Ethereum prospered the inception of a plethora of smart contract applications, ranging from gambling games to decentralized finance. However, Ethereum is also considered a highly adversarial environment, where vulnerable smart contracts will eventually be exploited. Recently, Ethereum's pool of pending transaction has become a far more aggressive environment. In the hope of making some profit, attackers continuously monitor the transaction pool and try to frontrun their victims' transactions by either displacing or suppressing them, or strategically inserting their transactions. This paper aims to shed some light into what is known as a dark forest and uncover these predators' actions. We present a methodology to efficiently measure the three types of frontrunning: displacement, insertion, and suppression. We perform a large-scale analysis on more than 11M blocks and identify almost 200K attacks with an accumulated profit of 18.41M USD for the attackers, providing evidence that frontrunning is both, lucrative and a prevalent issue.
翻译:Etheum公司从赌博游戏到分散金融等大量智能合同应用程序的启动取得了繁荣。然而,Etheum公司也被视为一种高度对抗的环境,其中脆弱的智能合同最终会被利用。最近,Etheum公司的待决交易池已经成为一个更加积极的环境。为了赚取一些利润,攻击者不断监测交易池,试图通过转移或压制交易或战略性地插入交易来冲销其受害者的交易。本文旨在向所谓的黑暗森林提供一些线索,并揭露这些掠食者的行为。我们提出了一个有效衡量三种类型前行的方法:迁移、插入和压制。我们对超过11M街区进行了大规模分析,并查明了近200K袭击者累计利润18.41M美元,为袭击者提供了前行既有利又普遍问题的证据。