{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:17:02Z","timestamp":1773479822965,"version":"3.50.1"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032070340","type":"print"},{"value":"9783032070357","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07035-7_14","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T00:53:24Z","timestamp":1767315204000},"page":"225-242","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Theoretical Basis for\u00a0MEV"],"prefix":"10.1007","author":[{"given":"Massimo","family":"Bartoletti","sequence":"first","affiliation":[]},{"given":"Roberto","family":"Zunino","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"14_CR1","unstructured":"MEV-explore: Flashbots transparency dashboard. https:\/\/explore.flashbots.net\/. Accessed 11 Oct 2024"},{"key":"14_CR2","unstructured":"Understanding the DAO attack (2016). http:\/\/www.coindesk.com\/understanding-dao-hack-journalists\/"},{"key":"14_CR3","doi-asserted-by":"publisher","unstructured":"Babel, K., Daian, P., Kelkar, M., Juels, A.: Clockwork finance: automated analysis of economic security in smart contracts. In: IEEE Symposium on Security and Privacy, pp. 622\u2013639. IEEE Computer Society (2023). https:\/\/doi.org\/10.1109\/SP46215.2023.00036","DOI":"10.1109\/SP46215.2023.00036"},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Babel, K., Javaheripi, M., Ji, Y., Kelkar, M., Koushanfar, F., Juels, A.: Lanturn: measuring economic security of smart contracts through adaptive learning. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 1212\u20131226. ACM (2023). https:\/\/doi.org\/10.1145\/3576915.3623204","DOI":"10.1145\/3576915.3623204"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"Babel, K., et al.: PROF: protected order flow in a profit-seeking world. CoRR arxiv:2408.02303 (2024). https:\/\/doi.org\/10.48550\/ARXIV.2408.02303","DOI":"10.48550\/ARXIV.2408.02303"},{"key":"14_CR6","doi-asserted-by":"publisher","unstructured":"Barczentewicz, M.: MEV on ethereum: a policy analysis (2023). https:\/\/doi.org\/10.2139\/ssrn.4332703","DOI":"10.2139\/ssrn.4332703"},{"key":"14_CR7","doi-asserted-by":"publisher","unstructured":"Bartoletti, M., Chiang, J.H., Lluch-Lafuente, A.: Maximizing extractable value from automated market makers. In: Financial Cryptography. LNCS, vol. 13411, pp. 3\u201319. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-18283-9_1","DOI":"10.1007\/978-3-031-18283-9_1"},{"key":"14_CR8","doi-asserted-by":"publisher","unstructured":"Bartoletti, M., Marchesin, R., Zunino, R.: DeFi composability as MEV non-interference. In: Financial Cryptography. LNCS, vol. 14744. Springer, Heidelberg (2024). https:\/\/doi.org\/10.1007\/978-3-031-78679-2_20","DOI":"10.1007\/978-3-031-78679-2_20"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Bartoletti, M., Zunino, R.: A theoretical basis for MEV. CoRR arxiv:2302.02154 (2023). https:\/\/doi.org\/10.48550\/ARXIV.2302.02154","DOI":"10.48550\/ARXIV.2302.02154"},{"key":"14_CR10","unstructured":"Baum, C., yu\u00a0Chiang, J.H., David, B., Frederiksen, T.K., Gentile, L.: SoK: mitigation of front-running in decentralized finance. Cryptology ePrint Archive, Report 2021\/1628 (2021). https:\/\/ia.cr\/2021\/1628"},{"key":"14_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-030-78372-3_7","volume-title":"Applied Cryptography and Network Security","author":"C Baum","year":"2021","unstructured":"Baum, C., David, B., Frederiksen, T.K.: P2DEX: privacy-preserving decentralized cryptocurrency exchange. In: Sako, K., Tippenhauer, N.O. (eds.) ACNS 2021. LNCS, vol. 12726, pp. 163\u2013194. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-78372-3_7"},{"key":"14_CR12","unstructured":"Breidenbach, L., Daian, P., Tram\u00e8r, F., Juels, A.: Enter the hydra: towards principled bug bounties and exploit-resistant smart contracts. In: USENIX Security Symposium, pp. 1335\u20131352. USENIX Association (2019)"},{"issue":"7","key":"14_CR13","doi-asserted-by":"publisher","first-page":"4429","DOI":"10.1287\/MNSC.2023.01239","volume":"70","author":"A Canidio","year":"2024","unstructured":"Canidio, A., Danos, V.: Commitment against front-running attacks. Manag. Sci. 70(7), 4429\u20134440 (2024). https:\/\/doi.org\/10.1287\/MNSC.2023.01239","journal-title":"Manag. Sci."},{"key":"14_CR14","unstructured":"Chiplunkar, A., Gosselin, S.: A new game in town (2023). https:\/\/frontier.tech\/a-new-game-in-town"},{"key":"14_CR15","doi-asserted-by":"publisher","unstructured":"Ciampi, M., Ishaq, M., Magdon-Ismail, M., Ostrovsky, R., Zikas, V.: Fairmm: a fast and frontrunning-resistant crypto market-maker. In: Cyber Security, Cryptology, and Machine Learning (CSCML). LNCS, vol. 13301, pp. 428\u2013446. Springer, Heidelberg (2022). https:\/\/doi.org\/10.1007\/978-3-031-07689-3_31","DOI":"10.1007\/978-3-031-07689-3_31"},{"key":"14_CR16","doi-asserted-by":"publisher","unstructured":"Daian, P., et al.: Flash boys 2.0: frontrunning in decentralized exchanges, miner extractable value, and consensus instability. In: IEEE Symposium on Security and Privacy, pp. 910\u2013927. IEEE (2020).https:\/\/doi.org\/10.1109\/SP40000.2020.00040","DOI":"10.1109\/SP40000.2020.00040"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-030-43725-1_13","volume-title":"Financial Cryptography and Data Security","author":"S Eskandari","year":"2020","unstructured":"Eskandari, S., Moosavi, S., Clark, J.: SoK: transparent dishonesty: front-running attacks on blockchain. In: Bracciali, A., Clark, J., Pintore, F., R\u00f8nne, P.B., Sala, M. (eds.) FC 2019. LNCS, vol. 11599, pp. 170\u2013189. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-43725-1_13"},{"key":"14_CR18","unstructured":"Flashbots: Develop an MEV taxonomy (2021). https:\/\/github.com\/flashbots\/mev-research\/issues\/24"},{"key":"14_CR19","doi-asserted-by":"publisher","unstructured":"Gupta, T., Pai, M.M., Resnick, M.: The centralizing effects of private order flow on proposer-builder separation. In: Advances in Financial Technologies (AFT). LIPIcs, vol.\u00a0282, pp. 20:1\u201320:15. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2023). https:\/\/doi.org\/10.4230\/LIPICS.AFT.2023.20","DOI":"10.4230\/LIPICS.AFT.2023.20"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Heimbach, L., Wattenhofer, R.: Sok: preventing transaction reordering manipulations in decentralized finance. In: Advances in Financial Technologies (2022)","DOI":"10.1145\/3558535.3559784"},{"key":"14_CR21","doi-asserted-by":"publisher","unstructured":"Ji, Y., Grimmelmann, J.: Regulatory implications of MEV mitigations. In: Financial Cryptography Workshops. LNCS, vol. 14746, pp. 335\u2013363. Springer, Heidelberg (2024). https:\/\/doi.org\/10.1007\/978-3-031-69231-4_21","DOI":"10.1007\/978-3-031-69231-4_21"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1007\/978-3-030-56877-1_16","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"M Kelkar","year":"2020","unstructured":"Kelkar, M., Zhang, F., Goldfeder, S., Juels, A.: Order-fairness for byzantine consensus. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12172, pp. 451\u2013480. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56877-1_16"},{"key":"14_CR23","doi-asserted-by":"publisher","unstructured":"Kulkarni, K., Diamandis, T., Chitra, T.: Towards a theory of Maximal Extractable Value I: constant function market makers. CoRR arxiv:2207.11835 (2022). https:\/\/doi.org\/10.48550\/arXiv.2207.11835","DOI":"10.48550\/arXiv.2207.11835"},{"key":"14_CR24","doi-asserted-by":"publisher","unstructured":"Li, Z., Pournaras, E.: Sok: Consensus for fair message ordering. CoRR arxiv:2411.09981 (2024). https:\/\/doi.org\/10.48550\/ARXIV.2411.09981","DOI":"10.48550\/ARXIV.2411.09981"},{"key":"14_CR25","doi-asserted-by":"publisher","unstructured":"Mazorra, B., Reynolds, M., Daza, V.: Price of MEV: towards a game theoretical approach to MEV. In: ACM CCS Workshop on Decentralized Finance and Security, pp. 15\u201322. ACM (2022). https:\/\/doi.org\/10.1145\/3560832.3563433","DOI":"10.1145\/3560832.3563433"},{"key":"14_CR26","unstructured":"Monoceros Venture: The MEV book: a comprehensive guide to Maximal Extractable Value (2024). https:\/\/www.monoceros.com\/insights\/maximal-extractable-value-book"},{"key":"14_CR27","doi-asserted-by":"publisher","unstructured":"\u00d6z, B., Sui, D., Thiery, T., Matthes, F.: Who wins Ethereum block building auctions and why? In: Advances in Financial Technologies (AFT). LIPIcs, vol.\u00a0316, pp. 22:1\u201322:25. Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik (2024). https:\/\/doi.org\/10.4230\/LIPICS.AFT.2024.22","DOI":"10.4230\/LIPICS.AFT.2024.22"},{"key":"14_CR28","doi-asserted-by":"publisher","unstructured":"Qin, K., Zhou, L., Gervais, A.: Quantifying blockchain extractable value: how dark is the forest? In: IEEE Symposium on Security and Privacy, pp. 198\u2013214. IEEE (2022). https:\/\/doi.org\/10.1109\/SP46214.2022.9833734","DOI":"10.1109\/SP46214.2022.9833734"},{"key":"14_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-662-64322-8_1","volume-title":"Financial Cryptography and Data Security","author":"K Qin","year":"2021","unstructured":"Qin, K., Zhou, L., Livshits, B., Gervais, A.: Attacking the DeFi ecosystem with flash loans for fun and profit. In: Borisov, N., Diaz, C. (eds.) FC 2021. LNCS, vol. 12674, pp. 3\u201332. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-64322-8_1"},{"key":"14_CR30","doi-asserted-by":"publisher","unstructured":"Raikwar, M., Polyanskii, N., M\u00fcller, S.: Fairness notions in DAG-based DLTs, pp.\u00a01\u20138. IEEE (2023). https:\/\/doi.org\/10.1109\/BRAINS59668.2023.10316937","DOI":"10.1109\/BRAINS59668.2023.10316937"},{"key":"14_CR31","unstructured":"Salles, A.: On the formalization of MEV (2021). https:\/\/writings.flashbots.net\/research\/formalization-mev"},{"key":"14_CR32","unstructured":"Torres, C.F., Camino, R., State, R.: Frontrunner jones and the raiders of the dark forest: an empirical study of frontrunning on the ethereum blockchain. In: USENIX Security Symposium, pp. 1343\u20131359 (2021)"},{"key":"14_CR33","doi-asserted-by":"publisher","unstructured":"Torres, C.F., Mamuti, A., Weintraub, B., Nita-Rotaru, C., Shinde, S.: Rolling in the shadows: analyzing the extraction of MEV across layer-2 rollups. In: ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 2591\u20132605. ACM (2024). https:\/\/doi.org\/10.1145\/3658644.3690259","DOI":"10.1145\/3658644.3690259"},{"key":"14_CR34","doi-asserted-by":"publisher","unstructured":"Wahrst\u00e4tter, A., Zhou, L., Qin, K., Svetinovic, D., Gervais, A.: Time to bribe: measuring block construction market. CoRR arxiv:2305.16468 (2023). https:\/\/doi.org\/10.48550\/ARXIV.2305.16468","DOI":"10.48550\/ARXIV.2305.16468"},{"key":"14_CR35","doi-asserted-by":"publisher","unstructured":"Weintraub, B., Torres, C.F., Nita-Rotaru, C., State, R.: A Flash(Bot) in the pan: measuring maximal extractable value in private pools. In: ACM Internet Measurement Conference, pp. 458\u2013471. ACM (2022). https:\/\/doi.org\/10.1145\/3517745.3561448","DOI":"10.1145\/3517745.3561448"},{"key":"14_CR36","doi-asserted-by":"publisher","unstructured":"Werner, S., Perez, D., Gudgeon, L., Klages-Mundt, A., Harz, D., Knottenbelt, W.J.: SoK: decentralized finance (DeFi). In: ACM Conference on Advances in Financial Technologies, (AFT), pp. 30\u201346. ACM (2022). https:\/\/doi.org\/10.1145\/3558535.3559780","DOI":"10.1145\/3558535.3559780"},{"key":"14_CR37","doi-asserted-by":"publisher","unstructured":"Zhou, L., Qin, K., Cully, A., Livshits, B., Gervais, A.: On the just-in-time discovery of profit-generating transactions in DeFi protocols. In: IEEE Symposium on Security and Privacy, pp. 919\u2013936. IEEE (2021). https:\/\/doi.org\/10.1109\/SP40001.2021.00113","DOI":"10.1109\/SP40001.2021.00113"},{"key":"14_CR38","doi-asserted-by":"publisher","unstructured":"Zhou, L., Qin, K., Torres, C.F., Le, D.V., Gervais, A.: High-frequency trading on decentralized on-chain exchanges. In: IEEE Symposium on Security and Privacy, pp. 428\u2013445. IEEE (2021). https:\/\/doi.org\/10.1109\/SP40001.2021.00027","DOI":"10.1109\/SP40001.2021.00027"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07035-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T00:53:26Z","timestamp":1767315206000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07035-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032070340","9783032070357"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07035-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Miyakojima","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc25.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}