{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T21:04:25Z","timestamp":1772053465719,"version":"3.50.1"},"reference-count":50,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsac67867.2025.00086","type":"proceedings-article","created":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T20:54:58Z","timestamp":1771966498000},"page":"1065-1080","source":"Crossref","is-referenced-by-count":0,"title":["No Fish Is Too Big for Flash Boys! Frontrunning on DAG-Based Blockchains"],"prefix":"10.1109","author":[{"given":"Jianting","family":"Zhang","sequence":"first","affiliation":[{"name":"Purdue University"}]},{"given":"Aniket","family":"Kate","sequence":"additional","affiliation":[{"name":"Purdue University,Supra Research"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Defilama - defi overview","volume-title":"DeFiLlama","year":"2025"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43725-1_13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"ref4","first-page":"1343","article-title":"Frontrunner jones and the raiders of the dark forest: An empirical study of frontrunning on the ethereum blockchain","author":"Torres","year":"2021","journal-title":"USENIX Security"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/sp40001.2021.00027"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00113"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833734"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179435"},{"key":"ref9","first-page":"3295","article-title":"A large scale study of the ethereum arbitrage ecosystem","author":"McLaughlin","year":"2023","journal-title":"USENIX Security"},{"key":"ref10","first-page":"3961","article-title":"The blockchain imitation game","author":"Qin","year":"2023","journal-title":"USENIX Security"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00256"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3690259"},{"key":"ref13","article-title":"MEV - dashboard","volume-title":"libMEV","year":"2025"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616590"},{"key":"ref15","article-title":"Frontrunning attack in sharded blockchains and fair cross-shard consensus","author":"Zhang","year":"2024","journal-title":"NDSS"},{"issue":"2014","key":"ref16","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum project yellow paper"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3618257.3624824"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467905"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519594"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559361"},{"key":"ref21","article-title":"Shoal: Improving DAG-bft latency and robustness","author":"Spiegelman","year":"2023","journal-title":"arXiv preprint"},{"key":"ref22","article-title":"Mysticeti: Reaching the limits of latency with uncertified DAGs","author":"Babel","year":"2025","journal-title":"NDSS"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00021"},{"key":"ref24","article-title":"Bbca-chain: Onemessage, low latency bft consensus on a DAG","author":"Malkhi","year":"2023","journal-title":"arXiv preprint"},{"key":"ref25","article-title":"Cordial miners: Fast and efficient consensus for every eventuality","author":"Keidar","year":"2023","journal-title":"DISC"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670286"},{"key":"ref27","article-title":"Shoal++: High throughput DAG bft can be fast!","author":"Arun","year":"2024","journal-title":"arXiv preprint"},{"key":"ref28","article-title":"The sui blockchain","volume-title":"T. S. Team","year":"2025"},{"key":"ref29","article-title":"Sui blockchain defi","volume-title":"Suiscan","year":"2025"},{"key":"ref30","article-title":"Aptos networks","volume-title":"T. A. Team","year":"2025"},{"key":"ref31","article-title":"Celo networks","volume-title":"T. C. Team","year":"2025"},{"key":"ref32","article-title":"Bull shark: The partially synchronous version","author":"Spiegelman","year":"2022","journal-title":"arXiv preprint"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174999"},{"key":"ref34","first-page":"1757","article-title":"Your exploit is mine: instantly synthesizing counterattack smart contract","author":"Zhang","year":"2023","journal-title":"USENIX Security"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00146"},{"key":"ref36","article-title":"Backrunner: Mitigating smart contract attacks in the real world","author":"Shou","year":"2024","journal-title":"arXiv preprint"},{"key":"ref37","first-page":"633","article-title":"Byzantine ordered consensus without byzantine oligarchy","author":"Zhang","year":"2020","journal-title":"USENIX OSDI"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_16"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616658"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423263"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_15"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24693"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM52122.2024.10621379"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.14778\/3665844.3665861"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3494105.3526239"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3658644.3670367"},{"key":"ref47","article-title":"Sui blockchain explorer","volume-title":"Suiscan","year":"2025"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/csf64896.2025.00034"},{"key":"ref49","article-title":"Distributed randomness using weighted vrfs","author":"Das","year":"2024","journal-title":"Cryptology ePrint Archive"},{"key":"ref50","article-title":"The average gas fees on sui blockchain","volume-title":"Suiscan","year":"2025"}],"event":{"name":"2025 IEEE Annual Computer Security Applications Conference (ACSAC)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,12]]}},"container-title":["2025 IEEE Annual Computer Security Applications Conference (ACSAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11391636\/11391706\/11391998.pdf?arnumber=11391998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T20:53:51Z","timestamp":1772052831000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11391998\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":50,"URL":"https:\/\/doi.org\/10.1109\/acsac67867.2025.00086","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}