2021 IEEE Symposium on Security and Privacy (SP) 2021
DOI: 10.1109/sp40001.2021.00027
|View full text |Cite
|
Sign up to set email alerts
|

High-Frequency Trading on Decentralized On-Chain Exchanges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
56
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 108 publications
(56 citation statements)
references
References 23 publications
0
56
0
Order By: Relevance
“…With enormous funds flowing into the decentralized finance (DeFi) applications, these scams become lucrative moneymaking opportunities for attackers. Previous research studied several different aspects of crypto-economic attacks, e.g., financial repercussions due to transaction reordering [60,62,73,83], flash loan abuse [74], arbitrage opportunities [82], pumpand-dump schemes [64,69,80], etc. Besides protocol attacks, there exists a substantial body of work on automated detection of smart contract vulnerabilities, e.g., reentrancy, transaction order dependence, integer overflows, and unhandled exceptions [16, 34, 56, 58, 63, 65-68, 71, 72, 77, 81].…”
Section: Introductionmentioning
confidence: 99%
“…With enormous funds flowing into the decentralized finance (DeFi) applications, these scams become lucrative moneymaking opportunities for attackers. Previous research studied several different aspects of crypto-economic attacks, e.g., financial repercussions due to transaction reordering [60,62,73,83], flash loan abuse [74], arbitrage opportunities [82], pumpand-dump schemes [64,69,80], etc. Besides protocol attacks, there exists a substantial body of work on automated detection of smart contract vulnerabilities, e.g., reentrancy, transaction order dependence, integer overflows, and unhandled exceptions [16, 34, 56, 58, 63, 65-68, 71, 72, 77, 81].…”
Section: Introductionmentioning
confidence: 99%
“…Zhou et al [35] formalize the sandwich attack problem on AMM exchanges. They study the problem analytically and empirically from the attackers' perspective and quantify when profitable attacks exist.…”
Section: Related Workmentioning
confidence: 99%
“…In this section, we present a taxonomy of AMMs with a focus on the most common components that exist across major decentralized exchanges [1]. Certain protocol-specific components are out of scope and not discussed in this paper.…”
Section: Amm Preliminariesmentioning
confidence: 99%
“…We recognize that this behavior is present for all AMMs. Security risk in terms of attack vectors in high-frequency trading on DEX are discussed in [1] and [19], while flash loan attack vectors are described in [20] and [21]. [22] explores design weaknesses and volatility risks in Defi.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation