Corpus ID: 235422185

A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges

@article{Zhou2021A2MMMF,
  title={A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges},
  author={Liying Zhou and Kaihua Qin and Arthur Gervais},
  journal={ArXiv},
  year={2021},
  volume={abs/2106.07371}
}
The asset trading volume on blockchain-based exchanges (DEX) increased substantially since the advent of Automated Market Makers (AMM). Yet, AMMs and their forks compete on the same blockchain, incurring unnecessary network and block-space overhead, by attracting sandwich attackers and arbitrage competitions. Moreover, conceptually speaking, a blockchain is one database, and we find little reason to partition this database into multiple competing exchanges, which then necessarily require price… Expand
SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) protocols
TLDR
This work establishes a general AMM framework describing the economics and formalizing the system’s state-space representation, and systematically compare the top AMM protocols’ mechanics, deriving their slippage and divergence loss functions. Expand
Towards Private On-Chain Algorithmic Trading
TLDR
This paper presents ChainBot, an approach for creating algorithmic trading bots with the help of blockchain technology, and shows how to partition the algorithmic computation into on and off-chain components in a way that provides a measure of end-to-end integrity, while preserving the algorithmmic “secret sauce”. Expand
CeFi vs. DeFi - Comparing Centralized to Decentralized Finance
TLDR
In this work, a structured methodology is provided to differentiate between a CeFi and a DeFi service, and it is shown that certain DeFi assets do not necessarily classify as CeFi assets, and may endanger the economic security of intertwined DeFi protocols. Expand
Opportunistic Algorithmic Double-Spending: How I learned to stop worrying and hedge the Fork
In this paper we outline a novel form of attack we refer to as Opportunistic Algorithmic Double-Spending (OpAl). OpAl attacks not only avoid equivocation, i.e., do not require conflictingExpand

References

SHOWING 1-10 OF 50 REFERENCES
SOK: Automated Market Maker (AMM) based Decentralized Exchanges (DEXs)
As an integral part of the Decentralized Finance (DeFi) ecosystem, Automated Market Maker (AMM) based Decentralized Exchanges (DEXs) have gained massive traction with the revived interest inExpand
Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges
TLDR
This work highlights the large, complex risks created by transaction-ordering dependencies in smart contracts and the ways in which traditional forms of financial-market exploitation are adapting to and penetrating blockchain economies. Expand
Quantifying Blockchain Extractable Value: How dark is the forest?
TLDR
It is shown that the largest Ethereum mining pool performs arbitrage and seemingly tries to cloak its private transaction mining activities, providing evidence that miners already extract Miner Extractable Value (MEV), which could destabilize the blockchain consensus security, as related work has shown. Expand
High-Frequency Trading on Decentralized On-Chain Exchanges
TLDR
This work formalizes, analytically exposit and empirically evaluate an augmented variant of front-running: sandwich attacks, which involve front- and back-running victim transactions on a blockchain-based DEX, and quantifies the probability of an adversarial trader being able to undertake the attack, based on the relative positioning of a transaction within a blockchain block. Expand
SoK: Off The Chain Transactions
TLDR
The Systematization of Knowledge is the first to structure the complete rich and multifaceted body of research on layer-two transactions, and shows that layer- two can scale blockchains, and that privacy of layer-Two transaction is not granted by default; and that fees depend on the transmitted transaction value. Expand
SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain
TLDR
This paper draws from a scattered body of knowledge and instances of front-running across the top 25 most active decentral applications (DApps) deployed on Ethereum blockchain and maps the proposed solutions to back-running into useful categories. Expand
On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols
TLDR
This paper investigates two methods that allow us to automatically create profitable DeFi trades, one well-suited to arbitrage and the other applicable to more complicated settings, and quantifies the value threshold at which a profitable transaction qualifies as Miner Extractable Value (MEV) and would incentivize MEV-aware miners to fork the blockchain. Expand
Do you Need a Blockchain?
  • K. Wüst, Arthur Gervais
  • Business, Computer Science
  • 2018 Crypto Valley Conference on Blockchain Technology (CVCBT)
  • 2018
TLDR
This paper critically analyze whether a blockchain is indeed the appropriate technical solution for a particular application scenario, and distinguishes between permissionless and permissioned blockchains and contrast their properties to those of a centrally managed database. Expand
Consensus in the Age of Blockchains
TLDR
A systematic and comprehensive study of blockchain consensus protocols is conducted, developing a framework to evaluate their performance, security and design properties, and using it to systematize key themes in the protocol categories described above. Expand
On the Security and Performance of Proof of Work Blockchains
TLDR
This paper introduces a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains and devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints. Expand
...
1
2
3
4
5
...