2019
DOI: 10.48550/arxiv.1902.05164
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

SoK: Transparent Dishonesty: front-running attacks on Blockchain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…We deployed our SCM model is deployed in eight machines (containing ubuntu and Windows operating systems), each possessing 2.30GHz core Intel processor with 8 GB primary memory [23].This experiment uses node (of version 12.7.0) which is an asynchronous event-driven JavaScript runtime, which is designed to build scalable network applications, npm (version 6. WebSocket [24]. Figure 5 shows the exponent, its value, and name of SI unit used for the blockchain.…”
Section: Experimental Testbed and Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We deployed our SCM model is deployed in eight machines (containing ubuntu and Windows operating systems), each possessing 2.30GHz core Intel processor with 8 GB primary memory [23].This experiment uses node (of version 12.7.0) which is an asynchronous event-driven JavaScript runtime, which is designed to build scalable network applications, npm (version 6. WebSocket [24]. Figure 5 shows the exponent, its value, and name of SI unit used for the blockchain.…”
Section: Experimental Testbed and Resultsmentioning
confidence: 99%
“…Web3js (version 1.2.0) maintains request handling between Ethereum nodes. It contains a collection of modules that allow you to interface with a local or distant Ethereum node using HTTP, IPC, or WebSocket[24]. Figure5shows the exponent, its value, and name of SI unit used for the blockchain.…”
mentioning
confidence: 99%
“…Accountability [Chatzigiannis et al, 2021] often describes the auditability of blockchain networks and the preservation of privacy. Front-running [Eskandari et al, 2019] occurs when certain market participants have privileged access to information and has become an issue…”
Section: Related Literaturementioning
confidence: 99%
“…Miners can "steal" arbitrage opportunities from arbitragers by taking them themselves. Additionally, the survey in [18] describes several other sources of MEV, including the ability to buy into profitable ICOs early and the manipulation of games of chance.…”
Section: B Undercutting Attacksmentioning
confidence: 99%
“…As a result, effective practical mitigations for these issues have failed to materialize, and few deployed smart contracts feature ordering protections. Other work has focused on systematizing knowledge around smart contract frontrunning [18], including citing early public versions of this work, but has not measured the size of this economy or formalized its connection to protocol attacks.…”
Section: Introductionmentioning
confidence: 99%