{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:17:26Z","timestamp":1750220246053,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,25]],"date-time":"2022-04-25T00:00:00Z","timestamp":1650844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,4,25]]},"DOI":"10.1145\/3487553.3524627","type":"proceedings-article","created":{"date-parts":[[2022,8,16]],"date-time":"2022-08-16T22:41:30Z","timestamp":1660689690000},"page":"467-477","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["How much is the fork? Fast Probability and Profitability Calculation during Temporary Forks"],"prefix":"10.1145","author":[{"given":"Aljosha","family":"Judmayer","sequence":"first","affiliation":[{"name":"University of Vienna, Austria and SBA Research, Australia"}]},{"given":"Nicholas","family":"Stifter","sequence":"additional","affiliation":[{"name":"University of Vienna, Austria and SBA Research, Austria"}]},{"given":"Philipp","family":"Schindler","sequence":"additional","affiliation":[{"name":"SBA Research, Austria and University of Vienna, Austria"}]},{"given":"Edgar","family":"Weippl","sequence":"additional","affiliation":[{"name":"University of Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2022,8,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 3rd Workshop on Bitcoin and Blockchain Research. http:\/\/fc16","author":"Bonneau Joseph","year":"2016","unstructured":"Joseph Bonneau . 2016 . Why buy when you can rent? Bribery attacks on Bitcoin consensus. In BITCOIN \u201916 : Proceedings of the 3rd Workshop on Bitcoin and Blockchain Research. http:\/\/fc16 .ifca.ai\/bitcoin\/papers\/Bon16b.pdf Joseph Bonneau. 2016. Why buy when you can rent? Bribery attacks on Bitcoin consensus. In BITCOIN \u201916: Proceedings of the 3rd Workshop on Bitcoin and Blockchain Research. http:\/\/fc16.ifca.ai\/bitcoin\/papers\/Bon16b.pdf"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"e_1_3_2_1_3_1","unstructured":"Shayan Eskandari Seyedehmahsa Moosavi and Jeremy Clark. 2019. SoK: Transparent Dishonesty: front-running attacks on Blockchain. In arXiv preprint arXiv:1902.05164. https:\/\/arxiv.org\/pdf\/1902.05164.pdf  Shayan Eskandari Seyedehmahsa Moosavi and Jeremy Clark. 2019. SoK: Transparent Dishonesty: front-running attacks on Blockchain. In arXiv preprint arXiv:1902.05164. https:\/\/arxiv.org\/pdf\/1902.05164.pdf"},{"volume-title":"Financial Cryptography and Data Security","author":"Eyal Ittay","key":"e_1_3_2_1_4_1","unstructured":"Ittay Eyal and Emin\u00a0G\u00fcn Sirer . 2014. Majority is not enough: Bitcoin mining is vulnerable . In Financial Cryptography and Data Security . Springer , 436\u2013454. http:\/\/arxiv.org\/pdf\/1311.0243 Ittay Eyal and Emin\u00a0G\u00fcn Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security. Springer, 436\u2013454. http:\/\/arxiv.org\/pdf\/1311.0243"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_17"},{"key":"e_1_3_2_1_9_1","volume-title":"Smart Contracts for Bribing Miners. In 5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer. http:\/\/fc18","author":"McCorry Patrick","year":"2018","unstructured":"Patrick McCorry , Alexander Hicks , and Sarah Meiklejohn . 2018 . Smart Contracts for Bribing Miners. In 5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer. http:\/\/fc18 .ifca.ai\/bitcoin\/papers\/bitcoin18-final14.pdf Patrick McCorry, Alexander Hicks, and Sarah Meiklejohn. 2018. Smart Contracts for Bribing Miners. In 5th Workshop on Bitcoin and Blockchain Research, Financial Cryptography and Data Security 18 (FC). Springer. http:\/\/fc18.ifca.ai\/bitcoin\/papers\/bitcoin18-final14.pdf"},{"key":"e_1_3_2_1_10_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2016.32"},{"key":"e_1_3_2_1_12_1","unstructured":"Kaihua Qin Liyi Zhou and Arthur Gervais. 2021. Quantifying Blockchain Extractable Value: How dark is the forest?arXiv preprint arXiv:2101.05511(2021). https:\/\/arxiv.org\/pdf\/2101.05511  Kaihua Qin Liyi Zhou and Arthur Gervais. 2021. Quantifying Blockchain Extractable Value: How dark is the forest?arXiv preprint arXiv:2101.05511(2021). https:\/\/arxiv.org\/pdf\/2101.05511"},{"key":"e_1_3_2_1_13_1","unstructured":"M. Rosenfeld. 2014. Analysis of Hashrate-Based Double Spending. Vol.\u00a0abs\/1402.2009. https:\/\/arxiv.org\/pdf\/1402.2009.pdf Publication Title: CoRR.  M. Rosenfeld. 2014. Analysis of Hashrate-Based Double Spending. Vol.\u00a0abs\/1402.2009. https:\/\/arxiv.org\/pdf\/1402.2009.pdf Publication Title: CoRR."},{"key":"e_1_3_2_1_14_1","volume-title":"International Conference on Financial Cryptography and Data Security. Springer, 515\u2013532","author":"Sapirshtein Ayelet","year":"2016","unstructured":"Ayelet Sapirshtein , Yonatan Sompolinsky , and Aviv Zohar . 2016 . Optimal selfish mining strategies in bitcoin . In International Conference on Financial Cryptography and Data Security. Springer, 515\u2013532 . https:\/\/fc16.ifca.ai\/preproceedings\/30_Sapirshtein.pdf Ayelet Sapirshtein, Yonatan Sompolinsky, and Aviv Zohar. 2016. Optimal selfish mining strategies in bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 515\u2013532. https:\/\/fc16.ifca.ai\/preproceedings\/30_Sapirshtein.pdf"},{"key":"e_1_3_2_1_15_1","volume-title":"Financial Cryptography and Data Security (FC","author":"Teutsch Jason","year":"2016","unstructured":"Jason Teutsch , Sanjay Jain , and Prateek Saxena . 2016. When cryptocurrencies mine their own business . In Financial Cryptography and Data Security (FC 2016 ). https:\/\/www.comp.nus.edu.sg\/ prateeks\/papers\/38Attack.pdf Jason Teutsch, Sanjay Jain, and Prateek Saxena. 2016. When cryptocurrencies mine their own business. In Financial Cryptography and Data Security (FC 2016). https:\/\/www.comp.nus.edu.sg\/ prateeks\/papers\/38Attack.pdf"},{"key":"e_1_3_2_1_16_1","unstructured":"Christof\u00a0Ferreira Torres Antonio\u00a0Ken Iannillo Arthur Gervais and Radu State. 2021. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts. https:\/\/arxiv.org\/pdf\/2101.06204 _eprint: 2101.06204.  Christof\u00a0Ferreira Torres Antonio\u00a0Ken Iannillo Arthur Gervais and Radu State. 2021. The Eye of Horus: Spotting and Analyzing Attacks on Ethereum Smart Contracts. https:\/\/arxiv.org\/pdf\/2101.06204 _eprint: 2101.06204."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Liyi Zhou Kaihua Qin Antoine Cully Benjamin Livshits and Arthur Gervais. 2021. On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols. https:\/\/arxiv.org\/pdf\/2103.02228 _eprint: 2103.02228.  Liyi Zhou Kaihua Qin Antoine Cully Benjamin Livshits and Arthur Gervais. 2021. On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols. https:\/\/arxiv.org\/pdf\/2103.02228 _eprint: 2103.02228.","DOI":"10.1109\/SP40001.2021.00113"},{"key":"e_1_3_2_1_19_1","volume-title":"A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges. arXiv:2106.07371 [cs] (June","author":"Zhou Liyi","year":"2021","unstructured":"Liyi Zhou , Kaihua Qin , and Arthur Gervais . 2021. A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges. arXiv:2106.07371 [cs] (June 2021 ). http:\/\/arxiv.org\/abs\/2106.07371 arXiv:2106.07371. Liyi Zhou, Kaihua Qin, and Arthur Gervais. 2021. A2MM: Mitigating Frontrunning, Transaction Reordering and Consensus Instability in Decentralized Exchanges. arXiv:2106.07371 [cs] (June 2021). http:\/\/arxiv.org\/abs\/2106.07371 arXiv:2106.07371."},{"key":"e_1_3_2_1_20_1","unstructured":"Liyi Zhou Kaihua Qin Christof\u00a0Ferreira Torres Duc\u00a0V. Le and Arthur Gervais. 2020. High-Frequency Trading on Decentralized On-Chain Exchanges. arXiv preprint arXiv:2009.14021(2020). https:\/\/arxiv.org\/pdf\/2009.14021.pdf  Liyi Zhou Kaihua Qin Christof\u00a0Ferreira Torres Duc\u00a0V. Le and Arthur Gervais. 2020. High-Frequency Trading on Decentralized On-Chain Exchanges. arXiv preprint arXiv:2009.14021(2020). https:\/\/arxiv.org\/pdf\/2009.14021.pdf"}],"event":{"name":"WWW '22: The ACM Web Conference 2022","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Virtual Event, Lyon France","acronym":"WWW '22"},"container-title":["Companion Proceedings of the Web Conference 2022"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487553.3524627","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3487553.3524627","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:34Z","timestamp":1750188634000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3487553.3524627"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,25]]},"references-count":17,"alternative-id":["10.1145\/3487553.3524627","10.1145\/3487553"],"URL":"https:\/\/doi.org\/10.1145\/3487553.3524627","relation":{},"subject":[],"published":{"date-parts":[[2022,4,25]]},"assertion":[{"value":"2022-08-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}