{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T05:47:20Z","timestamp":1774331240995,"version":"3.50.1"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031786754","type":"print"},{"value":"9783031786761","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78676-1_10","type":"book-chapter","created":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:50:35Z","timestamp":1740120635000},"page":"172-191","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Don\u2019t Let MEV Slip: The Costs of\u00a0Swapping on\u00a0the\u00a0Uniswap Protocol"],"prefix":"10.1007","author":[{"given":"Austin","family":"Adams","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1406-9845","authenticated-orcid":false,"given":"Benjamin Y","family":"Chan","sequence":"additional","affiliation":[]},{"given":"Sarit","family":"Markovich","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Wan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,22]]},"reference":[{"key":"10_CR1","unstructured":"Flashbots transparency dashboard (2022). https:\/\/transparency.flashbots.net"},{"key":"10_CR2","unstructured":"0x.org: Measuring the impact of hidden DEX costs (2022). https:\/\/0x.org\/post\/measuring-the-impact-of-hidden-dex-costs"},{"key":"10_CR3","unstructured":"Adams, A., Chan, B.Y., Markovich, S., Wan, X.: Don\u2019t let MEV slip: the costs of swapping on the Uniswap protocol. arXiv preprint arXiv:2309.13648 (2023)"},{"key":"10_CR4","unstructured":"Adams, H., et al.: Uniswap v4 core (2023). https:\/\/github.com\/Uniswap\/v4-core\/blob\/ffa4af8759aa416497c94c1693dc53c6e9961f89\/whitepaper-v4-draft.pdf"},{"key":"10_CR5","unstructured":"Adams, H., Zinsmeister, N., Salem, M., Keefer, R., Robinson, D.: Uniswap v3 core (2021). https:\/\/uniswap.org\/whitepaper-v3.pdf"},{"issue":"01","key":"10_CR6","doi-asserted-by":"publisher","first-page":"1550002","DOI":"10.1142\/S2010139215500020","volume":"5","author":"JJ Angel","year":"2015","unstructured":"Angel, J.J., Harris, L.E., Spatt, C.S.: Equity trading in the 21st century: an update. Q. J. Financ. 5(01), 1550002 (2015)","journal-title":"Q. J. Financ."},{"key":"10_CR7","unstructured":"Angeris, G., Chitra, T., Diamandis, T., Kulkarni, K.: The specter (and spectra) of miner extractable value (2023)"},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Babel, K., Daian, P., Kelkar, M., Juels, A.: Clockwork finance: automated analysis of economic security in smart contracts. In: 2023 IEEE Symposium on Security and Privacy (SP), pp. 2499\u20132516. IEEE (2023)","DOI":"10.1109\/SP46215.2023.10179346"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Babel, K., Javaheripi, M., Ji, Y., Kelkar, M., Koushanfar, F., Juels, A.: Lanturn: measuring economic security of smart contracts through adaptive learning. Cryptology ePrint Archive (2023)","DOI":"10.1145\/3576915.3623204"},{"key":"10_CR10","unstructured":"Barbon, A., Ranaldo, A.: On the quality of cryptocurrency markets: centralized versus decentralized exchanges (2023)"},{"key":"10_CR11","unstructured":"Bentov, I., Breidenbach, L., Daian, P., Juels, A., Li, Y., Zhao, X.: The cost of decentralization in 0x and EtherDelta (2017). http:\/\/hackingdistributed.com\/2017\/08\/13\/cost-of-decent\/"},{"key":"10_CR12","unstructured":"Buterin, V.: Let\u2019s run on-chain decentralized exchanges the way we run prediction markets (2016). https:\/\/www.reddit.com\/r\/ethereum\/comments\/55m04x\/lets_run_onchain_decentralized_exchanges_the_way"},{"key":"10_CR13","unstructured":"Buterin, V., et al.: Combining ghost and Casper. arXiv preprint arXiv:2003.03052 (2020)"},{"key":"10_CR14","unstructured":"Buterin, V., et\u00a0al.: A next-generation smart contract and decentralized application platform. White Paper 3(37) (2014)"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Cachin, C., Mi\u0107i\u0107, J., Steinhauer, N., Zanolini, L.: Quick order fairness. In: International Conference on Financial Cryptography and Data Security, pp. 316\u2013333. Springer (2022)","DOI":"10.1007\/978-3-031-18283-9_15"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Caparros, B., Chaudhary, A., Klein, O.: Blockchain scaling and liquidity concentration on decentralized exchanges (2023)","DOI":"10.2139\/ssrn.4475460"},{"key":"10_CR17","unstructured":"Chen, Y., Pennock, D.M.: A utility framework for bounded-loss market makers. arXiv preprint arXiv:1206.5252 (2012)"},{"issue":"2","key":"10_CR18","doi-asserted-by":"publisher","first-page":"869","DOI":"10.1111\/j.1540-6261.2004.00651.x","volume":"59","author":"CN Chiyachantana","year":"2004","unstructured":"Chiyachantana, C.N., Jain, P.K., Jiang, C., Wood, R.A.: International evidence on institutional trading behavior and price impact. J. Financ. 59(2), 869\u2013898 (2004)","journal-title":"J. Financ."},{"key":"10_CR19","doi-asserted-by":"crossref","unstructured":"Daian, P., et al.: Flash boys 2.0: frontrunning in decentralized exchanges, miner extractable value, and consensus instability. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 910\u2013927. IEEE (2020)","DOI":"10.1109\/SP40000.2020.00040"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I.B.: Collision free hash functions and public key signature schemes. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 203\u2013216. Springer (1987)","DOI":"10.1007\/3-540-39118-5_19"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory (1976)","DOI":"10.1109\/TIT.1976.1055638"},{"key":"10_CR22","unstructured":"Domowitz, I., Glen, J., Madhavan, A.: Global equity trading costs. ITG White Paper 8 (2001)"},{"issue":"2","key":"10_CR23","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1111\/1468-2362.00072","volume":"4","author":"I Domowitz","year":"2001","unstructured":"Domowitz, I., Glen, J., Madhavan, A.: Liquidity, volatility and equity trading costs across countries and over time. Int. Financ. 4(2), 221\u2013255 (2001)","journal-title":"Int. Financ."},{"key":"10_CR24","unstructured":"Domowitz, I., Steil, B.: Automation, trading costs, and the structure of the securities trading industry. In: Brookings-Wharton Papers on Financial Services, vol. 2, pp. 33\u201392 (1999)"},{"key":"10_CR25","unstructured":"flashbots: flashbots\/mev-boost: Mev-boost. https:\/\/github.com\/flashbots\/mev-boost\/. Accessed in 2023"},{"key":"10_CR26","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1016\/j.jmoneco.2017.12.004","volume":"95","author":"N Gandal","year":"2018","unstructured":"Gandal, N., Hamrick, J., Moore, T., Oberman, T.: Price manipulation in the bitcoin ecosystem. J. Monet. Econ. 95, 86\u201396 (2018)","journal-title":"J. Monet. Econ."},{"key":"10_CR27","doi-asserted-by":"crossref","unstructured":"Hasbrouck, J., Rivera, T.J., Saleh, F.: The need for fees at a DEX: how increases in fees can increase DEX trading volume. SSRN (2022)","DOI":"10.2139\/ssrn.4192925"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Heimbach, L., Wattenhofer, R.: SoK: preventing transaction reordering manipulations in decentralized finance. arXiv preprint arXiv:2203.11520 (2022)","DOI":"10.1145\/3558535.3559784"},{"key":"10_CR29","unstructured":"Hu, E.: Modelling realised extractable value in proof of stake Ethereum - an update of validator return post-merge (2022). https:\/\/collective.flashbots.net\/t\/modelling-realised-extractable-value-in-proof-of-stake-ethereum\/290"},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Kelkar, M., Deb, S., Kannan, S.: Order-fair consensus in the permissionless setting. In: Proceedings of the 9th ACM on ASIA Public-Key Cryptography Workshop, pp. 3\u201314 (2022)","DOI":"10.1145\/3494105.3526239"},{"key":"10_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-030-56877-1_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"M Kelkar","year":"2020","unstructured":"Kelkar, M., Zhang, F., Goldfeder, S., Juels, A.: Order-fairness for Byzantine consensus. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12172, pp. 451\u2013480. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56877-1_16"},{"key":"10_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-662-63958-0_17","volume-title":"Financial Cryptography and Data Security. FC 2021 International Workshops","author":"K Kursawe","year":"2021","unstructured":"Kursawe, K.: Wendy grows up: more order fairness. In: Bernhard, M., et al. (eds.) FC 2021. LNCS, vol. 12676, pp. 191\u2013196. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-63958-0_17"},{"key":"10_CR33","unstructured":"Liao, G., Robinson, D.: The dominance of Uniswap v3 liquidity (2022)"},{"key":"10_CR34","unstructured":"Livnev, L.: Github issues, ethereum\/go-ethereum: random ordering of equally-priced transactions incentivises competitive spam (2020). https:\/\/github.com\/ethereum\/go-ethereum\/issues\/21350"},{"key":"10_CR35","unstructured":"Lu, A., K\u00f6ppelmann, M.: Building a decentralized exchange in Ethereum (2017). https:\/\/blog.gnosis.pm\/building-a-decentralized-exchange-in-ethereum-eea4e7452d6e"},{"key":"10_CR36","unstructured":"Malkhi, D., Szalachowski, P.: Maximal extractable value (MEV) protection on a DAG (2022). arXiv preprint arXiv:2208.00940"},{"key":"10_CR37","unstructured":"Marshall, B.: The false narrative of MEV protection: how private transactions can result in a poorer settlement than sending publicly. Blocknative (2023). https:\/\/www.blocknative.com\/blog\/mev-protection-negative-settlement"},{"key":"10_CR38","unstructured":"McMillan, A.: The inside story of Mt. Gox, Bitcoin\u2019s \\$460 million disaster. Wired (2014). https:\/\/www.wired.com\/2014\/03\/bitcoin-exchange\/"},{"key":"10_CR39","doi-asserted-by":"crossref","unstructured":"Micali, S., Goldreich, O., Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth ACM Symposium on Theory of Computing, STOC, pp. 218\u2013229. ACM New York, NY, USA (1987)","DOI":"10.1145\/28395.28420"},{"key":"10_CR40","unstructured":"Milionis, J., Moallemi, C.C., Roughgarden, T.: Automated market making and arbitrage profits in the presence of fees. arXiv preprint arXiv:2305.14604 (2023)"},{"key":"10_CR41","unstructured":"Milionis, J., Moallemi, C.C., Roughgarden, T., Zhang, A.L.: Automated market making and loss-versus-rebalancing. arXiv preprint arXiv:2208.06046 (2022)"},{"key":"10_CR42","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review (2008)"},{"issue":"3","key":"10_CR43","doi-asserted-by":"publisher","first-page":"4","DOI":"10.3905\/jpm.1988.409150","volume":"14","author":"AF Perold","year":"1988","unstructured":"Perold, A.F.: The implementation shortfall: paper versus reality. J. Portf. Manag. 14(3), 4 (1988)","journal-title":"J. Portf. Manag."},{"key":"10_CR44","doi-asserted-by":"crossref","unstructured":"Qin, K., Zhou, L., Gervais, A.: Quantifying blockchain extractable value: how dark is the forest? In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 198\u2013214. IEEE (2022)","DOI":"10.1109\/SP46214.2022.9833734"},{"key":"10_CR45","doi-asserted-by":"crossref","unstructured":"Qin, K., Zhou, L., Livshits, B., Gervais, A.: Attacking the defi ecosystem with flash loans for fun and profit. In: International conference on financial cryptography and data security, pp. 3\u201332. Springer (2021)","DOI":"10.1007\/978-3-662-64322-8_1"},{"key":"10_CR46","unstructured":"Rabin, M.O.: Digitalized signatures and public-key functions as intractable as factorization (1979)"},{"key":"10_CR47","unstructured":"Torres, C.F., Camino, R., et\u00a0al.: Frontrunner jones and the raiders of the dark forest: an empirical study of frontrunning on the Ethereum blockchain. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 1343\u20131359 (2021)"},{"key":"10_CR48","unstructured":"Wahrst\u00e4tter, A., Zhou, L., Qin, K., Svetinovic, D., Gervais, A.: Time to bribe: measuring block construction market. arXiv preprint arXiv:2305.16468 (2023)"},{"key":"10_CR49","doi-asserted-by":"crossref","unstructured":"Wan, X., Adams, A.: Just-in-time liquidity on the Uniswap protocol (2022). https:\/\/blog.uniswap.org\/jit-liquidity","DOI":"10.2139\/ssrn.4382303"},{"key":"10_CR50","doi-asserted-by":"crossref","unstructured":"Weintraub, B., Torres, C.F., Nita-Rotaru, C., State, R.: A flash (bot) in the pan: measuring maximal extractable value in private pools. In: Proceedings of the 22nd ACM Internet Measurement Conference, pp. 458\u2013471 (2022)","DOI":"10.1145\/3517745.3561448"},{"key":"10_CR51","doi-asserted-by":"crossref","unstructured":"Xavier\u00a0Ferreira, M.V., Parkes, D.C.: Credible decentralized exchange design via verifiable sequencing rules. In: Proceedings of the 55th Annual ACM Symposium on Theory of Computing, pp. 723\u2013736 (2023)","DOI":"10.1145\/3564246.3585233"},{"key":"10_CR52","unstructured":"Yaffe-Bellany, D., Goldstein, M., Flitter, E.: Prosecutors say FTX was engaged in a massive, yearslong fraud. The New York Times (2022). https:\/\/www.nytimes.com\/2022\/12\/13\/business\/ftx-sam-bankman-fried-fraud-charges.html"},{"key":"10_CR53","doi-asserted-by":"crossref","unstructured":"Yao, A.C.C.: How to generate and exchange secrets. In: 27th Annual Symposium on Foundations of Computer Science (SFCS 1986), pp. 162\u2013167. IEEE (1986)","DOI":"10.1109\/SFCS.1986.25"},{"key":"10_CR54","unstructured":"Zhang, Y., Setty, S., Chen, Q., Zhou, L., Alvisi, L.: Byzantine ordered consensus without byzantine oligarchy. In: 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20), pp. 633\u2013649 (2020)"},{"key":"10_CR55","doi-asserted-by":"crossref","unstructured":"Zhou, L., Qin, K., Torres, C.F., Le, D.V., Gervais, A.: High-frequency trading on decentralized on-chain exchanges. In: 2021 IEEE Symposium on Security and Privacy (SP), pp. 428\u2013445. IEEE (2021)","DOI":"10.1109\/SP40001.2021.00027"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78676-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:51:54Z","timestamp":1740120714000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78676-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031786754","9783031786761"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78676-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"22 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Willemstad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cura\u00e7ao","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc24.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}