Abstract
In the research society, many solutions to solving blockchain scaling have been tried historically, usually by compromising on decentralisation. Ethereum has chosen to scale by switching to Proof of Stake (PoS) consensus and adding data sharding to allow Layer 2 execution to be cheaper. However, in the light of cross-domain Maximal Extractable Value (MEV), even this strategy may have centralising forces built-in. In this work, we focus on cross domain MEV and try to identify cross domain arbitrage. We achieve this by extracting Uniswap data from four different domains and analysing the dataset with two different methods. Based on the analysis, we are successful in identifying one smart contract’s address, which is deployed to multiple domains, engaging in cross domain arbitrage. We also illustrate the difficulties when quantifying cross-domain MEV in practice.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Nakamoto, S.: Bitcoin, a peer-to-peer electronic cash system (2008). https://www.bitcoin.org/bitcoin.pdf
Churiwala, D., Krishnamachari, B.: CoMMA protocol: towards complete mitigation of maximal extractable value (MEV) attacks. CoRR abs/2211.14985, pp. 1–3 (2022)
Daian, P., et al.: Flash boys 2.0: frontrunning in decentralized exchanges, miner extractable value, and consensus instability. In: IEEE Symposium on Security and Privacy, pp. 910–927 (2020)
What is Bitcoin Pizza Day, and Why Does the Community Celebrate on May 22? https://www.forbes.com/sites/rufaskamau/2022/05/09/what-is-bitcoin-pizza-day-and-why-does-the-community-celebrate-on-may-22/?sh=3e7c2d22fd68. Accessed 01 Nov 2022
Flashbots Docs. https://docs.flashbots.net/flashbots-auction/overview. Accessed 23 Nov 2021
Maker Foundation, Makerdao. https://makerdao.com/en/
Aave Companies, Aave. https://aave.com/
Flashbots: Frontrunning the MEV crisis. https://ethresear.ch/t/flashbots-frontrunning-the-mev-crisis/8251
The Sequencer and Censorship Resistance. https://developer.arbitrum.io/sequencer
Crypto fees. https://cryptofees.info/history/2022-07-25
Offchain Labs, Arbitrum. https://arbitrum.io/
OP Labs, Optimism. https://www.optimism.io/
Reitz, K.: Requests: HTTP for humans. https://requests.readthedocs.io/en/v3.0.0
Polygon, Polygon PoS. https://polygon.technology/solutions/polygon-pos/
Uniswap Labs, Uniswap contract deployments. https://docs.uniswap.org/protocol/reference/deployments
Chiu, W.Y., Meng, W., Jensen, C.D.: My data, my control: a secure data sharing and access scheme over blockchain. J. Inf. Secur. Appl. 63, 103020 (2021)
Chiu, W.Y., Meng, W., Li, W., Fang, L.: FolketID: a decentralized blockchain-based NemID alternative against DDoS attacks. In: Proceedings of ProvSec, pp. 210–227 (2022)
Chiu, W.Y., Meng, W.: Towards decentralized bicycle insurance system based on blockchain. In: Proceedings of SAC, pp. 249–256 (2021)
Chiu, W.Y., Meng, W.: EdgeTC - a PBFT blockchain-based ETC scheme for smart cities. Peer-to-Peer Netw. Appl. 14(5), 2874–2886 (2021)
Chiu, W.Y., Meng, W., Li, W.: LibBlock - towards decentralized library system based on blockchain and IPFS. In: Proceedings of PST, pp. 1–9 (2021)
Chiu, W.Y., Meng, W., Li, W.: TPMWallet: towards blockchain hardware wallet using trusted platform module in IoT. In: Proceedings of ICNC, pp. 336–342 (2023)
Li, W., Meng, W., Liu, Z., Au, M.H.: Towards blockchain-based software-defined networking: security challenges and solutions. IEICE Trans. Inf. Syst. 103–D(2), 196–203 (2020)
Malkhi, D., Szalachowski, P.: Maximal extractable value (MEV) protection on a DAG. CoRR abs/2208.00940, pp. 1–10 (2022)
Meng, W., Tischhauser, E.W., Wang, Q., Wang, Y., Han, J.: When intrusion detection meets blockchain technology: a review. IEEE Access 6(1), 10179–10188 (2018)
Meng, W., Li, W., Zhu, L.: Enhancing medical smartphone networks via blockchain-based trust management against insider attacks. IEEE Trans. Eng. Manag. 67(4), 1377–1386 (2020)
Meng, W., Li, W., Tug, S., Tan, J.: Towards blockchain-enabled single character frequency-based exclusive signature matching in IoT-assisted smart cities. J. Parallel Distrib. Comput. 144, 268–277 (2020)
Meng, W., Li, W., Zhou, J.: Enhancing the security of blockchain-based software defined networking through trust-based traffic fusion and filtration. Inf. Fusion 70, 60–71 (2021)
Buterin, V.: Why sharding is great: demystifying the technical properties. https://vitalik.ca/general/2021/04/07/sharding.html
Maximal Extractable Value (MEV). https://ethereum.org/en/developers/docs/mev/
1inch. https://1inch.io/
Infura: The world’s most powerful suite of high availability blockchain APIs and developer tools. https://infura.io/
Obadia, A., Salles, A., Sankar, L., Chitra, T., Chellani, V., Daian, P.: Unity is strength: a formalization of cross-domain maximal extractable value. CoRR abs/2112.01472, pp. 1–13 (2021)
Sun, Z., Chiu, W.Y., Meng, W.: Mosaic - a blockchain consensus algorithm based on random number generation. In: Proceedings of IEEE Blockchain, pp. 105–114 (2022)
Thomsen, A.L., Preisel, B., Andersen, V.R., Chiu, W.Y., Meng, W.: Designing enhanced robust 6G connection strategy with blockchain. In: Su, C., Gritzalis, D., Piuri, V. (eds.) ISPEC 2022. LNCS, vol. 13620, pp. 57–74. Springer, Cham (2022). https://doi.org/10.1007/978-3-031-21280-2_4
Weintraub, B., Torres, C.F., Nita-Rotaru, C., State, R.: A flash (bot) in the pan: measuring maximal extractable value in private pools. In: Proceedings of IMC, pp. 458–471 (2022)
Acknowledgments
The dataset is available at https://sptage.compute.dtu.dk. This work was partially funded by the H2020 DataVaults project with GA Number 871755.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sjursen, J.H., Meng, W., Chiu, WY. (2023). Towards Quantifying Cross-Domain Maximal Extractable Value for Blockchain Decentralisation. In: Wang, D., Yung, M., Liu, Z., Chen, X. (eds) Information and Communications Security. ICICS 2023. Lecture Notes in Computer Science, vol 14252. Springer, Singapore. https://doi.org/10.1007/978-981-99-7356-9_37
Download citation
DOI: https://doi.org/10.1007/978-981-99-7356-9_37
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-99-7355-2
Online ISBN: 978-981-99-7356-9
eBook Packages: Computer ScienceComputer Science (R0)