Sok: Mev countermeasures: Theory and practice
Blockchains offer strong security guarantees, but they cannot protect the ordering of
transactions. Powerful players, such as miners, sequencers, and sophisticated bots, can …
transactions. Powerful players, such as miners, sequencers, and sophisticated bots, can …
Blockchain censorship
Permissionless blockchains promise resilience against censorship by a single entity. This
suggests that deterministic rules, not third-party actors, decide whether a transaction is …
suggests that deterministic rules, not third-party actors, decide whether a transaction is …
TxPhishScope: Towards Detecting and Understanding Transaction-based Phishing on Ethereum
The prosperity of Ethereum attracts many users to send transactions and trade crypto assets.
However, this has also given rise to a new form of transaction-based phishing scam, named …
However, this has also given rise to a new form of transaction-based phishing scam, named …
Timely Identification of Victim Addresses in DeFi Attacks
Over the past years, Decentralized Finance (DeFi) protocols have suffered from several
attacks. As a result, multiple solutions have been proposed to prevent such attacks. Most …
attacks. As a result, multiple solutions have been proposed to prevent such attacks. Most …
LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts
S Ren, T Tu, J Liu, D Wu, K Ren - arXiv preprint arXiv:2401.07261, 2024 - arxiv.org
DeFi incidents stemming from various smart contract vulnerabilities have culminated in
financial damages exceeding 3 billion USD. The attacks causing such incidents commonly …
financial damages exceeding 3 billion USD. The attacks causing such incidents commonly …
Unraveling the MEV enigma: ABI-free detection model using Graph Neural Networks
Abstract The detection of Maximal Extractable Value (MEV) in blockchain is crucial for
enhancing blockchain security, as it enables the evaluation of potential consensus layer …
enhancing blockchain security, as it enables the evaluation of potential consensus layer …
Flashback: Enhancing Proposer-Builder Design with Future-Block Auctions in Proof-of-Stake Ethereum
Maximal extractable value (MEV) in which block proposers unethically gain profits by
manipulating the order in which transactions are included within a block, is a key challenge …
manipulating the order in which transactions are included within a block, is a key challenge …
Remeasuring the Arbitrage and Sandwich Attacks of Maximal Extractable Value in Ethereum
Maximal Extractable Value (MEV) drives the prosperity of the blockchain ecosystem. By
strategically including, excluding, or reordering transactions within blocks, block …
strategically including, excluding, or reordering transactions within blocks, block …
Decentralized commit-reveal scheme to defend against front-running attacks on Decentralized EXchanges
N Choi, H Kim - 2024 IEEE International Conference on …, 2024 - ieeexplore.ieee.org
In this paper, we focus on the security issues of decentralized exchanges (DEXs),
specifically on front-running attacks. Front-running attacks, which exploit the transparency of …
specifically on front-running attacks. Front-running attacks, which exploit the transparency of …
Unraveling the MEV Enigma: ABI-Free Detection Model using Graph Neural Networks
The detection of Maximal Extractable Value (MEV) in blockchain is crucial for enhancing
blockchain security, as it enables the evaluation of potential consensus layer risks, the …
blockchain security, as it enables the evaluation of potential consensus layer risks, the …