2020
DOI: 10.1007/978-3-030-43725-1_13
|View full text |Cite
|
Sign up to set email alerts
|

SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain

Abstract: We consider front-running to be a course of action where an entity benefits from prior access to privileged market information about upcoming transactions and trades. Front-running has been an issue in financial instrument markets since the 1970s. With the advent of the blockchain technology, front-running has resurfaced in new forms we explore here, instigated by blockchain's decentralized and transparent nature. In this paper, we draw from a scattered body of knowledge and instances of front-running across t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
119
0
1

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 130 publications
(120 citation statements)
references
References 24 publications
0
119
0
1
Order By: Relevance
“…3) Bob notices Alice's second transaction after its broadcast to the Ethereum network but before adding to a block. 4) Bob front-runs (using an asymmetric insertion attack [5]) the original transaction with a call to transferFrom(_Alice, _Bob, N). If a miner is incentivized (e.g., by Bob offering high gas) to add this transaction before Alice's, it will transfer N of Alice's tokens to Bob.…”
Section: How the Multiple Withdrawal Attack Workmentioning
confidence: 99%
See 3 more Smart Citations
“…3) Bob notices Alice's second transaction after its broadcast to the Ethereum network but before adding to a block. 4) Bob front-runs (using an asymmetric insertion attack [5]) the original transaction with a call to transferFrom(_Alice, _Bob, N). If a miner is incentivized (e.g., by Bob offering high gas) to add this transaction before Alice's, it will transfer N of Alice's tokens to Bob.…”
Section: How the Multiple Withdrawal Attack Workmentioning
confidence: 99%
“…If Alice has many authorizations, she cannot determine if a transfer was initiated by Bob or someone else she has authorized. 5 Therefore Alice cannot always unambiguously rely on events to determine Bob did not transfer funds (See Section 3.1 for more details). If Alice's web app is beyond web3 and runs a full node maintaining blockchain state, it could correctly detect 6 and attribute all transfers initiated by Bob.…”
Section: Where To Prevent This Attackmentioning
confidence: 99%
See 2 more Smart Citations
“…Smart contracts, self-executing programs stored on a blockchain, are capable of executing the matchmaking logic [33]. Even though it seems like an appealing solution to fairness issues, the consensus algorithm managing the blockchain ledger is vulnerable to various attacks against fairness, specically, transaction re-ordering and front-running [21,29,30]. These attacks eectively allow consensus participants to inuence how specic orders are matched.…”
Section: Introductionmentioning
confidence: 99%