Quantifying Blockchain Extractable Value: How dark is the forest?

@article{Qin2021QuantifyingBE,
  title={Quantifying Blockchain Extractable Value: How dark is the forest?},
  author={Kaihua Qin and Liyi Zhou and Arthur Gervais},
  journal={2022 IEEE Symposium on Security and Privacy (SP)},
  year={2021},
  pages={198-214}
}
Permissionless blockchains such as Bitcoin have excelled at financial services. Yet, opportunistic traders extract monetary value from the mesh of decentralized finance (DeFi) smart contracts through so-called blockchain extractable value (BEV). The recent emergence of centralized BEV relayer portrays BEV as a positive additional revenue source. Because BEV was quantitatively shown to deteriorate the blockchain’s consensus security, BEV relayers endanger the ledger security by incentivizing… 

Figures and Tables from this paper

The Blockchain Imitation Game

The findings suggest that blockchain validators can imitate attacks in real-time to prevent intrusions in DeFi, and proposed generalized imitation attack methodology called Ape, which supports the automatic synthesis of adversarial smart contracts.

SoK: MEV Countermeasures: Theory and Practice

A comprehensive taxonomy of 28 proposed MEV countermeasures, covering four different technical directions is presented and the most popular MEV- auction-based solution with rich blockchain and mempool data is empirically studied.

SoK: Decentralized Finance (DeFi) Attacks

A common reference frame is introduced to systematically evaluate and compare DeFi incidents, including both attacks and accidents, which reveals several gaps between academia and the practitioners' community.

On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy

The findings indicate that AM attracts privacy-ignorant users, who then do not contribute to improving the privacy of other mixer users, and the empirical evidence is the first to suggest a differing privacy-predilection of users on ETH and BSC.

Analyzing and Preventing Sandwich Attacks in Ethereum

A large-scale analysis of sandwich attacks for a time period of twelve months found that during this time there were at least 480’276 attacks leading to an accumulated profit of 64’217 ETH (189’311’716 USD) and it is shown that miners have recently begun to play a more active role in these value extractions which drastically changes the patterns the authors observe.

SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance

This systematization of knowledge (SoK) categorize and analyze state-of-the-art transaction reordering manipulation mitigation schemes and finds that currently no scheme fully meets all the demands of the blockchain ecosystem.

SoK: Decentralized Finance (DeFi) Incidents

A common reference frame is introduced to systematically evaluate and compare DeFi incidents and investigates potential defenses, finding that 103 of the attacks are not executed atomically, granting a rescue time frame for defenders.

A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges

It is shown that DEX arbitrage and trade routing among similar AMMs can be performed efficiently and atomically onchain within smart contracts, leading to less stale blocks and better blockchain security.

The Evolution of Blockchain: From Lit to Dark

The economic incentives behind the adoption of blockchain dark venues, where users’ transactions are observable only by miners on these venues, are studied to show that miners may not fully adopt dark venues to preserve rents extracted from arbitrageurs, hence creating execution risk for users.

A theoretical basis for Blockchain Extractable Value

This work proposes a formal theory of Extractable Value, based on a general, abstract model of blockchains and smart contracts, which is the basis for proofs of security against Extractablevalue attacks.
...

A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges

It is shown that DEX arbitrage and trade routing among similar AMMs can be performed efficiently and atomically onchain within smart contracts, leading to less stale blocks and better blockchain security.

Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability

This work highlights the large, complex risks created by transaction-ordering dependencies in smart contracts and the ways in which traditional forms of financial-market exploitation are adapting to and penetrating blockchain economies.

Order-Fair Consensus in the Permissionless Setting

The key insight behind the protocols in providing order-fairness is that a miner can no longer unilaterally determine ordering and proposals from many miners are combined in a fair way to construct the finalized ordering.

On the Security and Performance of Proof of Work Blockchains

This paper introduces a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains and devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints.

Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges

This work highlights the large, complex risks created by transaction-ordering dependencies in smart contracts and the ways in which traditional forms of financial-market exploitation are adapting to and penetrating blockchain economies.

High-Frequency Trading on Decentralized On-Chain Exchanges

This work formalizes, analytically exposit and empirically evaluate an augmented variant of front-running: sandwich attacks, which involve front- and back-running victim transactions on a blockchain-based DEX, and quantifies the probability of an adversarial trader being able to undertake the attack, based on the relative positioning of a transaction within a blockchain block.

SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain

This paper draws from a scattered body of knowledge and instances of front-running across the top 25 most active decentral applications (DApps) deployed on Ethereum blockchain and maps the proposed solutions to back-running into useful categories.

SoK: oracles from the ground truth to market manipulation

This systemization of knowledge paper (SoK) dissects the design alternatives for oracles, showcases attacks, and discusses attack mitigation strategies.

Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit

This paper is the first to explore the implication of flash loans for the nascent decentralized finance (DeFi) ecosystem and shows how two previously executed attacks can be "boosted" to result in a profit of 2.37x and 1.73x, respectively.

Consensus in the Age of Blockchains

A systematic and comprehensive study of blockchain consensus protocols is conducted, developing a framework to evaluate their performance, security and design properties, and using it to systematize key themes in the protocol categories described above.
...