Quantifying Blockchain Extractable Value: How dark is the forest?
@article{Qin2021QuantifyingBE, title={Quantifying Blockchain Extractable Value: How dark is the forest?}, author={Kaihua Qin and Liyi Zhou and Arthur Gervais}, journal={2022 IEEE Symposium on Security and Privacy (SP)}, year={2021}, pages={198-214} }
Permissionless blockchains such as Bitcoin have excelled at financial services. Yet, opportunistic traders extract monetary value from the mesh of decentralized finance (DeFi) smart contracts through so-called blockchain extractable value (BEV). The recent emergence of centralized BEV relayer portrays BEV as a positive additional revenue source. Because BEV was quantitatively shown to deteriorate the blockchain’s consensus security, BEV relayers endanger the ledger security by incentivizing…
95 Citations
The Blockchain Imitation Game
- Computer ScienceArXiv
- 2023
The findings suggest that blockchain validators can imitate attacks in real-time to prevent intrusions in DeFi, and proposed generalized imitation attack methodology called Ape, which supports the automatic synthesis of adversarial smart contracts.
SoK: MEV Countermeasures: Theory and Practice
- Computer ScienceArXiv
- 2022
A comprehensive taxonomy of 28 proposed MEV countermeasures, covering four different technical directions is presented and the most popular MEV- auction-based solution with rich blockchain and mempool data is empirically studied.
SoK: Decentralized Finance (DeFi) Attacks
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2022
A common reference frame is introduced to systematically evaluate and compare DeFi incidents, including both attacks and accidents, which reveals several gaps between academia and the practitioners' community.
On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2023
The findings indicate that AM attracts privacy-ignorant users, who then do not contribute to improving the privacy of other mixer users, and the empirical evidence is the first to suggest a differing privacy-predilection of users on ETH and BSC.
Analyzing and Preventing Sandwich Attacks in Ethereum
- Computer Science
- 2021
A large-scale analysis of sandwich attacks for a time period of twelve months found that during this time there were at least 480’276 attacks leading to an accumulated profit of 64’217 ETH (189’311’716 USD) and it is shown that miners have recently begun to play a more active role in these value extractions which drastically changes the patterns the authors observe.
SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance
- Computer ScienceArXiv
- 2022
This systematization of knowledge (SoK) categorize and analyze state-of-the-art transaction reordering manipulation mitigation schemes and finds that currently no scheme fully meets all the demands of the blockchain ecosystem.
SoK: Decentralized Finance (DeFi) Incidents
- Computer ScienceArXiv
- 2022
A common reference frame is introduced to systematically evaluate and compare DeFi incidents and investigates potential defenses, finding that 103 of the attacks are not executed atomically, granting a rescue time frame for defenders.
A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges
- Computer ScienceArXiv
- 2021
It is shown that DEX arbitrage and trade routing among similar AMMs can be performed efficiently and atomically onchain within smart contracts, leading to less stale blocks and better blockchain security.
The Evolution of Blockchain: From Lit to Dark
- Economics, Computer ScienceSSRN Electronic Journal
- 2021
The economic incentives behind the adoption of blockchain dark venues, where users’ transactions are observable only by miners on these venues, are studied to show that miners may not fully adopt dark venues to preserve rents extracted from arbitrageurs, hence creating execution risk for users.
A theoretical basis for Blockchain Extractable Value
- Computer Science, MathematicsArXiv
- 2023
This work proposes a formal theory of Extractable Value, based on a general, abstract model of blockchains and smart contracts, which is the basis for proofs of security against Extractablevalue attacks.
61 References
A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges
- Computer ScienceArXiv
- 2021
It is shown that DEX arbitrage and trade routing among similar AMMs can be performed efficiently and atomically onchain within smart contracts, leading to less stale blocks and better blockchain security.
Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability
- Computer Science2020 IEEE Symposium on Security and Privacy (SP)
- 2020
This work highlights the large, complex risks created by transaction-ordering dependencies in smart contracts and the ways in which traditional forms of financial-market exploitation are adapting to and penetrating blockchain economies.
Order-Fair Consensus in the Permissionless Setting
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2021
The key insight behind the protocols in providing order-fairness is that a miner can no longer unilaterally determine ordering and proposals from many miners are combined in a fair way to construct the finalized ordering.
On the Security and Performance of Proof of Work Blockchains
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2016
This paper introduces a novel quantitative framework to analyse the security and performance implications of various consensus and network parameters of PoW blockchains and devise optimal adversarial strategies for double-spending and selfish mining while taking into account real world constraints.
Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges
- Computer ScienceArXiv
- 2019
This work highlights the large, complex risks created by transaction-ordering dependencies in smart contracts and the ways in which traditional forms of financial-market exploitation are adapting to and penetrating blockchain economies.
High-Frequency Trading on Decentralized On-Chain Exchanges
- Computer Science2021 IEEE Symposium on Security and Privacy (SP)
- 2021
This work formalizes, analytically exposit and empirically evaluate an augmented variant of front-running: sandwich attacks, which involve front- and back-running victim transactions on a blockchain-based DEX, and quantifies the probability of an adversarial trader being able to undertake the attack, based on the relative positioning of a transaction within a blockchain block.
SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain
- Computer ScienceFinancial Cryptography Workshops
- 2019
This paper draws from a scattered body of knowledge and instances of front-running across the top 25 most active decentral applications (DApps) deployed on Ethereum blockchain and maps the proposed solutions to back-running into useful categories.
SoK: oracles from the ground truth to market manipulation
- Computer Science, MathematicsArXiv
- 2021
This systemization of knowledge paper (SoK) dissects the design alternatives for oracles, showcases attacks, and discusses attack mitigation strategies.
Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit
- Computer Science, EconomicsFinancial Cryptography
- 2021
This paper is the first to explore the implication of flash loans for the nascent decentralized finance (DeFi) ecosystem and shows how two previously executed attacks can be "boosted" to result in a profit of 2.37x and 1.73x, respectively.
Consensus in the Age of Blockchains
- Computer Science, MathematicsArXiv
- 2017
A systematic and comprehensive study of blockchain consensus protocols is conducted, developing a framework to evaluate their performance, security and design properties, and using it to systematize key themes in the protocol categories described above.