{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T13:06:47Z","timestamp":1775912807524,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":99,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,15]],"date-time":"2023-11-15T00:00:00Z","timestamp":1700006400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 62202405"],"award-info":[{"award-number":["No. 62202405"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Hong Kong RGC Projects","award":["No. PolyU15219319, PolyU15222320, PolyU15224121"],"award-info":[{"award-number":["No. PolyU15219319, PolyU15222320, PolyU15224121"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3616590","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"165-179","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["Demystifying DeFi MEV Activities in Flashbots Bundle"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4382-577X","authenticated-orcid":false,"given":"Zihao","family":"Li","sequence":"first","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3453-0195","authenticated-orcid":false,"given":"Jianfeng","family":"Li","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2131-1046","authenticated-orcid":false,"given":"Zheyuan","family":"He","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9082-3208","authenticated-orcid":false,"given":"Xiapu","family":"Luo","sequence":"additional","affiliation":[{"name":"The Hong Kong Polytechnic University, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4927-5833","authenticated-orcid":false,"given":"Ting","family":"Wang","sequence":"additional","affiliation":[{"name":"Pennsylvania State University, University Park, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9039-1384","authenticated-orcid":false,"given":"Xiaoze","family":"Ni","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-6837-1393","authenticated-orcid":false,"given":"Wenwu","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-5434-9880","authenticated-orcid":false,"given":"Xi","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9165-8331","authenticated-orcid":false,"given":"Ting","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China, Chengdu, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2013. EVM RPC APIs. https:\/\/geth.ethereum.org\/docs\/rpc\/ns-debug."},{"key":"e_1_3_2_1_2_1","unstructured":"2015. Etherscan. https:\/\/etherscan.io."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. Ampleforth Token. https:\/\/www.ampleforth.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2018. chiru-labs ERC721. https:\/\/github.com\/chiru-labs\/ERC721A."},{"key":"e_1_3_2_1_5_1","unstructured":"2018. ERC721. https:\/\/github.com\/OpenZeppelin\/openzeppelin-contracts."},{"key":"e_1_3_2_1_6_1","unstructured":"2019. Compound. https:\/\/compound.finance\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2019. Ethereum Dapps Ranking. https:\/\/www.dapp.com."},{"key":"e_1_3_2_1_8_1","unstructured":"2019. The Maker Foundation. https:\/\/makerdao.com\/en\/."},{"key":"e_1_3_2_1_9_1","unstructured":"2020. Aave Protocol. https:\/\/homora-v2.alphafinance.io\/."},{"key":"e_1_3_2_1_10_1","unstructured":"2020. DefiLlama. https:\/\/defillama.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"2021. Bloxroute relay. https:\/\/docs.bloxroute.com\/apis\/mev-solution."},{"key":"e_1_3_2_1_12_1","unstructured":"2021. DeFiPulse. https:\/\/www.defipulse.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"2021. Eden relay. https:\/\/relay.edennetwork.io\/info."},{"key":"e_1_3_2_1_14_1","unstructured":"2021. EthTx. https:\/\/github.com\/EthTx\/ethtx."},{"key":"e_1_3_2_1_15_1","unstructured":"2021. Flashbots API. https:\/\/blocks.flashbots.net\/."},{"key":"e_1_3_2_1_16_1","unstructured":"2021. Flashbots Bundle. https:\/\/docs.flashbots.net."},{"key":"e_1_3_2_1_17_1","unstructured":"2021. MEV-Explore. https:\/\/explore.flashbots.net\/."},{"key":"e_1_3_2_1_18_1","unstructured":"2021. mev-inspect. https:\/\/github.com\/flashbots\/mev-inspect-py."},{"key":"e_1_3_2_1_19_1","unstructured":"2021. Multi-layered Burger Arbitrage. twitter.com\/bertcmiller\/...."},{"key":"e_1_3_2_1_20_1","unstructured":"2021. One FN transaction of Etherscan. 0x9a7c52f6...e57d9400."},{"key":"e_1_3_2_1_21_1","unstructured":"2022. Ethereum Merge. https:\/\/ethereum.org\/en\/upgrades\/merge\/."},{"key":"e_1_3_2_1_22_1","unstructured":"2022. flashbots mevboost dashboard. https:\/\/boost-relay.flashbots.net\/."},{"key":"e_1_3_2_1_23_1","unstructured":"2022. MEV relay list. https:\/\/github.com\/eth-educators\/ethstaker-guides."},{"key":"e_1_3_2_1_24_1","unstructured":"2022. mevboost. https:\/\/boost.flashbots.net\/."},{"key":"e_1_3_2_1_25_1","unstructured":"2022. mevboost dashboard. https:\/\/dune.com\/ChainsightAnalytics."},{"key":"e_1_3_2_1_26_1","unstructured":"2022. Solidity document. https:\/\/docs.soliditylang.org\/en\/latest."},{"key":"e_1_3_2_1_27_1","unstructured":"2023. MEVBlocker. https:\/\/mevblocker.io\/."},{"key":"e_1_3_2_1_28_1","unstructured":"2023. Our full paper with the appendix. https:\/\/zzzihao-li.github.io\/."},{"key":"e_1_3_2_1_29_1","unstructured":"Hayden Adams Noah Zinsmeister and Dan Robinson. 2020. Uniswap v2 Core."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Kushal Babel Philip Daian Mahimna Kelkar and Ari Juels. 2023. Clockwork finance: Automated analysis of economic security in smart contracts. In SP.","DOI":"10.1109\/SP46215.2023.10179346"},{"key":"e_1_3_2_1_31_1","volume-title":"James Hsin-yu Chiang, and Alberto Lluch Lafuente","author":"Bartoletti Massimo","year":"2021","unstructured":"Massimo Bartoletti, James Hsin-yu Chiang, and Alberto Lluch Lafuente. 2021. SoK: lending pools in decentralized finance. In FC."},{"key":"e_1_3_2_1_32_1","volume-title":"James Hsin-yu Chiang, and Alberto Lluch-Lafuente","author":"Bartoletti Massimo","year":"2022","unstructured":"Massimo Bartoletti, James Hsin-yu Chiang, and Alberto Lluch-Lafuente. 2022. Maximizing Extractable Value from Automated Market Makers. FC (2022)."},{"key":"e_1_3_2_1_33_1","volume-title":"Bernardo David, Tore Kasper Frederiksen, and Lorenzo Gentile.","author":"Baum Carsten","year":"2021","unstructured":"Carsten Baum, James Hsin-yu Chiang, Bernardo David, Tore Kasper Frederiksen, and Lorenzo Gentile. 2021. SoK: Mitigation of Front-running in Decentralized Finance. ePrint (2021)."},{"key":"e_1_3_2_1_34_1","volume-title":"Representation learning: A review and new perspectives","author":"Bengio Yoshua","year":"2013","unstructured":"Yoshua Bengio, Aaron Courville, and Pascal Vincent. 2013. Representation learning: A review and new perspectives. IEEE TPAMI (2013)."},{"key":"e_1_3_2_1_35_1","unstructured":"Lorenz Breidenbach Phil Daian Florian Tram\u00e8r and Ari Juels. 2018. Enter the Hydra: Towards Principled Bug Bounties and {Exploit-Resistant} Smart Contracts. In USENIX Security."},{"key":"e_1_3_2_1_36_1","unstructured":"Ting Chen Zihao Li Xiapu Luo Xiaofeng Wang Ting Wang Zheyuan He Kezhao Fang Yufei Zhang Hang Zhu Hongwei Li et al. 2021. SigRec: Automatic Recovery of Function Signatures in Smart Contracts. IEEE TSE (2021)."},{"key":"e_1_3_2_1_37_1","volume-title":"Dataether: Data exploration framework for ethereum","author":"Chen Ting","year":"2019","unstructured":"Ting Chen, Zihao Li, Yufei Zhang, Xiapu Luo, Ang Chen, Kun Yang, Bin Hu, Tong Zhu, Shifang Deng, Teng Hu, et al. 2019. Dataether: Data exploration framework for ethereum. In IEEE ICDCS."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345664"},{"key":"e_1_3_2_1_39_1","volume-title":"Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability","author":"Daian Philip","unstructured":"Philip Daian, Steven Goldfeder, Tyler Kell, Yunqi Li, Xueyuan Zhao, Iddo Bentov, Lorenz Breidenbach, and Ari Juels. 2020. Flash boys 2.0: Frontrunning in decentralized exchanges, miner extractable value, and consensus instability. In IEEE SP."},{"key":"e_1_3_2_1_40_1","volume-title":"Ertem Nusret Tas, and David Tse","author":"D'Amato Francesco","year":"2022","unstructured":"Francesco D'Amato, Joachim Neu, Ertem Nusret Tas, and David Tse. 2022. No More Attacks on Proof-of-Stake Ethereum? arXiv (2022)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Chris Dannen. 2017. Introducing Ethereum and solidity.","DOI":"10.1007\/978-1-4842-2535-6"},{"key":"e_1_3_2_1_42_1","volume-title":"Understanding Security Issues in the NFT Ecosystem. arXiv","author":"Das Dipanjan","year":"2021","unstructured":"Dipanjan Das, Priyanka Bose, Nicola Ruaro, Christopher Kruegel, and Giovanni Vigna. 2021. Understanding Security Issues in the NFT Ecosystem. arXiv (2021)."},{"key":"e_1_3_2_1_43_1","volume-title":"Sok: Transparent dishonesty: front-running attacks on blockchain. In FC.","author":"Eskandari Shayan","year":"2019","unstructured":"Shayan Eskandari, Seyedehmahsa Moosavi, and Jeremy Clark. 2019. Sok: Transparent dishonesty: front-running attacks on blockchain. In FC."},{"key":"e_1_3_2_1_44_1","unstructured":"Vogelsteller Fabian and Buterin Vitalik. 2015. EIP-20: Token Standard. https: \/\/eips.ethereum.org\/EIPS\/eip-20."},{"key":"e_1_3_2_1_45_1","volume-title":"Multiscale granger causality. Physical Review E","author":"Faes Luca","year":"2017","unstructured":"Luca Faes, Giandomenico Nollo, Sebastiano Stramaglia, and Daniele Marinazzo. 2017. Multiscale granger causality. Physical Review E (2017)."},{"key":"e_1_3_2_1_46_1","unstructured":"Christof Ferreira Torres Ramiro Camino and Radu State. 2021. Frontrunner Jones and the Raiders of the Dark Forest: An Empirical Study of Frontrunning on the Ethereum Blockchain. In USENIX Security."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Michael Fr\u00f6wis Andreas Fuchs and Rainer B\u00f6hme. 2019. Detecting token systems on ethereum. In FC.","DOI":"10.1007\/978-3-030-32101-7_7"},{"key":"e_1_3_2_1_48_1","volume-title":"A survey on concept drift adaptation. ACM CSUR","author":"Gama Jo\u00e3o","year":"2014","unstructured":"Jo\u00e3o Gama, Albert Bifet, Mykola Pechenizkiy, and Abdelhamid Bouchachia. 2014. A survey on concept drift adaptation. ACM CSUR (2014)."},{"key":"e_1_3_2_1_49_1","volume-title":"Recent advances in convolutional neural networks. Pattern recognition","author":"Gu Jiuxiang","year":"2018","unstructured":"Jiuxiang Gu, Zhenhua Wang, Jason Kuen, Lianyang Ma, Amir Shahroudy, Bing Shuai, Ting Liu, Xingxing Wang, Gang Wang, Jianfei Cai, and Tsuhan Chen. 2018. Recent advances in convolutional neural networks. Pattern recognition (2018)."},{"key":"e_1_3_2_1_50_1","volume-title":"TokenAware: Accurate and efficient bookkeeping recognition for token smart contracts. TOSEM","author":"He Zheyuan","year":"2023","unstructured":"Zheyuan He, Shuwei Song, Yang Bai, Xiapu Luo, Ting Chen, Wensheng Zhang, Peng He, Hongwei Li, Xiaodong Lin, and Xiaosong Zhang. 2023. TokenAware: Accurate and efficient bookkeeping recognition for token smart contracts. TOSEM (2023)."},{"key":"e_1_3_2_1_51_1","volume-title":"Eliminating Sandwich Attacks with the Help of Game Theory. arXiv","author":"Heimbach Lioba","year":"2022","unstructured":"Lioba Heimbach and Roger Wattenhofer. 2022. Eliminating Sandwich Attacks with the Help of Game Theory. arXiv (2022)."},{"key":"e_1_3_2_1_52_1","volume-title":"SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance. arXiv","author":"Heimbach Lioba","year":"2022","unstructured":"Lioba Heimbach and Roger Wattenhofer. 2022. SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance. arXiv (2022)."},{"key":"e_1_3_2_1_53_1","volume-title":"Themis: Fast, Strong Order-Fairness in Byzantine Consensus. ePrint","author":"Kelkar Mahimna","year":"2021","unstructured":"Mahimna Kelkar, Soubhik Deb, Sishan Long, Ari Juels, and Sreeram Kannan. 2021. Themis: Fast, Strong Order-Fairness in Byzantine Consensus. ePrint (2021)."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Mahimna Kelkar Fan Zhang Steven Goldfeder and Ari Juels. 2020. Order-fairness for byzantine consensus. In CRYPTO.","DOI":"10.1007\/978-3-030-56877-1_16"},{"key":"e_1_3_2_1_55_1","volume-title":"Kappa testi. Journal of Mood Disorders","year":"2015","unstructured":"2015. Kappa testi. Journal of Mood Disorders (2015)."},{"key":"e_1_3_2_1_56_1","unstructured":"Klaus Krippendorff. 2011. Computing Krippendorff's alpha-reliability. (2011)."},{"key":"e_1_3_2_1_57_1","unstructured":"Shipeng Li Jingwei Li Yuxing Tang Xiapu Luo Zheyuan He Zihao Li Xi Cheng Yang Bai Ting Chen Yuzhe Tang et al. 2023. BlockExplorer: Exploring Blockchain Big Data via Parallel Processing. TC (2023)."},{"key":"e_1_3_2_1_58_1","unstructured":"LibSubmarine. 2019. Defeat Front-Running. https:\/\/libsubmarine.org\/."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00085"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Yulin Liu Yuxuan Lu Kartik Nayak Fan Zhang Luyao Zhang and Yinhong Zhao. 2022. Empirical analysis of eip-1559: Transaction fees waiting time and consensus security. In CCS.","DOI":"10.1145\/3548606.3559341"},{"key":"e_1_3_2_1_61_1","volume-title":"An Empirical Study on Ethereum Private Transactions and the Security Implications. arXiv","author":"Lyu Xingyu","year":"2022","unstructured":"Xingyu Lyu, Mengya Zhang, Xiaokuan Zhang, Jianyu Niu, Yinqian Zhang, and Zhiqiang Lin. 2022. An Empirical Study on Ethereum Private Transactions and the Security Implications. arXiv (2022)."},{"key":"e_1_3_2_1_62_1","volume-title":"Smart contract ap-plications within blockchain technology: A systematic mapping study. Telematics and Informatics","author":"Macrinici Daniel","year":"2018","unstructured":"Daniel Macrinici, Cristian Cartofeanu, and Shang Gao. 2018. Smart contract ap-plications within blockchain technology: A systematic mapping study. Telematics and Informatics (2018)."},{"key":"e_1_3_2_1_63_1","volume":"200","author":"Myers Leann","unstructured":"Leann Myers and Maria J Sirois. 2004. Spearman correlation coefficients, differ-ences between. Encyclopedia of statistical sciences (2004).","journal-title":"Maria J Sirois."},{"key":"e_1_3_2_1_64_1","volume-title":"Ertem Nusret Tas, and David Tse","author":"Neu Joachim","year":"2022","unstructured":"Joachim Neu, Ertem Nusret Tas, and David Tse. 2022. Two More Attacks on Proof-of-Stake GHOST\/Ethereum. In ConsensusDay."},{"key":"e_1_3_2_1_65_1","volume-title":"Low-cost attacks on Ethereum 2.0 by sub-1\/3 stakeholders. WINE","author":"Neuder Michael","year":"2021","unstructured":"Michael Neuder, Daniel J Moroz, Rithvik Rao, and David C Parkes. 2021. Low-cost attacks on Ethereum 2.0 by sub-1\/3 stakeholders. WINE (2021)."},{"key":"e_1_3_2_1_66_1","volume-title":"Representation learning by learning to count","author":"Noroozi Mehdi","unstructured":"Mehdi Noroozi, Hamed Pirsiavash, and Paolo Favaro. 2017. Representation learning by learning to count. In IEEE ICCV."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"David L Olson and Dursun Delen. 2008. Advanced data mining techniques.","DOI":"10.1007\/978-0-387-74759-0_108"},{"key":"e_1_3_2_1_68_1","volume-title":"Gopi Krishnan Rajbahadur, and Ahmed E Hassan","author":"Pacheco Michael","year":"2022","unstructured":"Michael Pacheco, Gustavo A Oliva, Gopi Krishnan Rajbahadur, and Ahmed E Hassan. 2022. Is my transaction done yet? An empirical study of transaction processing times in the Ethereum Blockchain Platform. TOSEM (2022)."},{"key":"e_1_3_2_1_69_1","volume-title":"Ethereum Miners Extracting Value. arXiv","author":"Piet Julien","year":"2022","unstructured":"Julien Piet, Jaiden Fairoze, and Nicholas Weaver. 2022. Extracting Godl [sic] from the Salt Mines: Ethereum Miners Extracting Value. arXiv (2022)."},{"key":"e_1_3_2_1_70_1","unstructured":"Kaihua Qin Liyi Zhou Pablo Gamito Philipp Jovanovic and Arthur Gervais. 2021. An empirical study of defi liquidations: Incentives risks and instabilities. In ACM IMC."},{"key":"e_1_3_2_1_71_1","volume-title":"Quantifying Blockchain Extractable Value: How dark is the forest? IEEE SP","author":"Qin Kaihua","year":"2022","unstructured":"Kaihua Qin, Liyi Zhou, and Arthur Gervais. 2022. Quantifying Blockchain Extractable Value: How dark is the forest? IEEE SP (2022)."},{"key":"e_1_3_2_1_72_1","unstructured":"Kaihua Qin Liyi Zhou Benjamin Livshits and Arthur Gervais. 2021. Attacking the defi ecosystem with flash loans for fun and profit. In FC."},{"key":"e_1_3_2_1_73_1","volume-title":"Feature selection using a multilayer perceptron. Journal of Neural Network Computing","author":"Ruck Dennis W","year":"1990","unstructured":"Dennis W Ruck, Steven K Rogers, and Matthew Kabrisky. 1990. Feature selection using a multilayer perceptron. Journal of Neural Network Computing (1990)."},{"key":"e_1_3_2_1_74_1","volume-title":"Decentralized finance: On blockchain-and smart contract-based financial markets. FRB of St. Louis Review","author":"Sch\u00e4r Fabian","year":"2021","unstructured":"Fabian Sch\u00e4r. 2021. Decentralized finance: On blockchain-and smart contract-based financial markets. FRB of St. Louis Review (2021)."},{"key":"e_1_3_2_1_75_1","volume-title":"Mohammad Saidur Rahman, and Matthew Wright","author":"Sirinam Payap","year":"2019","unstructured":"Payap Sirinam, Nate Mathews, Mohammad Saidur Rahman, and Matthew Wright. 2019. Triplet fingerprinting: More practical and portable website fingerprinting with n-shot learning. In ACM CCS."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"crossref","unstructured":"Sergei Tikhomirov. 2017. Ethereum: state of knowledge and research perspectives. In FPS.","DOI":"10.1007\/978-3-319-75650-9_14"},{"key":"e_1_3_2_1_77_1","volume-title":"Statistical inference in vector autore-gressions with possibly integrated processes. Journal of econometrics","author":"Toda Hiro Y","year":"1995","unstructured":"Hiro Y Toda and Taku Yamamoto. 1995. Statistical inference in vector autore-gressions with possibly integrated processes. Journal of econometrics (1995)."},{"key":"e_1_3_2_1_78_1","volume-title":"Subtab: Subsetting features of tabular data for self-supervised representation learning. In NeurIPS.","author":"Ucar Talip","year":"2021","unstructured":"Talip Ucar, Ehsan Hajiramezanali, and Lindsay Edwards. 2021. Subtab: Subsetting features of tabular data for self-supervised representation learning. In NeurIPS."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"crossref","unstructured":"Friedhelm Victor. 2020. Address clustering heuristics for Ethereum. In FC.","DOI":"10.1007\/978-3-030-51280-4_33"},{"key":"e_1_3_2_1_80_1","unstructured":"Weiran Wang Raman Arora Karen Livescu and Jeff Bilmes. 2015. On deep multi-view representation learning. In ICML."},{"key":"e_1_3_2_1_81_1","volume-title":"Cyclic Arbitrage in Decentralized Exchange Markets. WWW","author":"Wang Ye","year":"2021","unstructured":"Ye Wang, Yan Chen, Shuiguang Deng, and Roger Wattenhofer. 2021. Cyclic Arbitrage in Decentralized Exchange Markets. WWW (2021)."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"crossref","unstructured":"Ye Wang Patrick Zuest Yaxing Yao Zhicong Lu and Roger Wattenhofer. 2022. Impact and User Perception of Sandwich Attacks in the DeFi Ecosystem. In CHI.","DOI":"10.1145\/3491102.3517585"},{"key":"e_1_3_2_1_83_1","volume-title":"Duc Vu Minh, and Arthur Gervais","author":"Wang Zhipeng","year":"2022","unstructured":"Zhipeng Wang, Kaihua Qin, Duc Vu Minh, and Arthur Gervais. 2022. Speculative Multipliers on DeFi: Quantifying On-Chain Leverage Risks. FC (2022)."},{"key":"e_1_3_2_1_84_1","volume-title":"Cristina Nita-Rotaru, and Radu State.","author":"Weintraub Ben","year":"2022","unstructured":"Ben Weintraub, Christof Ferreira Torres, Cristina Nita-Rotaru, and Radu State. 2022. A Flash (bot) in the Pan: Measuring Maximal Extractable Value in Private Pools. In IMC."},{"key":"e_1_3_2_1_85_1","volume":"202","author":"Werner Sam M","unstructured":"Sam M Werner, Daniel Perez, Lewis Gudgeon, Ariah Klages-Mundt, Dominik Harz, and William J Knottenbelt. 2021. Sok: Decentralized finance. In arXiv.","journal-title":"William J Knottenbelt."},{"key":"e_1_3_2_1_86_1","unstructured":"Entriken William Shirley Dieter Evans Jacob and Sachs Nastassia. 2018. EIP-721 Non-Fungible Token Standard. https:\/\/eips.ethereum.org\/EIPS\/eip-721."},{"key":"e_1_3_2_1_87_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper (2014)."},{"key":"e_1_3_2_1_88_1","volume-title":"DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications. arXiv","author":"Wu Siwei","year":"2021","unstructured":"Siwei Wu, Dabao Wang, Jianting He, Yajin Zhou, Lei Wu, Xingliang Yuan, Qinming He, and Kui Ren. 2021. DeFiRanger: Detecting Price Manipulation Attacks on DeFi Applications. arXiv (2021)."},{"key":"e_1_3_2_1_89_1","volume-title":"Dual gated graph attention networks with dynamic iterative training for cross-lingual entity alignment. TOIS","author":"Xie Zhiwen","year":"2021","unstructured":"Zhiwen Xie, Runjie Zhu, Kunsong Zhao, Jin Liu, Guangyou Zhou, and Jimmy Xiangji Huang. 2021. Dual gated graph attention networks with dynamic iterative training for cross-lingual entity alignment. TOIS (2021)."},{"key":"e_1_3_2_1_90_1","volume-title":"SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) protocols. Comput. Surveys","author":"Xu Jiahua","year":"2023","unstructured":"Jiahua Xu, Nazariy Vavryk, Krzysztof Paruch, and Simon Cousaert. 2023. SoK: Decentralized Exchanges (DEX) with Automated Market Maker (AMM) protocols. Comput. Surveys (2023)."},{"key":"e_1_3_2_1_91_1","volume-title":"Survey of clustering algorithms. TNN","author":"Xu Rui","year":"2005","unstructured":"Rui Xu and Donald Wunsch. 2005. Survey of clustering algorithms. TNN (2005)."},{"key":"e_1_3_2_1_92_1","volume-title":"SoK: MEV Countermeasures: Theory and Practice. arXiv","author":"Yang Sen","year":"2022","unstructured":"Sen Yang, Fan Zhang, Ken Huang, Xi Chen, Youwei Yang, and Feng Zhu. 2022. SoK: MEV Countermeasures: Theory and Practice. arXiv (2022)."},{"key":"e_1_3_2_1_93_1","volume-title":"Darcher: Detecting on-chain-off-chain synchronization bugs in decentralized applications. In ESEC\/FSE.","author":"Zhang Wuqi","year":"2021","unstructured":"Wuqi Zhang, Lili Wei, Shuqing Li, Yepang Liu, and Shing-Chi Cheung. 2021. Darcher: Detecting on-chain-off-chain synchronization bugs in decentralized applications. In ESEC\/FSE."},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"crossref","unstructured":"Kunsong Zhao Zihao Li Jianfeng Li He Ye Xiapu Luo and Ting Chen. 2023. DeepInfer: Deep Type Inference from Smart Contract Bytecode. In ESEC\/FSE.","DOI":"10.1145\/3611643.3616343"},{"key":"e_1_3_2_1_95_1","volume-title":"On the just-in-time discovery of profit-generating transactions in defi protocols","author":"Zhou Liyi","unstructured":"Liyi Zhou, Kaihua Qin, Antoine Cully, Benjamin Livshits, and Arthur Gervais. 2021. On the just-in-time discovery of profit-generating transactions in defi protocols. In IEEE SP."},{"key":"e_1_3_2_1_96_1","unstructured":"Liyi Zhou Kaihua Qin and Arthur Gervais. 2021. A2mm: Mitigating frontrunning transaction reordering and consensus instability in decentralized exchanges. In arXiv."},{"key":"e_1_3_2_1_97_1","volume-title":"Duc V Le, and Arthur Gervais.","author":"Zhou Liyi","year":"2021","unstructured":"Liyi Zhou, Kaihua Qin, Christof Ferreira Torres, Duc V Le, and Arthur Gervais. 2021. High-frequency trading on decentralized on-chain exchanges. In IEEE SP."},{"key":"e_1_3_2_1_98_1","volume-title":"SoK: Decentralized Finance (DeFi) Incidents. arXiv","author":"Zhou Liyi","year":"2022","unstructured":"Liyi Zhou, Xihan Xiong, Jens Ernstberger, Stefanos Chaliasos, Zhipeng Wang, Ye Wang, Kaihua Qin, Roger Wattenhofer, Dawn Song, and Arthur Gervais. 2022. SoK: Decentralized Finance (DeFi) Incidents. arXiv (2022)."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"crossref","unstructured":"Hao Zhu Ruobing Xie Zhiyuan Liu and Maosong Sun. 2017. Iterative entity alignment via knowledge embeddings. In IJCAI.","DOI":"10.24963\/ijcai.2017\/595"}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616590","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3616590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:57:10Z","timestamp":1755741430000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3616590"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":99,"alternative-id":["10.1145\/3576915.3616590","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3616590","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}