{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:16:58Z","timestamp":1773479818871,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":74,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,2]],"date-time":"2021-11-02T00:00:00Z","timestamp":1635811200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Research Council (ERC) Advanced Grant Foundations for Fair Social Computing, funded under the European Union's Horizon 2020 Framework Programme","award":["789373"],"award-info":[{"award-number":["789373"]}]},{"name":"MIAI @ Grenoble Alpes","award":["ANR-19-P3IA-0003"],"award-info":[{"award-number":["ANR-19-P3IA-0003"]}]},{"name":"French National Research Agency","award":["ANR-20-CE23-0007"],"award-info":[{"award-number":["ANR-20-CE23-0007"]}]},{"name":"NSF","award":["CNS-1900879 and CNS-1955227"],"award-info":[{"award-number":["CNS-1900879 and CNS-1955227"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,2]]},"DOI":"10.1145\/3487552.3487823","type":"proceedings-article","created":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T17:35:11Z","timestamp":1635788111000},"page":"320-335","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Selfish &amp; opaque transaction ordering in the Bitcoin blockchain"],"prefix":"10.1145","author":[{"given":"Johnnatan","family":"Messias","sequence":"first","affiliation":[{"name":"MPI-SWS, Germany"}]},{"given":"Mohamed","family":"Alzayat","sequence":"additional","affiliation":[{"name":"MPI-SWS, Germany"}]},{"given":"Balakrishnan","family":"Chandrasekaran","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Netherlands"}]},{"given":"Krishna P.","family":"Gummadi","sequence":"additional","affiliation":[{"name":"MPI-SWS, Germany"}]},{"given":"Patrick","family":"Loiseau","sequence":"additional","affiliation":[{"name":"Univ. Grenoble Alpes, France"}]},{"given":"Alan","family":"Mislove","sequence":"additional","affiliation":[{"name":"Northeastern University"}]}],"member":"320","published-online":{"date-parts":[[2021,11,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Andrew Hinkes and Joe Ciccolo. 2021. OFAC's Bitcoin Blacklist Could Change Crypto. https:\/\/www.coindesk.com\/goodbye-fungibility-ofacs-bitcoin-blacklist-remake-crypto\/."},{"key":"e_1_3_2_1_2_1","unstructured":"AntPool. 2021. Prioritize Transaction. https:\/\/www.antpool.com\/user\/prioritiseTransaction.htm."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2018.00016"},{"key":"e_1_3_2_1_4_1","volume-title":"Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft). CoRR abs\/1312.7013","author":"Bahack Lear","year":"2013","unstructured":"Lear Bahack. 2013. Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft). CoRR abs\/1312.7013 (2013). http:\/\/arxiv.org\/abs\/1312.7013"},{"key":"e_1_3_2_1_5_1","unstructured":"Leemon Baird. 2016. The swirlds hashgraph consensus algorithm: Fair fast byzantine fault tolerance. Technical Report SWIRLDS-TR-2016. Swirlds Inc."},{"key":"e_1_3_2_1_6_1","volume-title":"Towards a Functional Fee Market for Cryptocurrencies. CoRR abs\/1901.06830","author":"Basu Soumya","year":"2019","unstructured":"Soumya Basu, David Easley, Maureen O'Hara, and Emin G\u00fcn Sirer. 2019. Towards a Functional Fee Market for Cryptocurrencies. CoRR abs\/1901.06830 (2019)."},{"key":"e_1_3_2_1_7_1","unstructured":"Bitcoin Wiki. 2019. getblocktemplate. https:\/\/en.bitcoin.it\/wiki\/Getblocktemplate."},{"key":"e_1_3_2_1_8_1","unstructured":"BitcoinAbuse. 2021. Recently Reported Addresses. https:\/\/www.bitcoinabuse.com\/reports."},{"key":"e_1_3_2_1_9_1","unstructured":"bitcoin.org. 2021. Bitcoin Core. https:\/\/bitcoin.org\/en\/bitcoin-core."},{"key":"e_1_3_2_1_10_1","unstructured":"Braiins. 2021. Stratum mining protocol V1. https:\/\/braiins.com\/stratum-v1."},{"key":"e_1_3_2_1_11_1","unstructured":"Braiins. 2021. Stratumminingprotocol V2. https:\/\/braiins.com\/stratum-v2."},{"key":"e_1_3_2_1_12_1","unstructured":"BTC.com. 2021. BTC.com Transaction Accelerator. https:\/\/pushtx.btc.com."},{"key":"e_1_3_2_1_13_1","unstructured":"BTC.com explorer. 2021. Bitcoin Block #0 (Genesis block). https:\/\/explorer.btc.com\/btc\/block\/0."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355470"},{"key":"e_1_3_2_1_16_1","unstructured":"Coin Dance. 2021. Bitcoin Nodes Summary. https:\/\/coin.dance\/nodes."},{"key":"e_1_3_2_1_17_1","unstructured":"Coinbase. 2021. What are miner fees and does Coinbase pay them? https:\/\/help.coinbase.com\/en\/coinbase\/trading-and-funding\/pricing-and-fees\/what-are-miner-fees-and-does-coinbase-pay-them.html."},{"key":"e_1_3_2_1_18_1","unstructured":"CoinMarketCap. 2021. Cryptocurrency Market Capitalizations: Top 100 Cryptocurrencies. https:\/\/coinmarketcap.com\/."},{"key":"e_1_3_2_1_19_1","unstructured":"CoinStaker. 2018. Bitcoin CPFP Experience---Bitcoin Child Pays for Parent. https:\/\/www.coinstaker.com\/bitcoin-cpfp\/."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"e_1_3_2_1_21_1","volume-title":"From Mining to Markets: The Evolution of Bitcoin Transaction Fees. SSRN","author":"Easley David","year":"2017","unstructured":"David Easley, Maureen O'Hara, and Soumya Basu. 2017. From Mining to Markets: The Evolution of Bitcoin Transaction Fees. SSRN (2017)."},{"key":"e_1_3_2_1_22_1","volume-title":"From mining to markets: The evolution of bitcoin transaction fees. Journal of Financial Economics","author":"Easley David","year":"2019","unstructured":"David Easley, Maureen O'Hara, and Soumya Basu. 2019. From mining to markets: The evolution of bitcoin transaction fees. Journal of Financial Economics (2019)."},{"key":"e_1_3_2_1_23_1","volume-title":"SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain","author":"Eskandari Shayan","unstructured":"Shayan Eskandari, Seyedehmahsa Moosavi, and Jeremy Clark. 2020. SoK: Transparent Dishonesty: Front-Running Attacks on Blockchain. In Financial Cryptography and Data Security, Andrea Bracciali, Jeremy Clark, Federico Pintore, Peter B. R\u00f8nne, and Massimiliano Sala (Eds.). Springer International Publishing, Cham, 170--189."},{"key":"e_1_3_2_1_24_1","unstructured":"Ethereum Foundation. 2021. Non-fungible tokens (NFT). https:\/\/ethereum.org\/en\/nft\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"e_1_3_2_1_26_1","unstructured":"F2Pool. 2021. Pushtx. https:\/\/www.f2pool.com\/pushtx."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329630"},{"key":"e_1_3_2_1_28_1","volume-title":"Statistical Methods for Research Workers","author":"Fisher R. A.","unstructured":"R. A. Fisher. 1992. Statistical Methods for Research Workers. Springer New York."},{"key":"e_1_3_2_1_29_1","volume-title":"Financial Cryptography and Data Security","author":"Gencer Adem Efe","year":"2018","unstructured":"Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, and Emin G\u00fcn Sirer. 2018. Decentralization in Bitcoin and Ethereum Networks. In Financial Cryptography and Data Security 2018."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329566"},{"key":"e_1_3_2_1_32_1","unstructured":"Jota Missias. 2021. Jota Missias. https:\/\/pt.wikipedia.org\/wiki\/Jota_Missias."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Aljosha Judmayer Alexei Zamyatin Nicholas Stifter Artemios G Voyiatzis and Edgar Weippl. 2017. Merged mining: Curse or cure? In Data Privacy Management Cryptocurrencies and Blockchain Technology.","DOI":"10.1007\/978-3-319-67816-0_18"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2976756"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56877-1_16"},{"key":"e_1_3_2_1_36_1","unstructured":"Olga Kharif. 2017. Cryptokitties Mania Overwhelms Ethereum Network's Processing. https:\/\/www.bloomberg.com\/news\/articles\/2017-12-04\/cryptokitties-quickly-becomes-most-widely-used-ethereum-app."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940773"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423263"},{"key":"e_1_3_2_1_39_1","volume-title":"Net Neutrality: Unexpected Solution to Blockchain Scaling. Queue (Feb.","author":"Kuzmanovic Aleksander","year":"2019","unstructured":"Aleksander Kuzmanovic. 2019. Net Neutrality: Unexpected Solution to Blockchain Scaling. Queue (Feb. 2019)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313454"},{"key":"e_1_3_2_1_41_1","unstructured":"Lee Mathews. 2017. How WannaCry Went From A Windows Bug To An International Incident. https:\/\/www.forbes.com\/sites\/leemathews\/2017\/05\/16\/wannacry-ransomware-ms17-010."},{"key":"e_1_3_2_1_42_1","volume-title":"FairLedger: A Fair Blockchain Protocol for Financial Institutions. In 23rd International Conference on Principles of Distributed Systems (OPODIS","author":"Lev-Ari Kfir","year":"2020","unstructured":"Kfir Lev-Ari, Alexander Spiegelman, Idit Keidar, and Dahlia Malkhi. 2020. FairLedger: A Fair Blockchain Protocol for Financial Institutions. In 23rd International Conference on Principles of Distributed Systems (OPODIS 2019). Schloss Dagstuhl-Leibniz-Zentrum f\u00fcr Informatik."},{"key":"e_1_3_2_1_43_1","volume-title":"Transaction Queuing Game in Bitcoin BlockChain. In 2018 IEEE Intelligent Vehicles Symposium (IV).","author":"Li Juanjuan","year":"2018","unstructured":"Juanjuan Li, Yong Yuan, Shuai Wang, and Fei-Yue Wang. 2018. Transaction Queuing Game in Bitcoin BlockChain. In 2018 IEEE Intelligent Vehicles Symposium (IV)."},{"key":"e_1_3_2_1_44_1","unstructured":"Eric Lombrozo Johnson Lau and Pieter Wuille. 2015. BIP-141: Segregated Witness (Consensus layer). https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0141.mediawiki."},{"key":"e_1_3_2_1_45_1","volume-title":"SmartPool: Practical Decentralized Pooled Mining. In 26th USENIX Security Symposium (USENIX Security 17)","author":"Luu Loi","year":"2017","unstructured":"Loi Luu, Yaron Velner, Jason Teutsch, and Prateek Saxena. 2017. SmartPool: Practical Decentralized Pooled Mining. In 26th USENIX Security Symposium (USENIX Security 17)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70972-7_20"},{"key":"e_1_3_2_1_47_1","unstructured":"Johnnatan Messias Mohamed Alzayat Balakrishnan Chandrasekaran Krishna P. Gummadi Patrick Loiseau and Alan Mislove. 2021. Data sets and scripts used for analyzing \"norm\" violations in Bitcoin. https:\/\/github.com\/johnnatan-messias\/blockchain-transaction-ordering."},{"key":"e_1_3_2_1_48_1","volume-title":"The American Statistician","author":"Mosteller Frederick","year":"1948","unstructured":"Frederick Mosteller and Ronald Aylmer Fisher. 1948. Questions and Answers. The American Statistician (1948)."},{"key":"e_1_3_2_1_49_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_50_1","unstructured":"Nikhilesh De. 2021. US Treasury Blacklists Bitcoin Litecoin Addresses of Chinese 'Drug Kingpins'. https:\/\/www.coindesk.com\/markets\/2019\/08\/21\/us-treasury-blacklists-bitcoin-litecoin-addresses-of-chinese-drug-kingpins\/."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3391403.3399475"},{"key":"e_1_3_2_1_52_1","volume-title":"Enforcing Fairness in Blockchain Transaction Ordering. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).","author":"Orda Ariel","year":"2019","unstructured":"Ariel Orda and Ori Rottenstreich. 2019. Enforcing Fairness in Blockchain Transaction Ordering. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-56614-6_22"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"e_1_3_2_1_55_1","unstructured":"Paul R. La Monica. 2019. Bitcoin's march to $10 000 propelled by Facebook and the Fed. https:\/\/edition.cnn.com\/2019\/06\/21\/investing\/bitcoin-price-increase\/."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_24"},{"key":"e_1_3_2_1_57_1","volume-title":"Blockchain Technology: Principles and Applications. In Research handbook on digital transformations. Available at SSRN: https:\/\/ssrn.com\/abstract=2662660.","author":"Pilkington Marc","year":"2016","unstructured":"Marc Pilkington. 2016. Blockchain Technology: Principles and Applications. In Research handbook on digital transformations. Available at SSRN: https:\/\/ssrn.com\/abstract=2662660."},{"key":"e_1_3_2_1_58_1","unstructured":"Poolin. 2021. Transaction Accelerator. https:\/\/pushtx.com."},{"key":"e_1_3_2_1_59_1","volume-title":"Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit. In Financial Cryptography and Data Security (FC '21)","author":"Qin Kaihua","year":"2021","unstructured":"Kaihua Qin, Liyi Zhou, Benjamin Livshits, and Arthur Gervais. 2021. Attacking the DeFi Ecosystem with Flash Loans for Fun and Profit. In Financial Cryptography and Data Security (FC '21)."},{"key":"e_1_3_2_1_60_1","unstructured":"Matteo Romiti Aljosha Judmayer Alexei Zamyatin and Bernhard Haslhofer. 2019. A Deep Dive into Bitcoin Mining Pools: An Empirical Analysis of Mining Shares. (2019)."},{"key":"e_1_3_2_1_61_1","volume-title":"Proceedings of the 2021 ACM Conference on Economics and Computation (EC '21)","author":"Roughgarden Tim","year":"2021","unstructured":"Tim Roughgarden. 2021. Transaction Fee Mechanism Design for the Ethereum Blockchain: An Economic Analysis of EIP-1559. In Proceedings of the 2021 ACM Conference on Economics and Computation (EC '21)."},{"key":"e_1_3_2_1_62_1","volume-title":"Sanger","author":"Frenkel Sheera","year":"2020","unstructured":"Sheera Frenkel and Nathaniel Popper and Kate Conger and David E. Sanger. 2020. A Brazen Online Attack Targets V.I.P. Twitter Users in a Bitcoin Scam. https:\/\/www.nytimes.com\/2020\/07\/15\/technology\/twitter-hack-bill-gates-elon-musk.html."},{"key":"e_1_3_2_1_63_1","volume-title":"Mark Scott and Paul Mozur","author":"Frenkel Sheera","year":"2017","unstructured":"Sheera Frenkel, Mark Scott and Paul Mozur. 2017. Mystery of Motive for a Ransomware Attack: Money, Mayhem or a Message? https:\/\/www.nytimes.com\/2017\/06\/28\/business\/ramsonware-hackers-cybersecurity-petya-impact.html."},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS '20)","author":"Siddiqui Shoeb","year":"2020","unstructured":"Shoeb Siddiqui, Ganesh Vanahalli, and Sujit Gujar. 2020. BitcoinF: Achieving Fairness For Bitcoin In Transaction Fee Only Model. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems (AAMAS '20)."},{"key":"e_1_3_2_1_65_1","volume-title":"Secure High-Rate Transaction Processing in Bitcoin. In Financial Cryptography and Data Security (FC '15)","author":"Sompolinsky Yonatan","year":"2015","unstructured":"Yonatan Sompolinsky and Aviv Zohar. 2015. Secure High-Rate Transaction Processing in Bitcoin. In Financial Cryptography and Data Security (FC '15)."},{"key":"e_1_3_2_1_66_1","unstructured":"SparkPool. 2021. Taichi Network. https:\/\/taichi.network."},{"key":"e_1_3_2_1_67_1","volume-title":"Exclusive Mining of Blockchain Transactions. In Scientific Reports 2020-Conference proceedings of the Scientific Track of the Blockchain Autumn School","author":"Strehle Elias","year":"2020","unstructured":"Elias Strehle and Lennart Ante. 2020. Exclusive Mining of Blockchain Transactions. In Scientific Reports 2020-Conference proceedings of the Scientific Track of the Blockchain Autumn School 2020."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243737"},{"key":"e_1_3_2_1_69_1","unstructured":"Uniswap. 2021. Uniswap Decentralized Trading Protocol. https:\/\/uniswap.org."},{"key":"e_1_3_2_1_70_1","volume-title":"Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem. In Financial Cryptography and Data Security (FC '14)","author":"Vasek Marie","year":"2014","unstructured":"Marie Vasek, Micah Thornton, and Tyler Moore. 2014. Empirical Analysis of Denial-of-Service Attacks in the Bitcoin Ecosystem. In Financial Cryptography and Data Security (FC '14)."},{"key":"e_1_3_2_1_71_1","unstructured":"ViaBTC. 2021. Transaction Accelerator. https:\/\/www.viabtc.com\/tools\/txaccelerator\/."},{"key":"e_1_3_2_1_72_1","unstructured":"Whale Alert. 2021. Scam Alert - Cryptocurrency Crime Fighters. https:\/\/scam-alert.io."},{"key":"e_1_3_2_1_73_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper","author":"Gavin Wood","year":"2014","unstructured":"Gavin Wood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper (2014)."},{"key":"e_1_3_2_1_74_1","volume-title":"Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security. In 2019 IEEE Symposium on Security and Privacy (SP).","author":"Zhang Ren","year":"2019","unstructured":"Ren Zhang and Bart Preneel. 2019. Lay Down the Common Metrics: Evaluating Proof-of-Work Consensus Protocols' Security. In 2019 IEEE Symposium on Security and Privacy (SP)."}],"event":{"name":"IMC '21: ACM Internet Measurement Conference","location":"Virtual Event","acronym":"IMC '21","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 21st ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487823","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3487552.3487823","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487552.3487823","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487552.3487823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,15]],"date-time":"2025-12-15T17:22:52Z","timestamp":1765819372000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487552.3487823"}},"subtitle":["the case for chain neutrality"],"short-title":[],"issued":{"date-parts":[[2021,11,2]]},"references-count":74,"alternative-id":["10.1145\/3487552.3487823","10.1145\/3487552"],"URL":"https:\/\/doi.org\/10.1145\/3487552.3487823","relation":{},"subject":[],"published":{"date-parts":[[2021,11,2]]},"assertion":[{"value":"2021-11-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}