{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T05:51:43Z","timestamp":1759384303698,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T00:00:00Z","timestamp":1720396800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ripple UBRI Grant"},{"name":"NSF CAREER","award":["CCF-1942497"],"award-info":[{"award-number":["CCF-1942497"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,8]]},"DOI":"10.1145\/3670865.3673485","type":"proceedings-article","created":{"date-parts":[[2024,12,17]],"date-time":"2024-12-17T20:13:33Z","timestamp":1734466413000},"page":"1017-1044","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Undetectable Selfish Mining"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-6040-7755","authenticated-orcid":false,"given":"Maryam","family":"Bahrani","sequence":"first","affiliation":[{"name":"a16z crypto, New York, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7744-795X","authenticated-orcid":false,"given":"S. Matthew","family":"Weinberg","sequence":"additional","affiliation":[{"name":"Princeton University, Princeton, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,12,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Transaction Fee Mechanism Design with Active Block Producers. arXiv preprint arXiv:2307.01686","author":"Bahrani Maryam","year":"2023","unstructured":"Maryam Bahrani, Pranav Garimidi, and Tim Roughgarden. 2023. Transaction Fee Mechanism Design with Active Block Producers. arXiv preprint arXiv:2307.01686 (2023)."},{"key":"e_1_3_2_1_2_1","volume-title":"Transaction Fee Mechanism Design in a Post-MEV World. Cryptology ePrint Archive","author":"Bahrani Maryam","year":"2024","unstructured":"Maryam Bahrani, Pranav Garimidi, and Tim Roughgarden. 2024. Transaction Fee Mechanism Design in a Post-MEV World. Cryptology ePrint Archive (2024)."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_6"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329567"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978408"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-019-00746-2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611977554.ch150"},{"volume-title":"Financial Cryptography and Data Security","author":"Eyal Ittay","key":"e_1_3_2_1_8_1","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security. Springer, 436--454."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490486.3538337"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465456.3467636"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329630"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328526.3329566"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1093\/restud\/rdab014"},{"volume-title":"Proceedings of the 27th USENIX Security Symposium (USENIX).","author":"Kalodner Harry","key":"e_1_3_2_1_15_1","unstructured":"Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, and Edward W. Felten. 2018. Arbitrum: Scalable Smart Contracts. In Proceedings of the 27th USENIX Security Symposium (USENIX)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2940716.2940773"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313454"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2208.05748"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169436"},{"key":"e_1_3_2_1_20_1","volume-title":"IEEE\/CIC International Conference on Communications in China (ICCC Workshops), ICBC 2020","author":"Li Sheng-Nan","year":"2020","unstructured":"Sheng-Nan Li, Zhao Yang, and Claudio J. Tessone. 2020b. Proof-of-Work cryptocurrency mining: a statistical approach to fairness. In IEEE\/CIC International Conference on Communications in China (ICCC Workshops), ICBC 2020, Toronto, ON, Canada, May 2--6, 2020. IEEE, 156--161."},{"key":"e_1_3_2_1_21_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system."},{"volume-title":"Bitcoin and cryptocurrency technologies: a comprehensive introduction","author":"Narayanan Arvind","key":"e_1_3_2_1_22_1","unstructured":"Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, and Steven Goldfeder. 2016. Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press."},{"key":"e_1_3_2_1_23_1","volume-title":"Parkes","author":"Neuder Michael","year":"2019","unstructured":"Michael Neuder, Daniel J. Moroz, Rithvik Rao, and David C. Parkes. 2019. Selfish Behavior in the Tezos Proof-of-Stake Protocol. CoRR abs\/1912.02954 (2019). arXiv:1912.02954 http:\/\/arxiv.org\/abs\/1912.02954"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423265"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465456.3467591"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2019.8685577"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_30"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.ITCS.2023.97"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/8690662"},{"key":"e_1_3_2_1_30_1","unstructured":"Aviv Yaish Gilad Stern and Aviv Zohar. 2022a. Uncle Maker: (Time)Stamping Out The Competition in Ethereum. Cryptology ePrint Archive Paper 2022\/1020. https:\/\/eprint.iacr.org\/2022\/1020 https:\/\/eprint.iacr.org\/2022\/1020."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3490486.3538250"},{"key":"e_1_3_2_1_32_1","volume-title":"An Incentive Analysis of some Bitcoin Fee Designs. CoRR abs\/1811.02351","author":"Chi-Chih Yao Andrew","year":"2018","unstructured":"Andrew Chi-Chih Yao. 2018. An Incentive Analysis of some Bitcoin Fee Designs. CoRR abs\/1811.02351 (2018). arXiv:1811.02351 http:\/\/arxiv.org\/abs\/1811.02351"}],"event":{"name":"EC '24: 25th ACM Conference on Economics and Computation","sponsor":["SIGecom Special Interest Group on Economics and Computation"],"location":"New Haven CT USA","acronym":"EC '24"},"container-title":["Proceedings of the 25th ACM Conference on Economics and Computation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670865.3673485","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3670865.3673485","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:05:42Z","timestamp":1750291542000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670865.3673485"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,8]]},"references-count":32,"alternative-id":["10.1145\/3670865.3673485","10.1145\/3670865"],"URL":"https:\/\/doi.org\/10.1145\/3670865.3673485","relation":{},"subject":[],"published":{"date-parts":[[2024,7,8]]},"assertion":[{"value":"2024-12-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}