Feng Luo (The Hong Kong Polytechnic University), Zihao Li (The Hong Kong Polytechnic University), Wenxuan Luo (University of Electronic Science and Technology of China), Zheyuan He (University of Electronic Science and Technology of China), Xiapu Luo (The Hong Kong Polytechnic University), Zuchao Ma (The Hong Kong Polytechnic University), Shuwei Song (University of Electronic Science and Technology of China), Ting Chen (University of Electronic Science and Technology of China)

Due to the transparency of permissionless blockchain, opportunistic traders can extract Maximal Extractable Value by competing for profit opportunities and making the process never stop by creating MEV bots. However, this behavior undermines the consensus security and efficiency of the blockchain system. Therefore, understanding the behavior strategies of MEV bots is crucial to protect against their harm. Unfortunately, existing work focuses on macro-measurements of the MEV market, and the specific types and distributions of MEV bot strategies remain unknown. In this paper, we conduct the first systematic study of MEV bot profitability strategies by developing APOLLO, a tool to analyze fine-grained strategies throughout the entire lifecycle of bots. Our large-scale analysis of 2,052 MEV bots yields many new insights. In particular, we first introduce 20 code-level strategies employed by bots in the wild, take the first step towards smart contract de-obfuscation to discover strategies hidden in obfuscated bot code, and discover five specific types of transactions that bring profit opportunities to MEV bots.

View More Papers

Scalable Off-Chain Auctions

Mohsen Minaei (Visa Research), Ranjit Kumaresan (Visa Research), Andrew Beams (Visa Research), Pedro Moreno-Sanchez (IMDEA Software Institute, MPI-SP), Yibin Yang (Georgia Institute of Technology), Srinivasan Raghuraman (Visa Research and MIT), Panagiotis Chatzigiannis (Visa Research), Mahdi Zamani (Visa Research), Duc V. Le (Visa Research)

Read More

Chimera: Harnessing Multi-Agent LLMs for Automatic Insider Threat Simulation

Jiongchi Yu (Singapore Management University), Xiaofei Xie (Singapore Management University), Qiang Hu (Tianjin University), Yuhan Ma (Tianjin University), Ziming Zhao (Zhejiang University)

Read More

DNN Latency Sequencing: Extracting DNN Architectures from Intel SGX...

Minkyung Park (University of Texas at Dallas), Zelun Kong (University of Texas at Dallas), Dave (Jing) Tian (Purdue University), Z. Berkay Celik (Purdue University), Chung Hwan Kim (University of Texas at Dallas)

Read More