20 research outputs found
The Cost of Sybils, Credible Commitments, and False-Name Proof Mechanisms
Consider a mechanism that cannot observe how many players there are directly,
but instead must rely on their self-reports to know how many are participating.
Suppose the players can create new identities to report to the auctioneer at
some cost . The usual mechanism design paradigm is equivalent to implicitly
assuming that is infinity for all players, while the usual Sybil attacks
literature is that it is zero or finite for one player (the attacker) and
infinity for everyone else (the 'honest' players). The false-name proof
literature largely assumes the cost to be 0. We consider a model with variable
costs that unifies these disparate streams.
A paradigmatic normal form game can be extended into a Sybil game by having
the action space by the product of the feasible set of identities to create
action where each player chooses how many players to present as in the game and
their actions in the original normal form game. A mechanism is (dominant)
false-name proof if it is (dominant) incentive-compatible for all the players
to self-report as at most one identity. We study mechanisms proposed in the
literature motivated by settings where anonymity and self-identification are
the norms, and show conditions under which they are not Sybil-proof. We
characterize a class of dominant Sybil-proof mechanisms for reward sharing and
show that they achieve the efficiency upper bound. We consider the extension
when agents can credibly commit to the strategy of their sybils and show how
this can break mechanisms that would otherwise be false-name proof
Towards Optimal Prior-Free Permissionless Rebate Mechanisms, with applications to Automated Market Makers & Combinatorial Orderflow Auctions
Maximal Extractable Value (MEV) has become a critical issue for blockchain
ecosystems, as it enables validators or block proposers to extract value by
ordering, including or censoring users' transactions. This paper aims to
present a formal approach for determining the appropriate compensation for
users whose transactions are executed in bundles, as opposed to individually.
We explore the impact of MEV on users, discuss the Shapley value as a solution
for fair compensation, and delve into the mechanisms of MEV rebates and
auctions as a means to undermine the power of the block producer
DO NOT RUG ON ME: ZERO-DIMENSIONAL SCAM DETECTION
Uniswap, like other DEXs, has gained much attention this year because it is a non-custodial and publicly verifiable exchange that allows users to trade digital assets without trusted third parties. However, its simplicity and lack of regulation also makes it easy to execute initial coin offering scams by listing non-valuable tokens. This method of performing scams is known as rug pull, a phenomenon that already existed in traditional finance but has become more relevant in DeFi. Various projects such as [34,37] have contributed to detecting rug pulls in EVM compatible chains. However, the first longitudinal and academic step to detecting and characterizing scam tokens on Uniswap was made in [44]. The authors collected all the transactions related to the Uniswap V2 exchange and proposed a machine learning algorithm to label tokens as scams. However, the algorithm is only valuable for detecting scams accurately after they have been executed. This paper increases their data set by 20K tokens and proposes a new methodology to label tokens as scams. After manually analyzing the data, we devised a theoretical classification of different malicious maneuvers in Uniswap protocol. We propose various machine-learning-based algorithms with new relevant features related to the token propagation and smart contract heuristics to detect potential rug pulls before they occur. In general, the models proposed achieved similar results. The best model obtained an accuracy of 0.9936, recall of 0.9540, and precision of 0.9838 in distinguishing non-malicious tokens from scams prior to the malicious maneuver
Diamonds are Forever, Loss-Versus-Rebalancing is Not
The always-available liquidity of automated market makers (AMMs) has been one of the most important catalysts in early cryptocurrency adoption. However, it has become increasingly evident that AMMs in their current form are not viable investment options for passive liquidity providers. This is because of the cost incurred by AMMs providing stale prices to arbitrageurs against external market prices, formalized as loss-versus-rebalancing (LVR) [Milionis et al., 2022].
In this paper, we present Diamond, an automated market making protocol that aligns the incentives of liquidity providers and block producers in the protocol-level retention of LVR. In Diamond, block producers effectively auction the right to capture any arbitrage that exists between the external market price of a Diamond pool, and the price of the pool itself. The proceeds of these auctions are shared by the Diamond pool and block producer in a way that is proven to remain incentive compatible for the block producer. Given the participation of competing arbitrageurs, LVR is effectively prevented in Diamond.
We formally prove this result, and detail an implementation of Diamond. We also provide comparative simulations of Diamond to relevant benchmarks, further evidencing the LVR-protection capabilities of Diamond.
With this new protection, passive liquidity provision on blockchains becomes rationally viable, beckoning a new age for decentralized finance
Do not rug on me
Uniswap, as with other DEXs, has gained much attention this year because it is a non-custodial and publicly verifiable exchange that allows users to trade digital assets without trusted third parties. However, its simplicity and lack of regulation also make it easy to execute initial coin offering scams by listing non-valuable tokens. This method of performing scams is known as rug pull, a phenomenon that already exists in traditional finance but has become more relevant in DeFi. Various projects have contributed to detecting rug pulls in EVM compatible chains. However, the first longitudinal and academic step to detecting and characterizing scam tokens on Uniswap was made. The authors collected all the transactions related to the Uniswap V2 exchange and proposed a machine learning algorithm to label tokens as scams. However, the algorithm is only valuable for detecting scams accurately after they have been executed. This paper increases their dataset by 20K tokens and proposes a new methodology to label tokens as scams. After manually analyzing the data, we devised a theoretical classification of different malicious maneuvers in the Uniswap protocol. We propose various machine-learning-based algorithms with new, relevant features related to the token propagation and smart contract heuristics to detect potential rug pulls before they occur. In general, the models proposed achieved similar results. The best model obtained accuracy of 0.9936, recall of 0.9540, and precision of 0.9838 in distinguishing non-malicious tokens from scams prior to the malicious maneuver.This paper is part of a project that has received funding from the European Union’s Horizon 2020 research and innovation programme under grant agreement number 814284