Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3589334.3645431acmconferencesArticle/Chapter ViewAbstractPublication PagesthewebconfConference Proceedingsconference-collections
research-article
Open access

Blockchain Censorship

Published: 13 May 2024 Publication History

Abstract

Permissionless blockchains promise resilience against censorship by a single entity. This suggests that deterministic rules, not third-party actors, decide whether a transaction is appended to the blockchain. In 2022, the U.S. ØFAC sanctioned a Bitcoin mixer and an Ethereum application, challenging the neutrality of permissionless blockchains.
In this paper, we formalize, quantify, and analyze the security impact of blockchain censorship. We start by defining censorship, followed by a quantitative assessment of current censorship practices. We find that 46% of Ethereum blocks were made by censoring actors complying with OFAC sanctions, indicating the significant impact of OFAC sanctions on the neutrality of public blockchains.
We discover that censorship affects not only neutrality but also security. After Ethereum's transition to ¶oS, censored transactions faced an average delay of 85%, compromising their security and strengthening sandwich adversaries.

Supplemental Material

MP4 File
Supplemental video

References

[1]
Elli Androulaki, Ghassan O. Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun. 2013. Evaluating User Privacy in Bitcoin. In Financial Cryptography and Data Security, Ahmad-Reza Sadeghi (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 34--51.
[2]
Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking bitcoin: Routing attacks on cryptocurrencies. In 2017 IEEE symposium on security and privacy (SP). IEEE, 375--392.
[3]
Raphael Auer, Jon Frost, Jose María Vidal Pastor, et al. 2022. Miners as intermediaries: extractable value and market manipulation in crypto and DeFi. Technical Report. Bank for International Settlements.
[4]
Shehar Bano, Alberto Sonnino, Mustafa Al-Bassam, Sarah Azouvi, Patrick Mc- Corry, Sarah Meiklejohn, and George Danezis. 2019. SoK: Consensus in the Age of Blockchains. In Proceedings of the 1st ACM Conference on Advances in Financial Technologies (Zurich, Switzerland) (AFT '19). Association for Computing Machinery, New York, NY, USA, 183--198. https://doi.org/10.1145/3318041.3355458
[5]
Alex Biryukov and Ivan Pustogarov. 2015. Bitcoin over Tor isn't a good idea. In 2015 IEEE Symposium on Security and Privacy. IEEE, 122--134.
[6]
Nir Bitansky, Ran Canetti, Alessandro Chiesa, and Eran Tromer. 2012. From Extractable Collision Resistance to Succinct Non-Interactive Arguments of Knowledge, and Back Again. In Proceedings of the 3rd Innovations in Theoretical Computer Science Conference (Cambridge, Massachusetts) (ITCS '12). Association for Computing Machinery, New York, NY, USA, 326--349. https: //doi.org/10.1145/2090236.2090263
[7]
Vitalik Buterin. 2021. State of research: Increasing censorship resistance of transactions under proposer/builder separation (PBS). https://notes.ethereum. org/@vbuterin/pbs_censorship_resistance
[8]
Tarun Chitra and Kshitij Kulkarni. 2022. Improving Proof of Stake Economic Security via MEV Redistribution. In Proceedings of the 2022 ACM CCS Workshop on Decentralized Finance and Security. 1--7.
[9]
Nicolas Christin. 2013. Traveling the Silk Road: A Measurement Analysis of a Large Anonymous Online Marketplace. In Proceedings of the 22nd International Conference on World Wide Web (Rio de Janeiro, Brazil) (WWW '13). Association for Computing Machinery, New York, NY, USA, 213--224. https://doi.org/10. 1145/2488388.2488408
[10]
Nicolas Christin. 2022. Measuring And Analyzing Online Anonymous ('DARKNET') Marketplaces. Technical Report. CARNEGIE-MELLON UNIV PITTSBURGH PA.
[11]
Tyler Crain, Christopher Natoli, and Vincent Gramoli. 2021. Red belly: a secure, fair and scalable open blockchain. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 466--483.
[12]
Jesse Crawford and Yong Guan. 2020. Knowing your Bitcoin Customer: Money Laundering in the Bitcoin Economy. In 2020 13th International Conference on Systematic Approaches to Digital Forensic Engineering (SADFE). 38--45. https: //doi.org/10.1109/SADFE51007.2020.00013
[13]
Kirsten Cremona, Donald Tabone, and Clifford De Raffaele. 2019. Cybersecurity and the Blockchain: Preventing the Insertion of Child Pornography Images. In 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). 197--204. https://doi.org/10.1109/CyberC.2019. 00042
[14]
Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and Ari Juels. 2020. Flash Boys 2.0: Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability. In 2020 IEEE Symposium on Security and Privacy, SP 2020, San Francisco, CA, USA, May 18--21, 2020. IEEE, San Francisco, CA, USA, 910--927. https: //doi.org/10.1109/SP40000.2020.00040
[15]
George Danezis and Ross Anderson. 2004. The economics of censorship resistance. Proceedings of the 3rd Annual Workship on Economics and Information Security (WEIS04)(May 2004) (2004).
[16]
Shayan Eskandari, Seyedehmahsa Moosavi, and Jeremy Clark. 2019. SoK: Transparent Dishonesty: front-running attacks on Blockchain. https://doi.org/10. 1007/978--3-030--43725--1_13 arXiv:1902.05164 [cs.CR]
[17]
Ethereum. 2022. The Merge. https://ethereum.org/en/upgrades/merge/
[18]
Ethereum. 2023. Proposer-builder separation. https://github.com/ethereum/ ethereum-org-website/blob/1729448/src/content/roadmap/pbs/index.md
[19]
Ethernodes. 2022. The popularity of Ethereum clients. https://ethernodes.org/ ethernodes.org.
[20]
Yotam Gafni and Aviv Yaish. 2022. Greedy Transaction Fee Mechanisms for (Non-)myopic Miners. https://doi.org/10.48550/ARXIV.2210.07793
[21]
Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Jing Xu, and Zhenfeng Zhang. 2022. Dumbo-ng: Fast asynchronous bft consensus with throughput-oblivious latency. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 1187--1201.
[22]
Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The Bitcoin Backbone Protocol: Analysis and Applications. In Advances in Cryptology - EUROCRYPT 2015, Elisabeth Oswald and Marc Fischlin (Eds.). Springer, Berlin, Heidelberg, 281--310.
[23]
Peter Ga?i, Aggelos Kiayias, and Dionysis Zindros. 2019. Proof-of-stake sidechains. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 139-- 156.
[24]
Arthur Gervais, Hubert Ritzdorf, Ghassan O Karame, and Srdjan Capkun. 2015. Tampering with the delivery of blocks and transactions in bitcoin. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 692--705.
[25]
Noemi Glaeser, Matteo Maffei, Giulio Malavolta, Pedro Moreno-Sanchez, Erkan Tairi, and Sri Aravinda Krishnan Thyagarajan. 2022. Foundations of Coin Mixing Services. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (Los Angeles, CA, USA) (CCS '22). Association for Computing Machinery, New York, NY, USA, 1259--1273. https://doi.org/10.1145/ 3548606.3560637
[26]
Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on Bitcoin's peer-to-peer network. In 24th USENIX Security Symposium (USENIX Security 15). 129--144.
[27]
Lioba Heimbach and Roger Wattenhofer. 2022. SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance. arXiv:https://doi.org/10.48550/arXiv.2203.11520 https://arxiv.org/abs/2203.11520
[28]
Alejo; Hasu Hu, Elaine; Salles. 2022. The Cost of Resilience. https://web.archive. org/web/20230325222151/https://writings.flashbots.net/the-cost-of-resilience
[29]
Hideaki Ishii, Yuan Wang, and Shuai Feng. 2022. An overview on multi-agent consensus under adversarial attacks. Annual Reviews in Control 53 (2022), 252-- 272.
[30]
Dimitris Karakostas, Aggelos Kiayias, and Christina Ovezik. 2022. SoK: A Stratified Approach to Blockchain Decentralization.
[31]
Ghassan O Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, and Srdjan ?apkun. 2015. Misbehavior in bitcoin: A study of double-spending and accountability. ACM Transactions on Information and System Security (TISSEC) 18, 1 (2015), 1--32.
[32]
Sheharbano Khattak, Tariq Elahi, Laurent Simon, Colleen M Swanson, Steven J Murdoch, and Ian Goldberg. 2016. SOK: Making sense of censorship resistance systems. Proceedings on Privacy Enhancing Technologies 2016, 4 (2016), 37--61.
[33]
Kari Kostiainen, Sven Gnap, and Ghassan Karame. 2022. Censorship-Resilient and Confidential Collateralized Second-Layer Payments. Cryptology ePrint Archive, Paper 2022/1520. https://eprint.iacr.org/2022/1520 https://eprint.iacr.org/2022/ 1520.
[34]
Duc V. Le and Arthur Gervais. 2021. AMR: Autonomous Coin Mixer with Privacy Preserving Reward Distribution. Association for Computing Machinery, New York, NY, USA, 142--155. https://doi.org/10.1145/3479722.3480800
[35]
Christopher S Leberknight, Mung Chiang, Harold Vincent Poor, and Felix Wong. 2010. A taxonomy of Internet censorship and anti-censorship. In Fifth International Conference on Fun with Algorithms. 52--64.
[36]
Yulin Liu, Yuxuan Lu, Kartik Nayak, Fan Zhang, Luyao Zhang, and Yinhong Zhao. 2022. Empirical Analysis of EIP-1559: Transaction Fees, Waiting Times, and Consensus Security. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (Los Angeles, CA, USA) (CCS '22). Association for Computing Machinery, New York, NY, USA, 2099--2113. https: //doi.org/10.1145/3548606.3559341
[37]
Angelique Faye Loe and Elizabeth Anne Quaglia. 2019. You Shall Not Join: A Measurement Study of Cryptocurrency Peer-to-Peer Bootstrapping Techniques. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (London, United Kingdom) (CCS '19). Association for Computing Machinery, New York, NY, USA, 2231--2247. https://doi.org/10.1145/3319535.3345649
[38]
Ayelet Lotem, Sarah Azouvi, Patrick McCorry, and Aviv Zohar. 2022. Sliding Window Challenge Process for Congestion Detection. https://doi.org/10.48550/ ARXIV.2201.09009
[39]
Felix Konstantin Maurer, Till Neudecker, and Martin Florian. 2017. Anonymous CoinJoin transactions with arbitrary values. In 2017 IEEE Trustcom/ BigDataSE/ICESS. IEEE, 522--529.
[40]
Patrick McCorry, Alexander Hicks, and Sarah Meiklejohn. 2018. Smart Contracts for Bribing Miners. In Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers (Nieuwpoort, Curaçao). Springer-Verlag, Berlin, Heidelberg, 3--18. https://doi.org/10.1007/978--3--662--58820--8_1
[41]
Andrew Miller. 2013. Feather-forks: enforcing a blacklist with sub-50% hash power. https://web.archive.org/web/20221101152114/https://bitcointalk.org/ index.php?topic=312668.0
[42]
Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. 2016. The honey badger of BFT protocols. In Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. 31--42.
[43]
Immanual John Milton. 2022. Crypto Mixer Tornado Cash's Accounts Are Disabled After US Sanctions. https://www.bloomberg.com/news/articles/2022-08- 08/crypto-mixer-tornado-s-accounts-are-disabled-after-us-sanctions
[44]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. https: //web.archive.org/web/20100704213649/https://bitcoin.org/bitcoin.pdf
[45]
Gleb Naumenko. 2022. TxWithhold Smart Contracts. https://web.archive.org/ web/20220628075911/https://thelab31.xyz/blog/txwithhold
[46]
Malaw Ndiaye and Pr Karim Konate. 2021. Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain. In 2021 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 1--8.
[47]
Danny Nelson. 2022. Crypto Industry's Sanctions Woes on Full Display in Meta- Mask's Venezuela Hiccup. https://web.archive.org/web/20220516095735/https: //www.coindesk.com/business/2022/03/04/crypto-industrys-sanctions-woeson- full-display-\in-metamasks-venezuela-hiccup/
[48]
Joachim Neu, Ertem Nusret Tas, and David Tse. 2022. The availabilityaccountability dilemma and its resolution via accountability gadgets. In International Conference on Financial Cryptography and Data Security. Springer, 541--559.
[49]
Michael Neuder, Daniel J Moroz, Rithvik Rao, and David C Parkes. 2021. Low-cost attacks on Ethereum 2.0 by sub-1/3 stakeholders.
[50]
Joshua Park. 2021. The Lazarus group: The Cybercrime Syndicate Financing the north Korea State. Harvard International Review 42, 2 (2021), 34--39.
[51]
Ginger Perng, Michael K Reiter, and Chenxi Wang. 2005. Censorship resistance revisited. In International Workshop on Information Hiding. Springer, 62--76.
[52]
Alexey Pertsev, Roman Semenov, and Roman Storm. 2019. Tornado Cash Privacy Solution Version 1.4.
[53]
President of the United States. 2015. Executive Order 13694 of April 1, 2015. https://www.federalregister.gov/documents/2015/04/02/2015-07788/blockingthe- property-of-certain-persons-engaging-in-significant-malicious-cyberenabled- activities.
[54]
Kaihua Qin, Liyi Zhou, Pablo Gamito, Philipp Jovanovic, and Arthur Gervais. 2021. An Empirical Study of DeFi Liquidations: Incentives, Risks, and Instabilities. In Proceedings of the 21st ACM Internet Measurement Conference (Virtual Event) (IMC '21). Association for Computing Machinery, New York, NY, USA, 336--350. https://doi.org/10.1145/3487552.3487811
[55]
Kaihua Qin, Liyi Zhou, and Arthur Gervais. 2022. Quantifying Blockchain Extractable Value: How dark is the forest?. In 43rd IEEE Symposium on Security and Privacy, SP 2022, San Francisco, CA, USA, May 22--26, 2022. IEEE, San Francisco, CA, USA, 198--214. https://doi.org/10.1109/SP46214.2022.9833734
[56]
Tim Ruffing, Pedro Moreno-Sanchez, and Aniket Kate. 2014. Coinshuffle: Practical decentralized coin mixing for bitcoin. In European Symposium on Research in Computer Security. Springer, 345--364.
[57]
Rodrigo Seira, Amy Aixi Zhang, and Dan Robinson. 2022. Base Layer Neutrality. https://www.paradigm.xyz/2022/09/base-layer-neutrality.
[58]
Peiyao Sheng, Gerui Wang, Kartik Nayak, Sreeram Kannan, and Pramod Viswanath. 2021. BFT protocol forensics. In Proceedings of the 2021 ACM SIGSAC conference on computer and communications security. 1722--1743.
[59]
Paulo Silva, David Vavricka, João Barreto, and Miguel Matos. 2020. Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of Ethereum. In 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, San Francisco, CA, USA, 245--252. https://doi.org/10.1109/ DSN48063.2020.00041
[60]
Johann Stockinger, Bernhard Haslhofer, Pedro Moreno-Sanchez, and Matteo Maffei. 2021. Pinpointing and Measuring Wasabi and Samourai CoinJoins in the Bitcoin Ecosystem. arXiv:2109.10229 [cs.CR]
[61]
Ertem Nusret Tas, David Tse, Fisher Yu, Sreeram Kannan, and Mohammad Ali Maddah-Ali. 2022. Bitcoin-enhanced proof-of-stake security: Possibilities and impossibilities.
[62]
Wai Yan Maung Maung Thin, Naipeng Dong, Guangdong Bai, and Jin Song Dong. 2018. Formal analysis of a proof-of-stake blockchain. In 2018 23rd International Conference on Engineering of Complex Computer Systems (ICECCS). IEEE, 197--200.
[63]
Tin Tironsakkul, Manuel Maarek, Andrea Eross, and Mike Just. 2022. The Unique Dressing of Transactions: Wasabi CoinJoin Transaction Detection. In Proceedings of the 2022 European Interdisciplinary Cybersecurity Conference (Barcelona, Spain) (EICC '22). Association for Computing Machinery, New York, NY, USA, 21--28. https://doi.org/10.1145/3528580.3528585
[64]
Muoi Tran, Inho Choi, Gi Jun Moon, Anh V Vu, and Min Suk Kang. 2020. A stealthier partitioning attack against bitcoin peer-to-peer network. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 894--909.
[65]
Michael Carl Tschantz, Sadia Afroz, Vern Paxson, et al. 2016. Sok: Towards grounding censorship circumvention in empiricism. In 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 914--933.
[66]
U.S. Department of the Treasury. 2022. FAQ 1076. What is prohibited as a result of OFAC's designation of Tornado Cash? https: //web.archive.org/web/20221014112946/https://home.treasury.gov/policyissues/ financial-sanctions/faqs/1076.
[67]
U.S. Department of the Treasury. 2022. Treasury Designates DPRKWeapons Representatives. https://web.archive.org/web/20221126125148/https://home.treasury. gov/news/press-releases/jy1087.
[68]
U.S. Department of the Treasury. 2022. U.S. Treasury Issues First-Ever Sanctions on a Virtual Currency Mixer, Targets DPRK Cyber Threats. https://web.archive.org/web/20221124112323/https://home.treasury.gov/news/ press-releases/jy0768.
[69]
U.S. Department of the Treasury. 2022. U.S. Treasury Sanctions Notorious Virtual Currency Mixer Tornado Cash. https://web.archive.org/web/20221026104007/ https://home.treasury.gov/news/press-releases/jy0916.
[70]
U.S. Department of the Treasury's Office of Foreign Assets Control. 2021. Sanctions Compliance Guidance for the Virtual Currency Industry. https://home. treasury.gov/system/files/126/virtual_currency_guidance_brochure.pdf.
[71]
Friedhelm Victor. 2020. Address Clustering Heuristics For Ethereum. In Financial Cryptography and Data Security: 24th International Conference, FC 2020, Kota Kinabalu, Malaysia, February 10--14, 2020 Revised Selected Papers (Kota Kinabalu, Malaysia). Springer-Verlag, Berlin, Heidelberg, 617--633. https://doi.org/10.1007/ 978--3-030--51280--4_33
[72]
Ye Wang, Patrick Zuest, Yaxing Yao, Zhicong Lu, and Roger Wattenhofer. 2022. Impact and User Perception of Sandwich Attacks in the DeFi Ecosystem. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI '22). Association for Computing Machinery, New York, NY, USA, Article 591, 15 pages. https://doi.org/10.1145/3491102.3517585
[73]
Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Benjamin Livshits, and Arthur Gervais. 2023. On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy. In Proceedings of the ACM Web Conference 2023 (Austin, TX, USA) (WWW '23). Association for Computing Machinery, New York, NY, USA, 2022--2032. https://doi.org/10.1145/ 3543507.3583217
[74]
Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I. Weidele, Claudio Bellei, Tom Robinson, and Charles E. Leiserson. 2019. Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics. arXiv:1908.02591 http://arxiv.org/abs/1908.02591
[75]
Fredrik Winzer, Benjamin Herd, and Sebastian Faust. 2019. Temporary Censorship Attacks in the Presence of Rational Miners. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). IEEE Computer Society, Los Alamitos, CA, USA, 357--366. https://doi.org/10.1109/EuroSPW.2019.00046
[76]
GavinWood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1--32.
[77]
Liam Wright. 2022. DeFi protocols Aave, Uniswap, Balancer, ban users following OFAC sanctions on Tornado Cash. https://web.archive.org/web/20220816142409/ https://cryptoslate.com/defi-protocols-aave-uniswap-balancer-ban-usersfollowing\- ofac-sanctions-on-tornado-cash/
[78]
Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, and Kui Ren. 2021. Towards Understanding and Demystifying Bitcoin Mixing Services. In Proceedings of the Web Conference 2021 (Ljubljana, Slovenia) (WWW '21). Association for Computing Machinery, New York, NY, USA, 33--44. https: //doi.org/10.1145/3442381.3449880
[79]
Xiangbin Xian, Yu Zhou, Yurong Guo, Zhenguo Yang, and Wenyin Liu. 2019. Improved consensus mechanisms against censorship attacks. In 2019 IEEE International Conference on Industrial Cyber Physical Systems (ICPS). IEEE, 718--723.
[80]
Aviv Yaish, Kaihua Qin, Liyi Zhou, Aviv Zohar, and Arthur Gervais. 2023. Speculative Denial-of-Service Attacks in Ethereum. Cryptology ePrint Archive, Paper 2023/956., 24 pages. https://ia.cr/2023/956
[81]
Aviv Yaish, Saar Tochner, and Aviv Zohar. 2022. Blockchain Stretching & Squeezing: Manipulating Time for Your Best Interest. In Proceedings of the 23rd ACM Conference on Economics and Computation (Boulder, CO, USA) (EC '22). Association for Computing Machinery, New York, NY, USA, 65--88. https: //doi.org/10.1145/3490486.3538250
[82]
Ren Zhang and Bart Preneel. 2019. Lay down the common metrics: Evaluating proof-of-work consensus protocols' security. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, IEEE, San Francisco, CA, USA, 175--192. https://doi.org/ 10.1109/sp.2019.00086
[83]
Liyi Zhou, Kaihua Qin, Antoine Cully, Benjamin Livshits, and Arthur Gervais. 2021. On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols. In 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24--27 May 2021. IEEE, San Francisco, CA, USA, 919--936. https://doi. org/10.1109/SP40001.2021.00113
[84]
Liyi Zhou, Kaihua Qin, and Arthur Gervais. 2021. A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges. arXiv:2106.07371 https://arxiv.org/abs/2106.07371
[85]
Liyi Zhou, Kaihua Qin, Christof Ferreira Torres, Duc Viet Le, and Arthur Gervais. 2021. High-Frequency Trading on Decentralized On-Chain Exchanges. In 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24- 27 May 2021. IEEE, San Francisco, CA, USA, 428--445. https://doi.org/10.1109/ SP40001.2021.00027
[86]
Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, and Arthur Gervais. 2022. SoK: Decentralized Finance (DeFi) Attacks. https://doi.org/10.48550/ARXIV. 2208.13035

Cited By

View all
  • (2024)The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road AheadInformation10.3390/info1505026815:5(268)Online publication date: 9-May-2024
  • (2024)Incentives in the Ether: Practical Cryptocurrency Economics & SecurityCompanion Proceedings of the ACM Web Conference 202410.1145/3589335.3651268(1230-1233)Online publication date: 13-May-2024
  • (2024)Cryptocurrency in the Aftermath: Unveiling the Impact of the SVB CollapseIEEE Transactions on Computational Social Systems10.1109/TCSS.2024.338849511:5(5839-5857)Online publication date: Oct-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WWW '24: Proceedings of the ACM Web Conference 2024
May 2024
4826 pages
ISBN:9798400701719
DOI:10.1145/3589334
This work is licensed under a Creative Commons Attribution International 4.0 License.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Check for updates

Author Tags

  1. bitcoin
  2. blockchain
  3. censorship
  4. ethereum

Qualifiers

  • Research-article

Funding Sources

Conference

WWW '24
Sponsor:
WWW '24: The ACM Web Conference 2024
May 13 - 17, 2024
Singapore, Singapore

Acceptance Rates

Overall Acceptance Rate 1,899 of 8,196 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)643
  • Downloads (Last 6 weeks)179
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)The Convergence of Artificial Intelligence and Blockchain: The State of Play and the Road AheadInformation10.3390/info1505026815:5(268)Online publication date: 9-May-2024
  • (2024)Incentives in the Ether: Practical Cryptocurrency Economics & SecurityCompanion Proceedings of the ACM Web Conference 202410.1145/3589335.3651268(1230-1233)Online publication date: 13-May-2024
  • (2024)Cryptocurrency in the Aftermath: Unveiling the Impact of the SVB CollapseIEEE Transactions on Computational Social Systems10.1109/TCSS.2024.338849511:5(5839-5857)Online publication date: Oct-2024
  • (2024)Non-Atomic Arbitrage in Decentralized Finance2024 IEEE Symposium on Security and Privacy (SP)10.1109/SP54263.2024.00256(3866-3884)Online publication date: 19-May-2024
  • (2023)The Future of Finance: Synthesizing CeFi and DeFi for the Benefit of AllFinancial Literacy in Today´s Global Market10.5772/intechopen.1003042Online publication date: 17-Nov-2023
  • (2023)DeFi '23: Workshop on Decentralized Finance and SecurityProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3624026(3660-3661)Online publication date: 21-Nov-2023

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media