{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:32:36Z","timestamp":1757626356257,"version":"3.44.0"},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T00:00:00Z","timestamp":1756080000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"},{"start":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T00:00:00Z","timestamp":1756080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0"}],"funder":[{"name":"the Fundamental Research Funds for Heilongjiang Universities","award":["2022-KYYWF-1042"],"award-info":[{"award-number":["2022-KYYWF-1042"]}]},{"name":"the Key Entrusted Projects for Higher Education Teaching Reform in Heilongjiang Province","award":["SJGZ20220050"],"award-info":[{"award-number":["SJGZ20220050"]}]},{"name":"the Open Foundation of State Key Laboratory of Public Big Data","award":["PBD2022-16"],"award-info":[{"award-number":["PBD2022-16"]}]},{"name":"Double First-Class Project for Collab- orative Innovation Achievements in Disciplines Construction in Heilongjiang Province","award":["LJGXCG2022-054"],"award-info":[{"award-number":["LJGXCG2022-054"]}]},{"DOI":"10.13039\/501100005046","name":"Heilongjiang Provincial Natural Science Foundation of China","doi-asserted-by":"crossref","award":["PL2024F031"],"award-info":[{"award-number":["PL2024F031"]}],"id":[{"id":"10.13039\/501100005046","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Research Funds for Universities and Colleges in Heilongjiang Province","award":["2023-KYYWF-1467"],"award-info":[{"award-number":["2023-KYYWF-1467"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Discov Computing"],"DOI":"10.1007\/s10791-025-09694-z","type":"journal-article","created":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T07:28:44Z","timestamp":1756106924000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design and implementation of a real-time detection system for multi-token sandwich attacks in Ethereum based on Geth client"],"prefix":"10.1007","volume":"28","author":[{"given":"Jinyu","family":"Bai","sequence":"first","affiliation":[]},{"given":"Dongze","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhenxuan","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Gang","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,25]]},"reference":[{"key":"9694_CR1","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G. Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper. 2014;151:1\u201332.","journal-title":"Ethereum Project Yellow Paper"},{"key":"9694_CR2","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","volume":"105","author":"Z Zheng","year":"2020","unstructured":"Zheng Z, Xie S, Dai HN, et al. An overview on smart contracts: challenges, advances and platforms. Futur Gener Comput Syst. 2020;105:475\u201391. https:\/\/doi.org\/10.1016\/j.future.2019.12.019.","journal-title":"Futur Gener Comput Syst"},{"key":"9694_CR3","doi-asserted-by":"crossref","unstructured":"Pigaglio M, Kr\u00f3l M, Rivi\u00e9re E. Exploring Locality in Ethereum Transactions. In: 2023 5th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), IEEE, 2023; pp.\u00a01\u20138. https:\/\/ieeexplore.ieee.org\/document\/10317054","DOI":"10.1109\/BRAINS59668.2023.10317054"},{"issue":"11","key":"9694_CR4","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TSMC.2019.2895123","volume":"49","author":"S Wang","year":"2019","unstructured":"Wang S, Ouyang L, Yuan Y, et al. Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans Syst Man Cybern Syst. 2019;49(11):2266\u201377. https:\/\/doi.org\/10.1109\/TSMC.2019.2895123.","journal-title":"IEEE Trans Syst Man Cybern Syst"},{"issue":"1","key":"9694_CR5","doi-asserted-by":"publisher","DOI":"10.1016\/j.patter.2022.100633","volume":"4","author":"A De Vries","year":"2023","unstructured":"De Vries A. Cryptocurrencies on the road to sustainability: ethereum paving the way for bitcoin. Patterns. 2023;4(1): 100633. https:\/\/doi.org\/10.1016\/j.patter.2022.100633.","journal-title":"Patterns"},{"key":"9694_CR6","doi-asserted-by":"publisher","unstructured":"Misra A, Kshemkalyani AD. Towards Stronger Blockchains: Security Against Front-Running Attacks. In: International conference on networked systems. Cham: Springer Nature Switzerland, 2024; pp.\u00a0171\u2013187. https:\/\/doi.org\/10.1007\/978-3-031-67321-4_11","DOI":"10.1007\/978-3-031-67321-4_11"},{"key":"9694_CR7","unstructured":"McLaughlin R, Kruegel C, Vigna G. A Large Scale Study of the Ethereum Arbitrage Ecosystem. In: 32nd USENIX Security Symposium (USENIX Security 23), 2023. pp.\u00a03295\u20133312 . https:\/\/www.usenix.org\/conference\/usenixsecurity23\/presentation\/mclaughlin"},{"key":"9694_CR8","unstructured":"Otto J. Arbitraging Uniswap and SushiSwap in Node.js. 2020. https:\/\/messari.io\/article\/arbitraging-uniswap-and-sushiswap-in-node-js"},{"key":"9694_CR9","doi-asserted-by":"crossref","unstructured":"Wang D, Wu S, Lin Z, et al. Towards a First Step to Understand Flash Loan and Its Applications in DeFi Ecosystem. In: Proceedings of the Ninth International Workshop on Security in Blockchain and Cloud Computing, 2021; pp.\u00a023\u201328. https:\/\/arxiv.org\/abs\/2010.12252","DOI":"10.1145\/3457977.3460301"},{"key":"9694_CR10","doi-asserted-by":"crossref","unstructured":"Zhuang Y, Liu Z, Qian P, et al. Smart Contract Vulnerability Detection Using Graph Neural Networks. In: Proceedings of the Twenty-Ninth International Conference on International Joint Conferences on Artificial Intelligence,2021; pp.\u00a03283\u20133290 . https:\/\/www.ijcai.org\/Proceedings\/2020\/","DOI":"10.24963\/ijcai.2020\/454"},{"key":"9694_CR11","doi-asserted-by":"publisher","unstructured":"Xue Y, Fu J, Su S, et al. Preventing Price Manipulation Attack by Front-Running. In: International Conference on Artificial Intelligence and Security. Cham: Springer International Publishing, 2022; pp.\u00a0309\u2013322. https:\/\/doi.org\/10.1007\/978-3-031-06764-8_25","DOI":"10.1007\/978-3-031-06764-8_25"},{"key":"9694_CR12","doi-asserted-by":"crossref","unstructured":"Zhou L, Qin K, Torres CF, et al. High-Frequency Trading on Decentralized On-Chain Exchanges. In: 2021 IEEE Symposium on Security and Privacy (SP), IEEE. 2021; pp.\u00a0428\u2013445. https:\/\/ieeexplore.ieee.org\/abstract\/document\/9519421","DOI":"10.1109\/SP40001.2021.00027"},{"key":"9694_CR13","unstructured":"Daian P, Goldfeder S, Kell T, et al. Flash Boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges. 2019; arXiv preprint arXiv:1904.05234. https:\/\/arxiv.org\/abs\/1904.05234"},{"key":"9694_CR14","unstructured":"Torres CF, Camino R. Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain. In: 30th USENIX Security Symposium (USENIX Security 21), 2021;pp.\u00a01343\u20131359 . https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/torres"},{"key":"9694_CR15","doi-asserted-by":"crossref","unstructured":"Zhang W, Zhang Z, Shi Q, et al. Nyx: Detecting Exploitable Front-Running Vulnerabilities in Smart Contracts. In: 2024 IEEE Symposium on Security and Privacy (SP), IEEE. 2024; pp.\u00a0146\u2013146. https:\/\/ieeexplore.ieee.org\/abstract\/document\/10646603","DOI":"10.1109\/SP54263.2024.00146"},{"key":"9694_CR16","doi-asserted-by":"publisher","unstructured":"Eskandari S, Moosavi S, Clark J. SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain. In: Financial Cryptography and Data Security: FC 2019 International Workshops, VOTING and WTSC, St.\u00a0Kitts, St.\u00a0Kitts and Nevis, Feb 18\u201322, 2019, Revised Selected Papers 23. Cham: Springer International Publishing, 2020;pp.\u00a0170\u2013189. https:\/\/doi.org\/10.1007\/978-3-030-43725-1_13","DOI":"10.1007\/978-3-030-43725-1_13"},{"key":"9694_CR17","unstructured":"Z\u00fcst P, Nadahalli T, Wattenhofer, Y.W.R. Analyzing and Preventing Sandwich Attacks in Ethereum. ETH Z\u00fcrich, 2021; pp.\u00a01\u201329 . https:\/\/pub.tik.ee.ethz.ch\/students\/2021-FS\/BA-2021-07.pdf"},{"issue":"6","key":"9694_CR18","first-page":"3630","volume":"49","author":"W Zhang","year":"2023","unstructured":"Zhang W, Wei L, Cheung SC, et al. Combatting front-running in smart contracts: attack mining, benchmark construction and vulnerability detector evaluation. IEEE Trans Software Eng. 2023;49(6):3630\u201346.","journal-title":"IEEE Trans Software Eng"},{"key":"9694_CR19","doi-asserted-by":"crossref","unstructured":"Deng X, Zhao Z, Beillahi SM, et al. A Robust Front-Running Methodology for Malicious Flash-Loan DeFi Attacks. In: 2023 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), IEEE. 2023; pp.\u00a038\u201347. https:\/\/ieeexplore.ieee.org\/abstract\/document\/10237028","DOI":"10.1109\/DAPPS57946.2023.00015"},{"key":"9694_CR20","doi-asserted-by":"publisher","unstructured":"Zhang Y, Liu P, Wang G, et al. FRAD: Front-Running Attacks Detection on Ethereum Using Ternary Classification Model. In: International Conference on Ubiquitous Security. Singapore: Springer Nature Singapore, 2023; pp.\u00a063\u201375. https:\/\/doi.org\/10.1007\/978-981-97-1274-8_5","DOI":"10.1007\/978-981-97-1274-8_5"},{"key":"9694_CR21","doi-asserted-by":"publisher","first-page":"96014","DOI":"10.1109\/ACCESS.2023.3236891","volume":"11","author":"DM Doe","year":"2023","unstructured":"Doe DM, Li J, Dusit N, et al. Incentive mechanism design for mitigating frontrunning and transaction reordering in decentralized exchanges. IEEE Access. 2023;11:96014\u201328.","journal-title":"IEEE Access"},{"key":"9694_CR22","doi-asserted-by":"publisher","unstructured":"Heimbach L, Wattenhofer R. SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance. In: Proceedings of the 4th ACM Conference on Advances in Financial Technologies, 2022; pp.\u00a047\u201360. https:\/\/doi.org\/10.1145\/3558535.3559784","DOI":"10.1145\/3558535.3559784"},{"key":"9694_CR23","doi-asserted-by":"publisher","unstructured":"Wang J, Li J, Li Z, et al. n-MVTL Attack: Optimal Transaction Reordering Attack on DeFi. In: European Symposium on Research in Computer Security. Cham: Springer Nature Switzerland, 2023; pp.\u00a0367\u2013386. https:\/\/doi.org\/10.1007\/978-3-031-51479-1_19","DOI":"10.1007\/978-3-031-51479-1_19"},{"key":"9694_CR24","doi-asserted-by":"crossref","unstructured":"Liu Z, Li X, Peng H, et al. GasTrace: Detecting Sandwich Attack Malicious Accounts in Ethereum. 2024. arXiv preprint arXiv:2405.19971. https:\/\/arxiv.org\/abs\/2405.19971","DOI":"10.1109\/ICWS62655.2024.00181"},{"key":"9694_CR25","doi-asserted-by":"publisher","unstructured":"Xue Y, Fu J, Su S, et al. Preventing Price Manipulation Attack by Front-Running. In: International Conference on Artificial Intelligence and Security. Cham: Springer International Publishing, 2022; pp.\u00a0309\u2013322. https:\/\/doi.org\/10.1007\/978-3-031-06764-8_25","DOI":"10.1007\/978-3-031-06764-8_25"},{"issue":"1","key":"9694_CR26","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/s10791-024-09445-6","volume":"27","author":"D Li","year":"2024","unstructured":"Li D, Zhang K, Wang L, et al. A geth-based real-time detection system for sandwich attacks in ethereum. Discov Comput. 2024;27(1):11. https:\/\/doi.org\/10.1007\/s10791-024-09445-6.","journal-title":"Discov Comput"},{"key":"9694_CR27","doi-asserted-by":"publisher","unstructured":"Wang Y, Zuest P, Yao Y, et al. Impact and User Perception of Sandwich Attacks in the DeFi Ecosystem. In: Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems, 2022; pp.\u00a01\u201315. https:\/\/doi.org\/10.1145\/3491102.3517585","DOI":"10.1145\/3491102.3517585"}],"container-title":["Discover Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09694-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-025-09694-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-025-09694-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:10:45Z","timestamp":1757455845000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-025-09694-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,25]]},"references-count":27,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025,12]]}},"alternative-id":["9694"],"URL":"https:\/\/doi.org\/10.1007\/s10791-025-09694-z","relation":{},"ISSN":["2948-2992"],"issn-type":[{"type":"electronic","value":"2948-2992"}],"subject":[],"published":{"date-parts":[[2025,8,25]]},"assertion":[{"value":"1 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval and consent to participate"}},{"value":"Not applicable.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}},{"value":"The authors certify that they have NO affiliations with or involvement in any organization or entity with any financial or non-financial interest in the subject matter or materials discussed in this manuscript.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"180"}}