{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:07:38Z","timestamp":1775815658905,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":86,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"Ethereum Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589334.3645431","type":"proceedings-article","created":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T07:08:13Z","timestamp":1715152093000},"page":"1632-1643","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Blockchain Censorship"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3816-5938","authenticated-orcid":false,"given":"Anton","family":"Wahrst\u00e4tter","sequence":"first","affiliation":[{"name":"Vienna University of Economics and Business, Vienna, Austria"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1422-9247","authenticated-orcid":false,"given":"Jens","family":"Ernstberger","sequence":"additional","affiliation":[{"name":"Technical University of Munich &amp; Berkeley Center for Responsible Decentralized Intelligence (RDI), Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7971-2494","authenticated-orcid":false,"given":"Aviv","family":"Yaish","sequence":"additional","affiliation":[{"name":"The Hebrew University, Jerusalem, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2820-9872","authenticated-orcid":false,"given":"Liyi","family":"Zhou","sequence":"additional","affiliation":[{"name":"Imperial College London &amp; Berkeley Center for Responsible Decentralized Intelligence (RDI), London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2190-3623","authenticated-orcid":false,"given":"Kaihua","family":"Qin","sequence":"additional","affiliation":[{"name":"Imperial College London &amp; Berkeley Center for Responsible Decentralized Intelligence (RDI), London, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9134-7445","authenticated-orcid":false,"given":"Taro","family":"Tsuchiya","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4096-2584","authenticated-orcid":false,"given":"Sebastian","family":"Steinhorst","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3020-9556","authenticated-orcid":false,"given":"Davor","family":"Svetinovic","sequence":"additional","affiliation":[{"name":"Khalifa University &amp; Vienna University of Economics and Business, Abu Dhabi, United Arab Emirates"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2506-8031","authenticated-orcid":false,"given":"Nicolas","family":"Christin","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0477-5201","authenticated-orcid":false,"given":"Mikolaj","family":"Barczentewicz","sequence":"additional","affiliation":[{"name":"University of Surrey, Guildford, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3565-3410","authenticated-orcid":false,"given":"Arthur","family":"Gervais","sequence":"additional","affiliation":[{"name":"University College London &amp; Berkeley Center for Responsible Decentralized Intelligence (RDI), London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Evaluating User Privacy in Bitcoin","author":"Androulaki Elli","unstructured":"Elli Androulaki, Ghassan O. Karame, Marc Roeschlin, Tobias Scherer, and Srdjan Capkun. 2013. Evaluating User Privacy in Bitcoin. In Financial Cryptography and Data Security, Ahmad-Reza Sadeghi (Ed.). Springer Berlin Heidelberg, Berlin, Heidelberg, 34--51."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"e_1_3_2_2_3_1","volume-title":"Jose Mar\u00eda Vidal Pastor, et al","author":"Auer Raphael","year":"2022","unstructured":"Raphael Auer, Jon Frost, Jose Mar\u00eda Vidal Pastor, et al. 2022. Miners as intermediaries: extractable value and market manipulation in crypto and DeFi. Technical Report. Bank for International Settlements."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355458"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.15"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"e_1_3_2_2_7_1","unstructured":"Vitalik Buterin. 2021. State of research: Increasing censorship resistance of transactions under proposer\/builder separation (PBS). https:\/\/notes.ethereum. org\/@vbuterin\/pbs_censorship_resistance"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3560832.3564259"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488408"},{"key":"e_1_3_2_2_10_1","unstructured":"Nicolas Christin. 2022. Measuring And Analyzing Online Anonymous ('DARKNET') Marketplaces. Technical Report. CARNEGIE-MELLON UNIV PITTSBURGH PA."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00087"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SADFE51007.2020.00013"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","unstructured":"Kirsten Cremona Donald Tabone and Clifford De Raffaele. 2019. Cybersecurity and the Blockchain: Preventing the Insertion of Child Pornography Images. In 2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). 197--204. https:\/\/doi.org\/10.1109\/CyberC.2019. 00042","DOI":"10.1109\/CyberC.2019"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00040"},{"key":"e_1_3_2_2_15_1","series-title":"May 2004","volume-title":"The economics of censorship resistance. Proceedings of the 3rd Annual Workship on Economics and Information Security (WEIS04)","author":"Danezis George","year":"2004","unstructured":"George Danezis and Ross Anderson. 2004. The economics of censorship resistance. Proceedings of the 3rd Annual Workship on Economics and Information Security (WEIS04)(May 2004) (2004)."},{"key":"e_1_3_2_2_16_1","unstructured":"Shayan Eskandari Seyedehmahsa Moosavi and Jeremy Clark. 2019. SoK: Transparent Dishonesty: front-running attacks on Blockchain. https:\/\/doi.org\/10. 1007\/978--3-030--43725--1_13 arXiv:1902.05164 [cs.CR]"},{"key":"e_1_3_2_2_17_1","unstructured":"Ethereum. 2022. The Merge. https:\/\/ethereum.org\/en\/upgrades\/merge\/"},{"key":"e_1_3_2_2_18_1","unstructured":"Ethereum. 2023. Proposer-builder separation. https:\/\/github.com\/ethereum\/ ethereum-org-website\/blob\/1729448\/src\/content\/roadmap\/pbs\/index.md"},{"key":"e_1_3_2_2_19_1","unstructured":"Ethernodes. 2022. The popularity of Ethereum clients. https:\/\/ethernodes.org\/ ethernodes.org."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","unstructured":"Yotam Gafni and Aviv Yaish. 2022. Greedy Transaction Fee Mechanisms for (Non-)myopic Miners. https:\/\/doi.org\/10.48550\/ARXIV.2210.07793","DOI":"10.48550\/ARXIV.2210.07793"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559379"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_2_23_1","volume-title":"2019 IEEE Symposium on Security and Privacy (SP). IEEE, 139-- 156","author":"Peter","year":"2019","unstructured":"Peter Ga?i, Aggelos Kiayias, and Dionysis Zindros. 2019. Proof-of-stake sidechains. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 139-- 156."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813655"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560637"},{"key":"e_1_3_2_2_26_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on Bitcoin's peer-to-peer network. In 24th USENIX Security Symposium (USENIX Security 15). 129--144."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","unstructured":"Lioba Heimbach and Roger Wattenhofer. 2022. SoK: Preventing Transaction Reordering Manipulations in Decentralized Finance. arXiv:https:\/\/doi.org\/10.48550\/arXiv.2203.11520 https:\/\/arxiv.org\/abs\/2203.11520","DOI":"10.48550\/arXiv.2203.11520"},{"key":"e_1_3_2_2_28_1","unstructured":"Alejo; Hasu Hu Elaine; Salles. 2022. The Cost of Resilience. https:\/\/web.archive. org\/web\/20230325222151\/https:\/\/writings.flashbots.net\/the-cost-of-resilience"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.arcontrol.2022.01.004"},{"key":"e_1_3_2_2_30_1","unstructured":"Dimitris Karakostas Aggelos Kiayias and Christina Ovezik. 2022. SoK: A Stratified Approach to Blockchain Decentralization."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2732196"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0028"},{"key":"e_1_3_2_2_33_1","unstructured":"Kari Kostiainen Sven Gnap and Ghassan Karame. 2022. Censorship-Resilient and Confidential Collateralized Second-Layer Payments. Cryptology ePrint Archive Paper 2022\/1520. https:\/\/eprint.iacr.org\/2022\/1520 https:\/\/eprint.iacr.org\/2022\/ 1520."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3479722.3480800"},{"key":"e_1_3_2_2_35_1","volume-title":"Fifth International Conference on Fun with Algorithms. 52--64","author":"Leberknight Christopher S","year":"2010","unstructured":"Christopher S Leberknight, Mung Chiang, Harold Vincent Poor, and Felix Wong. 2010. A taxonomy of Internet censorship and anti-censorship. In Fifth International Conference on Fun with Algorithms. 52--64."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559341"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345649"},{"key":"e_1_3_2_2_38_1","unstructured":"Ayelet Lotem Sarah Azouvi Patrick McCorry and Aviv Zohar. 2022. Sliding Window Challenge Process for Congestion Detection. https:\/\/doi.org\/10.48550\/ ARXIV.2201.09009"},{"key":"e_1_3_2_2_39_1","volume-title":"Anonymous CoinJoin transactions with arbitrary values. In 2017 IEEE Trustcom\/ BigDataSE\/ICESS","author":"Maurer Felix Konstantin","unstructured":"Felix Konstantin Maurer, Till Neudecker, and Martin Florian. 2017. Anonymous CoinJoin transactions with arbitrary values. In 2017 IEEE Trustcom\/ BigDataSE\/ICESS. IEEE, 522--529."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--662--58820--8_1"},{"key":"e_1_3_2_2_41_1","unstructured":"Andrew Miller. 2013. Feather-forks: enforcing a blacklist with sub-50% hash power. https:\/\/web.archive.org\/web\/20221101152114\/https:\/\/bitcointalk.org\/ index.php?topic=312668.0"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_2_43_1","unstructured":"Immanual John Milton. 2022. Crypto Mixer Tornado Cash's Accounts Are Disabled After US Sanctions. https:\/\/www.bloomberg.com\/news\/articles\/2022-08- 08\/crypto-mixer-tornado-s-accounts-are-disabled-after-us-sanctions"},{"key":"e_1_3_2_2_44_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. https: \/\/web.archive.org\/web\/20100704213649\/https:\/\/bitcoin.org\/bitcoin.pdf","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. https: \/\/web.archive.org\/web\/20100704213649\/https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_2_45_1","unstructured":"Gleb Naumenko. 2022. TxWithhold Smart Contracts. https:\/\/web.archive.org\/ web\/20220628075911\/https:\/\/thelab31.xyz\/blog\/txwithhold"},{"key":"e_1_3_2_2_46_1","volume-title":"Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain. In 2021 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 1--8.","author":"Ndiaye Malaw","year":"2021","unstructured":"Malaw Ndiaye and Pr Karim Konate. 2021. Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain. In 2021 International Symposium on Networks, Computers and Communications (ISNCC). IEEE, 1--8."},{"key":"e_1_3_2_2_47_1","unstructured":"Danny Nelson. 2022. Crypto Industry's Sanctions Woes on Full Display in Meta- Mask's Venezuela Hiccup. https:\/\/web.archive.org\/web\/20220516095735\/https: \/\/www.coindesk.com\/business\/2022\/03\/04\/crypto-industrys-sanctions-woeson- full-display-\\in-metamasks-venezuela-hiccup\/"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_27"},{"key":"e_1_3_2_2_49_1","unstructured":"Michael Neuder Daniel J Moroz Rithvik Rao and David C Parkes. 2021. Low-cost attacks on Ethereum 2.0 by sub-1\/3 stakeholders."},{"key":"e_1_3_2_2_50_1","first-page":"34","article-title":"The Lazarus group: The Cybercrime Syndicate Financing the north Korea State","volume":"42","author":"Park Joshua","year":"2021","unstructured":"Joshua Park. 2021. The Lazarus group: The Cybercrime Syndicate Financing the north Korea State. Harvard International Review 42, 2 (2021), 34--39.","journal-title":"Harvard International Review"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/11558859_6"},{"key":"e_1_3_2_2_52_1","unstructured":"Alexey Pertsev Roman Semenov and Roman Storm. 2019. Tornado Cash Privacy Solution Version 1.4."},{"key":"e_1_3_2_2_53_1","volume-title":"Executive Order 13694 of","author":"President of the United States. 2015.","year":"2015","unstructured":"President of the United States. 2015. Executive Order 13694 of April 1, 2015. https:\/\/www.federalregister.gov\/documents\/2015\/04\/02\/2015-07788\/blockingthe- property-of-certain-persons-engaging-in-significant-malicious-cyberenabled- activities."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3487552.3487811"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833734"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"e_1_3_2_2_57_1","volume-title":"Amy Aixi Zhang, and Dan Robinson","author":"Seira Rodrigo","year":"2022","unstructured":"Rodrigo Seira, Amy Aixi Zhang, and Dan Robinson. 2022. Base Layer Neutrality. https:\/\/www.paradigm.xyz\/2022\/09\/base-layer-neutrality."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484566"},{"key":"e_1_3_2_2_59_1","volume-title":"Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of Ethereum. In 2020 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE","author":"Silva Paulo","year":"2020","unstructured":"Paulo Silva, David Vavricka, Jo\u00e3o Barreto, and Miguel Matos. 2020. Impact of Geo-Distribution and Mining Pools on Blockchains: A Study of Ethereum. In 2020 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, San Francisco, CA, USA, 245--252. https:\/\/doi.org\/10.1109\/ DSN48063.2020.00041"},{"key":"e_1_3_2_2_60_1","unstructured":"Johann Stockinger Bernhard Haslhofer Pedro Moreno-Sanchez and Matteo Maffei. 2021. Pinpointing and Measuring Wasabi and Samourai CoinJoins in the Bitcoin Ecosystem. arXiv:2109.10229 [cs.CR]"},{"key":"e_1_3_2_2_61_1","unstructured":"Ertem Nusret Tas David Tse Fisher Yu Sreeram Kannan and Mohammad Ali Maddah-Ali. 2022. Bitcoin-enhanced proof-of-stake security: Possibilities and impossibilities."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS2018.2018.00031"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3528580.3528585"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.59"},{"key":"e_1_3_2_2_66_1","unstructured":"U.S. Department of the Treasury. 2022. FAQ 1076. What is prohibited as a result of OFAC's designation of Tornado Cash? https: \/\/web.archive.org\/web\/20221014112946\/https:\/\/home.treasury.gov\/policyissues\/ financial-sanctions\/faqs\/1076."},{"key":"e_1_3_2_2_67_1","unstructured":"U.S. Department of the Treasury. 2022. Treasury Designates DPRKWeapons Representatives. https:\/\/web.archive.org\/web\/20221126125148\/https:\/\/home.treasury. gov\/news\/press-releases\/jy1087."},{"key":"e_1_3_2_2_68_1","unstructured":"U.S. Department of the Treasury. 2022. U.S. Treasury Issues First-Ever Sanctions on a Virtual Currency Mixer Targets DPRK Cyber Threats. https:\/\/web.archive.org\/web\/20221124112323\/https:\/\/home.treasury.gov\/news\/ press-releases\/jy0768."},{"key":"e_1_3_2_2_69_1","unstructured":"U.S. Department of the Treasury. 2022. U.S. Treasury Sanctions Notorious Virtual Currency Mixer Tornado Cash. https:\/\/web.archive.org\/web\/20221026104007\/ https:\/\/home.treasury.gov\/news\/press-releases\/jy0916."},{"key":"e_1_3_2_2_70_1","unstructured":"U.S. Department of the Treasury's Office of Foreign Assets Control. 2021. Sanctions Compliance Guidance for the Virtual Currency Industry. https:\/\/home. treasury.gov\/system\/files\/126\/virtual_currency_guidance_brochure.pdf."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_33"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517585"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3543507.3583217"},{"key":"e_1_3_2_2_74_1","volume-title":"Leiserson","author":"Weber Mark","year":"2019","unstructured":"Mark Weber, Giacomo Domeniconi, Jie Chen, Daniel Karl I. Weidele, Claudio Bellei, Tom Robinson, and Charles E. Leiserson. 2019. Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics. arXiv:1908.02591 http:\/\/arxiv.org\/abs\/1908.02591"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00046"},{"key":"e_1_3_2_2_76_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151","author":"GavinWood","year":"2014","unstructured":"GavinWood et al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151, 2014 (2014), 1--32."},{"key":"e_1_3_2_2_77_1","unstructured":"Liam Wright. 2022. DeFi protocols Aave Uniswap Balancer ban users following OFAC sanctions on Tornado Cash. https:\/\/web.archive.org\/web\/20220816142409\/ https:\/\/cryptoslate.com\/defi-protocols-aave-uniswap-balancer-ban-usersfollowing\\- ofac-sanctions-on-tornado-cash\/"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3442381.3449880"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPHYS.2019.8780370"},{"key":"e_1_3_2_2_80_1","unstructured":"Aviv Yaish Kaihua Qin Liyi Zhou Aviv Zohar and Arthur Gervais. 2023. Speculative Denial-of-Service Attacks in Ethereum. Cryptology ePrint Archive Paper 2023\/956. 24 pages. https:\/\/ia.cr\/2023\/956"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490486.3538250"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00086"},{"key":"e_1_3_2_2_83_1","volume-title":"On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols. In 42nd IEEE Symposium on Security and Privacy, SP 2021","author":"Zhou Liyi","year":"2021","unstructured":"Liyi Zhou, Kaihua Qin, Antoine Cully, Benjamin Livshits, and Arthur Gervais. 2021. On the Just-In-Time Discovery of Profit-Generating Transactions in DeFi Protocols. In 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24--27 May 2021. IEEE, San Francisco, CA, USA, 919--936. https:\/\/doi. org\/10.1109\/SP40001.2021.00113"},{"key":"e_1_3_2_2_84_1","unstructured":"Liyi Zhou Kaihua Qin and Arthur Gervais. 2021. A2MM: Mitigating Frontrunning Transaction Reordering and Consensus Instability in Decentralized Exchanges. arXiv:2106.07371 https:\/\/arxiv.org\/abs\/2106.07371"},{"key":"e_1_3_2_2_85_1","volume-title":"High-Frequency Trading on Decentralized On-Chain Exchanges. In 42nd IEEE Symposium on Security and Privacy, SP 2021","author":"Zhou Liyi","year":"2021","unstructured":"Liyi Zhou, Kaihua Qin, Christof Ferreira Torres, Duc Viet Le, and Arthur Gervais. 2021. High-Frequency Trading on Decentralized On-Chain Exchanges. In 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24- 27 May 2021. IEEE, San Francisco, CA, USA, 428--445. https:\/\/doi.org\/10.1109\/ SP40001.2021.00027"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","unstructured":"Liyi Zhou Xihan Xiong Jens Ernstberger Stefanos Chaliasos Zhipeng Wang Ye Wang Kaihua Qin Roger Wattenhofer Dawn Song and Arthur Gervais. 2022. SoK: Decentralized Finance (DeFi) Attacks. https:\/\/doi.org\/10.48550\/ARXIV. 2208.13035","DOI":"10.48550\/ARXIV"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","location":"Singapore Singapore","acronym":"WWW '24","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645431","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589334.3645431","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:25:56Z","timestamp":1755822356000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589334.3645431"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":86,"alternative-id":["10.1145\/3589334.3645431","10.1145\/3589334"],"URL":"https:\/\/doi.org\/10.1145\/3589334.3645431","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}