industry in the United States (1950s–1980s). De Gruyter Oldenbourg.
[33]
N. Montfort and I. Bogost. 2009. Racing the Beam: The Atari video computer system. MIT Press.
[34]
M. C. Nelson. 1991. The Study of Technological Organization. In Archaeological Method and Theory. Vol. 3, M. B. Schiffer (Ed.). Academic Press, 57–100.
[35]
P. A. Newell, J. Aycock, and K. M. Biittner. 2022. Still Entombed After All These Years: The continuing twists and turns of a maze game. Internet Archaeology 59(2022). https://doi.org/10.11141/ia.59.3
[36]
M. Z. Newman. 2017. Atari Age: The Emergence of Video Games in America. MIT Press.
[37]
G. H. Odell. 1989. Summary of Discussions. In Alternative Approaches to Lithic Analysis, D. O. Henry and G. H. Odell (Eds.). American Anthropological Association.
[38]
W. J. Parry and R. L. Kelly. 1987. Expedient Core Technology and Sedentism. In The Organization of Core Technology, J. K. Johnson and C. A. Morrow (Eds.). Westview Press, 285–304.
[39]
A. Reinhard. 2015. Excavating Atari: Where the Media was the Archaeology. Journal of Contemporary Archaeology 2, 1 (2015), 86–93.
[40]
A. Reinhard. 2018. Archaeogaming: An Introduction to the Archaeology in and of Video Games. Berghahn.
[41]
A. Reinhard. 2021. Archeology of Abandoned Human Settlements in No Man’s Sky: A New Approach to Recording and Preserving User-Generated Content in Digital Games. Games and Culture 16, 7 (2021), 855–884.
[42]
A. Sæbjørnsen, J. Willcock, T. Panas, D. Quinlan, and Z. Su. 2009. Detecting Code Clones in Binary Executables. In Proceedings of the 18th International Symposium on Software Testing and Analysis. 117–127.
[43]
H. Sajnani, V. Saini, C. K. Roy, and C. Lopes. 2021. SourcererCC: Scalable and Accurate Clone Detection. In Code Clone Analysis: Research, Tools, and Practices, K. Inoue and C. K. Roy (Eds.). Springer, 51–62.
[44]
San Jose Micro Technology. 1982. Atari Video Computer System Programming Manual (Revision C). Gerald Lawson papers, Strong National Museum of Play.
[45]
F. Sanglard. 2018. Game Engine Black Book: Wolfenstein 3D(2nd ed.). Independently published.
[46]
M. B. Schiffer. 1976. Behavioural Archaeology. Academic Press.
[47]
M. B. Schiffer, T. E. Downing, and M. McCarthy. 1981. Waste Not, Want Not: An Ethnoarchaeological Study of Reuse in Tucson, Arizona. In Modern Material Culture: The Archaeology of Us, R. A. Gould and M. B. Schiffer (Eds.). Academic Press, 67–86.
[48]
C. Shaw. 10-Feb-83. River Raid source code printout. Carol Shaw papers, Strong National Museum of Play.
[49]
C. Shaw. 13-Dec-78. Polo source code printout. Carol Shaw papers, Strong National Museum of Play.
[50]
C. Shaw. 15-Jul-80. Super Breakout source code printout. Carol Shaw papers, Strong National Museum of Play.
[51]
M. J. Shott. 1986. Technological Organization and Settlement Mobility: An Ethnographic Examination. Journal of Anthropological Research 42 (1986), 15–51.
[52]
A. Smith. 2020. They Create Worlds: The Story of the People and Companies That Shaped the Video Game Industry, Volume I: 1971–1982. CRC Press.
[53]
F. Smith Nicholls. 2021. Fork in the Road: Consuming and Producing Video Game Cartographies. In Return to the Interactive Past: The Interplay of Video Games and Histories, C. E. Ariese, K. H. J. Boom, B. van den Hout, A. A. A. Mol, and A. Politopoulos (Eds.). Sidestone Press, 117–133.
[54]
C. Therrien. 2019. The Media Snatcher: PC/CORE/TURBO/ENGINE/GRAFX/16/CDROM2/SUPER/DUO/ARCADE/RX. MIT Press.
[55]
R. Torrence. 1983. Time Budgeting and Hunter-Gatherer Technology. In Hunter-Gatherer Economy in Prehistory: A European Perspective, G. Bailey (Ed.). Cambridge University Press, 11–22.
[56]
L. Wiest. 2016. Reverse engineering Star Raiders. PoC||GTFO 0x13(2016), 5–20.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
FDG '22: Proceedings of the 17th International Conference on the Foundations of Digital Games
September 2022
664 pages
ISBN:9781450397957
DOI:10.1145/3555858
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 November 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Atari 2600
  2. archaeogaming
  3. binary reverse engineering
  4. empirical study
  5. game development

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Government of Canada New Frontiers in Research Fund

Conference

FDG22

Acceptance Rates

Overall Acceptance Rate 152 of 415 submissions, 37%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)952
  • Downloads (Last 6 weeks)117
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media