skip to main content
10.1145/3558535.3559780acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaftConference Proceedingsconference-collections
research-article
Open Access

SoK: Decentralized Finance (DeFi)

Published:05 July 2023Publication History

ABSTRACT

Decentralized Finance (DeFi), a blockchain powered peer-to-peer financial system, is mushrooming. Two years ago the total value locked in DeFi systems was approximately 700m USD, now, as of April 2022, it stands at around 150bn USD. The frenetic evolution of the ecosystem has created challenges in understanding the basic principles of these systems and their security risks. In this Systematization of Knowledge (SoK) we delineate the DeFi ecosystem along the following axes: its primitives, its operational protocol types and its security. We provide a distinction between technical security, which has a healthy literature, and economic security, which is largely unexplored, connecting the latter with new models and thereby synthesizing insights from computer science, economics and finance. Finally, we outline the open research challenges in the ecosystem across these security types.

References

  1. 1inch: Balancer pool with sta deflationary token incident (2020), https://1inch-exchange.medium.com/balancer-hack-2020-a8f7131c980eGoogle ScholarGoogle Scholar
  2. AAVE: Aave: Protocol whitepaper v1.0 (2020), https://github.com/aave/aave-protocol/blob/master/docs/Aave_Protocol_Whitepaper_v1_0.pdf, accessed: 13-08-2020Google ScholarGoogle Scholar
  3. Angeris, G., Chitra, T.: Improved price oracles: Constant function market makers. Proceedings of the 2nd ACM Conference on Advances in Financial Technologies (2020)Google ScholarGoogle Scholar
  4. Angeris, G., Evans, A., Chitra, T.: When does the tail wag the dog? Curvature and market making. arXiv preprint arXiv:2012.08040 (2020)Google ScholarGoogle Scholar
  5. Angeris, G., Evans, A., Chitra, T.: Replicating market makers. arXiv preprint arXiv:2103.14769 (2021)Google ScholarGoogle Scholar
  6. Angeris, G., Kao, H.T., Chiang, R., Noyes, C., Chitra, T.: An analysis of uniswap markets. Cryptoeconomic Systems Journal (2019)Google ScholarGoogle Scholar
  7. Annenkov, D., Spitters, B.: Towards a smart contract verification framework in coq. arXiv preprint arXiv:1907.10674 (2019)Google ScholarGoogle Scholar
  8. Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (sok). In: International conference on principles of security and trust. pp. 164--186. Springer (2017)Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Babel, K., Daian, P., Kelkar, M., Juels, A.: Clockwork finance: Automated analysis of economic security in smart contracts. arXiv preprint arXiv:2109.04347 (2021)Google ScholarGoogle Scholar
  10. Baker, P.: Defi lender bzx loses $8m in third attack this year. CoinDesk (2020), https://www.coindesk.com/defi-lender-bzx-third-attackGoogle ScholarGoogle Scholar
  11. Baker, P.: Defi project bzx exploited for second time in a week, loses $630k in ether. CoinDesk (2020), https://www.coindesk.com/defi-project-bzx-exploited-for-second-time-in-a-week-loses-630k-in-etherGoogle ScholarGoogle Scholar
  12. Baker, P.: Miners trick stablecoin protocol pegnet, turning 11 into almost 7m hoard. CoinDesk (2020), https://www.coindesk.com/miners-trick-stablecoin-protocol-pegnet-turning-11-into-almost-7m-hoardGoogle ScholarGoogle Scholar
  13. Balancer Labs: BAL - balancer governance token (2020), https://docs.balancer.finance/protocol/bal-balancer-governance-token, accessed: 20-08-2020.Google ScholarGoogle Scholar
  14. Bano, S., Sonnino, A., Al-Bassam, M., Azouvi, S., McCorry, P., Meiklejohn, S., Danezis, G.: Sok: Consensus in the age of blockchains. In: Proceedings of the 1st ACM Conference on Advances in Financial Technologies. pp. 183--198 (2019)Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Bartoletti, M., Chiang, J.H.y., Lluch-Lafuente, A.: Sok: Lending pools in decentralized finance. arXiv preprint arXiv:2012.13230 (2020)Google ScholarGoogle Scholar
  16. Beck, R., Müller-Bloch, C., King, J.L.: Governance in the blockchain economy: A framework and research agenda. Journal of the Association for Information Systems 19(10), 1 (2018)Google ScholarGoogle Scholar
  17. Beneš, N.: Introducing the dutchx (2017), https://blog.gnosis.pm/introducing-the-gnosis-dutch-exchange-53bd3d51f9b2Google ScholarGoogle Scholar
  18. Benhamouda, F., Halevi, S., Halevi, T.: Supporting private data on hyperledger fabric with secure multiparty computation. IBM Journal of Research and Development 63(2/3), 3--1 (2019)Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. bertcmiller: Tweet (2 April 2022), https://twitter.com/bertcmiller/status/1510249220967739398?t=Cf2PvmdsWyraKHNqOzYhwQ&s=19Google ScholarGoogle Scholar
  20. Biais, B., Bisiere, C., Bouvard, M., Casamatta, C.: The blockchain folk theorem. The Review of Financial Studies 32(5), 1662--1715 (2019)Google ScholarGoogle ScholarCross RefCross Ref
  21. Bitcoin, W.: Wbtc wrapped bitcoin an erc20 token backed 1:1 with bitcoin (2020), https://wbtc.network/Google ScholarGoogle Scholar
  22. BitMEX: Bitmex perpetual contracts guide (2020), https://www.bitmex.com/app/perpetualContractsGuideGoogle ScholarGoogle Scholar
  23. Blocknative: Evidence of mempool manipulation on black thursday: Hammerbots, mempool compression, and spontaneous stuck transactions (2020), https://www.blocknative.com/blog/mempool-forensicsGoogle ScholarGoogle Scholar
  24. Bloomberg: How $60 Billion in Terra Coins Went Up in Algorithmic Smoke. https://www.bloomberg.com/graphics/2022-crypto-luna-terra-stablecoin-explainer/ (20 May 2022)Google ScholarGoogle Scholar
  25. Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In: 2015 IEEE symposium on security and privacy. pp. 104--121. IEEE (2015)Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Breidenbach, L., Daian, P., Tramèr, F., Juels, A.: Enter the hydra: Towards principled bug bounties and exploit-resistant smart contracts. In: 27th {USENIX} Security Symposium ({USENIX} Security 18). pp. 1335--1352 (2018)Google ScholarGoogle Scholar
  27. Buterin, V.: A next-generation smart contract and decentralized application platform. white paper 3(37) (2014)Google ScholarGoogle Scholar
  28. bZx Network: bZx, The most powerful open finance protocol (2020), https://bzx.network/Google ScholarGoogle Scholar
  29. Carlsten, M., Kalodner, H., Weinberg, S.M., Narayanan, A.: On the instability of bitcoin without the block reward. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. pp. 154--167 (2016)Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. CertiK: Yam finance smart contract bug analysis & future prevention (2020), https://certik.io/blog/technology/yam-finance-smart-contract-bug-analysis-future-preventionGoogle ScholarGoogle Scholar
  31. Chen, X., Park, D., Roşu, G.: A language-independent approach to smart contract verification. In: International Symposium on Leveraging Applications of Formal Methods. pp. 405--413. Springer (2018)Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Claburn, T.: Single-line software bug causes fledgling yam cryptocurrency to implode just two days after launch (2020), https://www.theregister.com/2020/08/13/yam_cryptocurrency_bug_governance/Google ScholarGoogle Scholar
  33. Clark, J.: The replicating portfolio of a constant product market. Available at SSRN 3550601 (2020)Google ScholarGoogle Scholar
  34. Coinbase: Coinbase (2020), https://www.coinbase.com/Google ScholarGoogle Scholar
  35. Cointelegraph: Compound liquidator makes $4m as oracles post inflated dai price (2020), https://cointelegraph.com/news/compound-liquidator-makes-4m-as-oracles-post-inflated-dai-priceGoogle ScholarGoogle Scholar
  36. Compound: Compound finance (2019), https://compound.finance/Google ScholarGoogle Scholar
  37. Compound: Open price feed (2020), https://compound.finance/prices, accessed: 06-12-2020.Google ScholarGoogle Scholar
  38. ConsenSys: Mythril (2021), https://github.com/ConsenSys/mythrilGoogle ScholarGoogle Scholar
  39. Consensys: Mythx: Smart contract security service for ethereum (2021), https://mythx.io/Google ScholarGoogle Scholar
  40. Cooper, T.: imbtc uniswap pool drained for ~$300k in eth (2020), https://defirate.com/imbtc-uniswap-hack/, accessed: 20-01-2021.Google ScholarGoogle Scholar
  41. Cousaert, S., Xu, J., Matsui, T.: Sok: Yield aggregators in defi. arXiv preprint arXiv:2105.13891 (2021)Google ScholarGoogle Scholar
  42. Cronje, A.: yEARN (2020), https://yearn.financeGoogle ScholarGoogle Scholar
  43. CryptoCompare: Cryptocompare exchange review, march 2022 (2022), https://www.cryptocompare.com/media/40124872/cryptocompare_exchange_review_2022_03_vf2.pdfGoogle ScholarGoogle Scholar
  44. Curve Finance: Curve.fi (2020), https://www.curve.fi/, accessed: 20-08-2020.Google ScholarGoogle Scholar
  45. Dafflon, J., Baylina, J., Shababi, T.: Eip-777: Erc777 token standard (2017), https://eips.ethereum.org/EIPS/eip-777Google ScholarGoogle Scholar
  46. Daian, P., Goldfeder, S., Kell, T., Li, Y., Zhao, X., Bentov, I., Breidenbach, L., Juels, A.: Flash boys 2.0: Frontrunning, transaction reordering, and consensus instability in decentralized exchanges. arXiv preprint arXiv:1904.05234 (2019)Google ScholarGoogle Scholar
  47. DeFi Pulse: What is defi? (2019), https://defipulse.com/blog/what-is-defi/Google ScholarGoogle Scholar
  48. DeFi Pulse: The decentralized finance leaderboard at defi pulse (2020), https://defipulse.com/Google ScholarGoogle Scholar
  49. Defiant: Iron Finance Implodes After 'Bank Run'. https://thedefiant.io/iron-finance-implodes-after-bank-run (17 June 2021)Google ScholarGoogle Scholar
  50. Defiant, T.: Bsc's venus protocol left with bad debt after liquidations (May 20, 2021), https://thedefiant.io/bscs-venus-protocol-left-with-bad-debt-after-liquidations/Google ScholarGoogle Scholar
  51. dForce: dforce (2020), https://dforce.network/Google ScholarGoogle Scholar
  52. Dubovitskaya, A., Ackerer, D., Xu, J.: A game-theoretic analysis of cross-ledger swaps with packetized payments (2021)Google ScholarGoogle Scholar
  53. dYdX: dydx (2019), https://dydx.exchange/Google ScholarGoogle Scholar
  54. Egorov, M.: Stableswap - efficient mechanism for stablecoin liquidity (2019), https://www.curve.fi/stableswap-paper.pdfGoogle ScholarGoogle Scholar
  55. Eskandari, S., Moosavi, S., Clark, J.: Sok: Transparent dishonesty: front-running attacks on blockchain. In: International Conference on Financial Cryptography and Data Security. pp. 170--189. Springer (2019)Google ScholarGoogle Scholar
  56. ETH Tx Decoder: Transaction analysis (2020), https://ethtx.info/mainnet/0x9d093325272701d63fdafb0af2d89c7e23eaf18be1a51c580d9bce89987a2dc1, accessed: 13-01-2021.Google ScholarGoogle Scholar
  57. Evans, A.: Liquidity provider returns in geometric mean markets. arXiv preprint arXiv:2006.08806 (2020)Google ScholarGoogle Scholar
  58. Feist, J.: Slither - a solidity static analysis framework (2018), https://blog.trailofbits.com/2018/10/19/slither-a-solidity-static-analysis-framework/Google ScholarGoogle Scholar
  59. Feng, F., Weickmann, B.: Set: A protocol for baskets of tokenized assets (2019), https://www.setprotocol.com/pdf/set_protocol_whitepaper.pdfGoogle ScholarGoogle Scholar
  60. Finance, B.: Tweet (14 February 2022), https://twitter.com/finance_build/status/1493223330685591558Google ScholarGoogle Scholar
  61. Flashbots: Flashbots Docs: Understanding Bundles. https://docs.flashbots.net/flashbots-auction/searchers/advanced/understanding-bundles (2022)Google ScholarGoogle Scholar
  62. Foundation, E.: Solidity v0.8.0 documentation (2020), https://docs.soliditylang.org/en/v0.8.0/index.html, accessed: 12-01-2020.Google ScholarGoogle Scholar
  63. Foxley, W.: $10.8m stolen, developers implicated in alleged smart contract 'rug pull'. CoinDesk (2020), https://www.coindesk.com/compounder-developers-implicated-alleged-smart-contract-rug-pullGoogle ScholarGoogle Scholar
  64. Foxley, W., De, N.: Weekend attack drains decentralized protocol dforce of $25m in crypto. CoinDesk (2020), https://www.coindesk.com/attacker-drains-decentralized-protocol-dforce-of-25m-in-weekend-attackGoogle ScholarGoogle Scholar
  65. Foxley, W.: Exploit during ethdenver reveals experimental nature of decentralized finance. CoinDesk (2020), https://www.coindesk.com/exploit-during-ethdenver-reveals-experimental-nature-of-decentralized-financeGoogle ScholarGoogle Scholar
  66. Frangella, E.: Crypto black thursday: The good, the bad, and the ugly. https://medium.com/aave/crypto-black-thursday-the-good-the-bad-and-the-ugly-7f2acebf2b83 (2020), accessed: 20-01-2021.Google ScholarGoogle Scholar
  67. Gnosis: API3 IDO incident - post mortem (2020), https://hackmd.io/@n6YCqowrQduQ5u25wSoRXw/Hylnk7SjDGoogle ScholarGoogle Scholar
  68. Gnosis: Introduction to gnosis protocol (2020), https://docs.gnosis.io/protocol/docs/introduction1/Google ScholarGoogle Scholar
  69. Godbole, O.: Defi flippening comes to exchanges as uniswap topples coinbase in trading volume. CoinDesk (2020), https://www.coindesk.com/defi-flippening-uniswap-topples-coinbase-trading-volumeGoogle ScholarGoogle Scholar
  70. Gudgeon, L., Perez, D., Harz, D., Livshits, B., Gervais, A.: The decentralized financial crisis. In: 2020 Crypto Valley Conference on Blockchain Technology (CVCBT). pp. 1--15 (2020)Google ScholarGoogle ScholarCross RefCross Ref
  71. Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., Gervais, A.: Sok: Off the chain transactions. IACR Cryptol. ePrint Arch. 2019, 360 (2019)Google ScholarGoogle Scholar
  72. Gudgeon, L., Werner, S.M., Perez, D., Knottenbelt, W.J.: Defi protocols for loanable funds: Interest rates, liquidity and market efficiency. In: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. p. 92--112 (2020)Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Hanson, R.: Combinatorial information market design. Information Systems Frontiers 5(1), 107--119 (2003)Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Harper, C.: Defi degens hit hard by eminence exploit will be partially compensated. CoinDesk (2020), https://www.coindesk.com/eminence-exploit-defi-compensatedGoogle ScholarGoogle Scholar
  75. Harvest Finance: Harvest flashloan economic attack post-mortem (2020), https://medium.com/harvest-finance/harvest-flashloan-economic-attack-post-mortem-3cf900d65217, accessed: 29-12-2020.Google ScholarGoogle Scholar
  76. Harz, D., Gudgeon, L., Gervais, A., Knottenbelt, W.J.: Balance: Dynamic adjustment of cryptocurrency deposits. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. pp. 1485--1502 (2019)Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Harz, D., Knottenbelt, W.: Towards safer smart contracts: A survey of languages and verification methods. arXiv preprint arXiv:1809.09805 (2018)Google ScholarGoogle Scholar
  78. Hull, J., et al.: Options, futures and other derivatives/John C. Hull. Upper Saddle River, NJ: Prentice Hall, (2009)Google ScholarGoogle Scholar
  79. Huo, L., Klages-Mundt, A., Minca, A., Munter, F., Wind, M.: Decentralized Governance of Stablecoins with Closed Form Valuation. In Mathematical Research for Blockchain Economy. https://arxiv.org/abs/2109.08939 (2022)Google ScholarGoogle Scholar
  80. IDEX: Idex 2.0: The next generation ofnon-custodial trading. URL: https://idex.io/document/IDEX-2-0-Whitepaper-2019-10-31.pdf (2019)Google ScholarGoogle Scholar
  81. Index: Index: A comprehensive list of decentralized exchanges (dex)., https://distribuyed.github.io/index/Google ScholarGoogle Scholar
  82. Jones, S.P., Eber, J.M., Seward, J.: Composing contracts: an adventure in financial engineering. ACM SIG-PLAN Notices 35(9), 280--292 (2000)Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Judmayer, A., Stifter, N., Zamyatin, A., Tsabary, I., Eyal, I., Gazi, P., Meiklejohn, S., Weippl, E.: Pay to win: Cheap, crowdfundable, cross-chain algorithmic incentive manipulation attacks on pow cryptocurrencies. Cryptology ePrint Archive, Report 2019/775 (2019), https://eprint.iacr.org/2019/775Google ScholarGoogle Scholar
  84. Kaleem, M., Shi, W.: Demystifying pythia: A survey of chainlink oracles usage on ethereum. arXiv preprint arXiv:2101.06781 (2021)Google ScholarGoogle Scholar
  85. Kalodner, H.A., Carlsten, M., Ellenbogen, P., Bonneau, J., Narayanan, A.: An empirical study of namecoin and lessons for decentralized namespace design. In: WEIS. Citeseer (2015)Google ScholarGoogle Scholar
  86. Kalra, S., Goel, S., Dhawan, M., Sharma, S.: ZEUS: analyzing safety of smart contracts. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18--21, 2018. The Internet Society (2018), http://wp.internetsociety.org/ndss/wp-content/uploads/sites/25/2018/02/ndss2018_09-1_Kalra_paper.pdfGoogle ScholarGoogle ScholarCross RefCross Ref
  87. Kao, H.T., Chitra, T., Chiang, R., Morrow, J.: An analysis of the market risk to participants in the compound protocol. In: Third International Symposium on Foundations and Applications of Blockchains (2020)Google ScholarGoogle Scholar
  88. Khatri, Y.: Dai price increase led to a massive $88 million worth of liquidations at defi protocol compound (2020), https://www.theblockcrypto.com/post/85850/dai-compound-dydx-liquidations-defi, accessed: 14-01-2021.Google ScholarGoogle Scholar
  89. Klages-Mundt, A.: Vulnerabilities in maker: oracle-governance attacks, attack daos, and (de)centralization (Nov 14, 2019), https://link.medium.com/VZG64fhmr6Google ScholarGoogle Scholar
  90. Klages-Mundt, A., Harz, D., Gudgeon, L., Liu, J.Y., Minca, A.: Stablecoins 2.0: Economic foundations and risk-based models. In: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. pp. 59--79 (2020)Google ScholarGoogle ScholarDigital LibraryDigital Library
  91. Klages-Mundt, A., Minca, A.: (in) stability for the blockchain: Deleveraging spirals and stablecoin attacks. Cryptoeconomic Systems (2021)Google ScholarGoogle Scholar
  92. Klages-Mundt, A., Minca, A.: While stability lasts: A stochastic model of noncustodial stablecoins. Mathematical Finance (2022)Google ScholarGoogle Scholar
  93. Koeppelmann, M.: Tweet (18 July 2020), https://twitter.com/koeppelmann/status/1284502534208528385Google ScholarGoogle Scholar
  94. Lee, B.E., Moroz, D.J., Parkes, D.C.: The political economy of blockchain governance. Available at SSRN 3537314 (2020)Google ScholarGoogle Scholar
  95. Lee, J.: Nubits (2014), https://nubits.com/NuWhitepaper.pdfGoogle ScholarGoogle Scholar
  96. Lee, L., Klages-Mundt, A.: Governance extractable value (Apr 23, 2021), https://ournetwork.substack.com/p/our-network-deep-dive-2Google ScholarGoogle Scholar
  97. Leshner, R., Hayes, G.: Compound: The money market protocol (2019), https://compound.finance/documents/Compound.Whitepaper.pdfGoogle ScholarGoogle Scholar
  98. Limited, T.: Tether: Fiat currencies on the bitcoin blockchain (2016), https://tether.to/wp-content/uploads/2016/06/TetherWhitePaper.pdf, accessed: 08-06-2020Google ScholarGoogle Scholar
  99. Lin, L.X., Budish, E., Cong, L.W., He, Z., Bergquist, J.H., Panesir, M.S., Kelly, J., Lauer, M., Prinster, R., Zhang, S., et al.: Deconstructing decentralized exchanges. Stanford Journal of Blockchain Law & Policy (2019)Google ScholarGoogle Scholar
  100. Liu, B., Szalachowski, P.: A first look into defi oracles (2020)Google ScholarGoogle Scholar
  101. Liu, M.: Urgent: Ousd was hacked and there has been a loss of funds (2020), https://medium.com/originprotocol/urgent-ousd-has-hacked-and-there-has-been-a-loss-of-funds-7b8c4a7d534c, accessed: 29-12-2020.Google ScholarGoogle Scholar
  102. LongForWisdom: [urgent] flash loans and securing the maker protocol (2020), https://forum.makerdao.com/t/urgent-flash-loans-and-securing-the-maker-protocol/490Google ScholarGoogle Scholar
  103. Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. pp. 254--269 (2016)Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Maker: The maker protocol: Makerdao's multi-collateral dai (mcd) system, https://makerdao.com/en/whitepaper/, accessed: 08-06-2020Google ScholarGoogle Scholar
  105. MakerDAO: Makerdao (2019), https://makerdao.com/en/Google ScholarGoogle Scholar
  106. Martinelli, F., Mushegian, N.: Balancer whitepaper: A non-custodial portfolio manager, liquidity provider, and price sensor. (2019), https://balancer.finance/whitepaper/, accessed: 26-08-2020.Google ScholarGoogle Scholar
  107. McCorry, P., Hicks, A., Meiklejohn, S.: Smart contracts for bribing miners. In: International Conference on Financial Cryptography and Data Security. pp. 3--18. Springer (2018)Google ScholarGoogle Scholar
  108. Nadler, M., Schär, F.: Decentralized finance, centralized ownership? an iterative mapping process to measure protocol token distribution. arXiv preprint arXiv:2012.09306 (2020)Google ScholarGoogle Scholar
  109. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)Google ScholarGoogle Scholar
  110. Narayanan, A., Bonneau, J., Felten, E., Miller, A., Goldfeder, S.: Bitcoin and cryptocurrency technologies: a comprehensive introduction. Princeton University Press (2016)Google ScholarGoogle Scholar
  111. Niemerg, A., Robinson, D., Livnev, L.: Yieldspace. https://yield.is/YieldSpace.pdf (2020)Google ScholarGoogle Scholar
  112. OpenCollective: cadcad (2020), https://cadcad.org/Google ScholarGoogle Scholar
  113. Opyn: Opyn (2020), https://opyn.co/#/Google ScholarGoogle Scholar
  114. opyn: Opyn eth put exploit (2020), https://medium.com/opyn/opyn-eth-put-exploit-c5565c528ad2Google ScholarGoogle Scholar
  115. Panja, S., Roy, B.K.: A secure end-to-end verifiable e-voting system using zero knowledge based blockchain. IACR Cryptol. ePrint Arch. 2018, 466 (2018)Google ScholarGoogle Scholar
  116. PeckShield: 88mph incident: Root cause analysis (2020), https://peckshield.medium.com/88mph-incident-root-cause-analysis-ce477e00a74dGoogle ScholarGoogle Scholar
  117. PeckShield: bzx hack full disclosure (with detailed profit analysis) (2020), https://medium.com/@peckshield/bzx-hack-full-disclosure-with-detailed-profit-analysis-e6b1fa9b18fcGoogle ScholarGoogle Scholar
  118. Peckshield: Value defi incident: Root cause analysis (2020), https://peckshield.medium.com/value-defi-incident-root-cause-analysis-fbab71faf373, accessed: 13-01-2021.Google ScholarGoogle Scholar
  119. Percent Finance: Important announcement (2020), https://percent-finance.medium.com/important-announcement-d35f9a0df112Google ScholarGoogle Scholar
  120. Perez, D., Livshits, B.: Smart contract vulnerabilities: Does anyone care? arXiv preprint arXiv:1902.06710 (2019)Google ScholarGoogle Scholar
  121. Perez, D., Livshits, B.: Broken metre: Attacking resource metering in EVM. In: 27th Annual Network and Distributed System Security Symposium, NDSS 2020, San Diego, California, USA, February 23--26, 2020. The Internet Society (2020), https://www.ndss-symposium.org/ndss-paper/broken-metre-attacking-resource-metering-in-evm/Google ScholarGoogle ScholarCross RefCross Ref
  122. Perez, D., Werner, S.M., Xu, J., Livshits, B.: Liquidations: Defi on a knife-edge. arXiv preprint arXiv:2009.13235 (2020)Google ScholarGoogle Scholar
  123. Perez, D., Xu, J., Livshits, B.: Revisiting transactional statistics of high-scalability blockchains. p. 535--550. IMC '20, Association for Computing Machinery, New York, NY, USA (2020). https://doi.org/10.1145/3419394.3423628 Google ScholarGoogle ScholarDigital LibraryDigital Library
  124. Permenev, A., Dimitrov, D., Tsankov, P., Drachsler-Cohen, D., Vechev, M.: Verx: Safety verification of smart contracts. In: 2020 IEEE Symposium on Security and Privacy, SP. pp. 18--20 (2020)Google ScholarGoogle ScholarCross RefCross Ref
  125. Peterson, J., Krug, J.: Augur: a decentralized, open-source platform for prediction markets. arXiv preprint arXiv:1501.01042 (2015)Google ScholarGoogle Scholar
  126. Pirus, B.: Cheese bank's multi-million-dollar hack explained by security firm (2020), https://cointelegraph.com/news/cheese-bank-s-multi-million-dollar-hack-explained-by-security-firm, accessed: 29-12-2020.Google ScholarGoogle Scholar
  127. Qin, K., Zhou, L., Livshits, B., Gervais, A.: Attacking the defi ecosystem with flash loans for fun and profit (2020)Google ScholarGoogle Scholar
  128. Raman, R.K., Vaculin, R., Hind, M., Remy, S.L., Pissadaki, E.K., Bore, N.K., Daneshvar, R., Srivastava, B., Varshney, K.R.: Trusted multi-party computation and verifiable simulations: A scalable blockchain approach. arXiv preprint arXiv:1809.08438 (2018)Google ScholarGoogle Scholar
  129. Rate, D.: Cream finance partially delists ftt amidst governance contention (2021), https://defirate.com/cream-ftt-delisting/Google ScholarGoogle Scholar
  130. Reijers, W., O'Brolcháin, F., Haynes, P.: Governance in blockchain technologies & social contract theories. Ledger 1, 134--151 (2016)Google ScholarGoogle ScholarCross RefCross Ref
  131. Rekt: Harvest finance - rekt (2020), https://rekt.ghost.io/harvest-finance-rekt/Google ScholarGoogle Scholar
  132. Rekt: Warp finance - rekt (2020), https://rekt.eth.link/warp-inance-rekt/Google ScholarGoogle Scholar
  133. Rekt: The big combo (growth defi - rekt) (2021), https://rekt.eth.link/the-big-combo/Google ScholarGoogle Scholar
  134. Rekt: Dodo - rekt (2021), https://rekt.eth.link/au-dodo-rekt/Google ScholarGoogle Scholar
  135. Rekt: Meerkat finance - bsc - rekt (2021), https://rekt.eth.link/meerkat-finance-bsc-rekt/Google ScholarGoogle Scholar
  136. Rekt: Paid network - rekt (2021), https://rekt.eth.link/paid-rekt/Google ScholarGoogle Scholar
  137. Rekt: Yearn - rekt (2021), https://rekt.eth.link/yearn-rekt/Google ScholarGoogle Scholar
  138. Reynolds, K., Pan, D.: Cover protocol attack perpetrated by 'white hat,' funds returned, hacker claims. CoinDesk (2020), https://www.coindesk.com/cover-protocol-attack-perpetrated-by-white-hat-all-funds-returned-hacker-claimsGoogle ScholarGoogle Scholar
  139. Robinson, D.: Etherum is a dark forest (2020), https://medium.com/@danrobinson/ethereum-is-a-dark-forest-ecc5f0505dff, accessed: 24-11-2020.Google ScholarGoogle Scholar
  140. Rodler, M., Li, W., Karame, G.O., Davi, L.: Sereum: Protecting existing smart contracts against re-entrancy attacks. In: Proceedings of 26th Annual Network & Distributed System Security Symposium (NDSS) (February 2019), http://tubiblio.ulb.tu-darmstadt.de/111410/Google ScholarGoogle ScholarCross RefCross Ref
  141. Roughgarden, T.: Algorithmic game theory. Communications of the ACM 53(7), 78--86 (2010)Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. Roughgarden, T.: Transaction fee mechanism design for the ethereum blockchain: An economic analysis of eip-1559. arXiv preprint arXiv:2012.00854 (2020)Google ScholarGoogle Scholar
  143. samczsun: Escaping the dark forest (2020), https://samczsun.com/escaping-the-dark-forest, accessed: 24-11-2020.Google ScholarGoogle Scholar
  144. Schär, F.: Decentralized finance: On blockchain-and smart contract-based financial markets. FRB of St. Louis Review (2021)Google ScholarGoogle Scholar
  145. Swende, M.: Blockchain frontrunning (2017), https://swende.se/blog/Frontrunning.htmlGoogle ScholarGoogle Scholar
  146. Synthetix: Litepaper (2020), https://docs.synthetix.io/litepaper/, accessed: 06-12-2020Google ScholarGoogle Scholar
  147. Synthetix: Synthetix | decentralised synthetic assets (2020), https://www.synthetix.ioGoogle ScholarGoogle Scholar
  148. Tarasov, A.: Millions lost: The top 19 defi cryptocurrency hacks of 2020 (2020), https://cryptobriefing.com/50-million-lost-the-top-19-defi-cryptocurrency-hacks-2020/Google ScholarGoogle Scholar
  149. Thompson, P.: Defi project pickle finance exploited for $20 million (2020), https://coingeek.com/defi-project-pickle-finance-exploited-for-20-million/Google ScholarGoogle Scholar
  150. Thurman, A.: Value defi protocol suffers $6 million flash loan exploit (2020), https://cointelegraph.com/news/value-defi-protocol-suffers-6-million-flash-loan-exploit, accessed: 29-12-2020.Google ScholarGoogle Scholar
  151. Tokenlon: imbtc (2020), https://tokenlon.im/imBTC#/Google ScholarGoogle Scholar
  152. Tolmach, P., Li, Y., Lin, S.W., Liu, Y.: Formal analysis of composable defi protocols. arXiv preprint arXiv:2103.00540 (2021)Google ScholarGoogle Scholar
  153. Tornado: Tornado (2021), https://tornado.cash/Google ScholarGoogle Scholar
  154. Torres, C.F., Schütte, J., State, R.: Osiris: Hunting for integer bugs in ethereum smart contracts. In: Proceedings of the 34th Annual Computer Security Applications Conference. p. 664--676. ACSAC '18, Association for Computing Machinery, New York, NY, USA (2018). https://doi.org/10.1145/3274694.3274737 Google ScholarGoogle ScholarDigital LibraryDigital Library
  155. Tsankov, P., Dan, A., Drachsler-Cohen, D., Gervais, A., Buenzli, F., Vechev, M.: Securify: Practical security analysis of smart contracts. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. pp. 67--82 (2018)Google ScholarGoogle ScholarDigital LibraryDigital Library
  156. Uniswap: Uniswap (2020), https://app.uniswap.org/#/swapGoogle ScholarGoogle Scholar
  157. Uniswap: Uniswap whitepaper (2020), https://hackmd.io/@HaydenAdams/HJ9jLsfTz#%F0%9F%A6%84-Uniswap-Whitepaper, accessed: 26-08-2020.Google ScholarGoogle Scholar
  158. von Wachter, V., Jensen, J.R., Ross, O.: Measuring asset composability as a proxy for ecosystem integration. arXiv preprint arXiv:2102.04227 (2021)Google ScholarGoogle Scholar
  159. Wallet, W.: Wasabi wallet (2021), https://wasabiwallet.io/Google ScholarGoogle Scholar
  160. Wang, Y., Kogan, A.: Designing confidentiality-preserving blockchain-based transactionprocessing systems. International Journal of Accounting Information Systems 30, 1--18 (2018)Google ScholarGoogle ScholarCross RefCross Ref
  161. Warren, W., Bandeali, A.: 0x: An open protocol for decentralized exchange on the ethereum blockchain. URL: https://github.com/0xProject/whitepaper (2017)Google ScholarGoogle Scholar
  162. Werner, S.M., Pritz, P.J., Perez, D.: Step on the gas? A better approach for recommending the ethereum gas price. arXiv preprint arXiv:2003.03479 (2020)Google ScholarGoogle Scholar
  163. Wintermute, M.: Hegic: On-chain options trading protocol on ethereum powered by hedge contracts and liquidity pools (2020), https://ipfs.io/ipfs/QmWy8x6vEunH4gD2gWT4Bt4bBwWX2KAEUov46tCLvMRcME, accessed: 13-11-2020.Google ScholarGoogle Scholar
  164. Winzer, F., Herd, B., Faust, S.: Temporary censorship attacks in the presence of rational miners. In: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW). pp. 357--366. IEEE (2019)Google ScholarGoogle ScholarCross RefCross Ref
  165. Wood, G., et al.: Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151(2014), 1--32 (2014)Google ScholarGoogle Scholar
  166. Wright, T.: Akropolis defi protocol 'paused' as hackers get away with $2m in dai (2020), https://cointelegraph.com/news/akropolis-defi-protocol-paused-as-hackers-get-away-with-2m-in-dai, accessed: 29-12-2020.Google ScholarGoogle Scholar
  167. Xu, J., Ackerer, D., Dubovitskaya, A.: A game-theoretic analysis of cross-chain atomic swaps with htlcs (2020)Google ScholarGoogle Scholar
  168. YAM: Yam finance (2020), https://yam.finance/Google ScholarGoogle Scholar
  169. YAM Finance: Yam post-rescue attempt update (2020), https://medium.com/@yamfinance/yam-post-rescue-attempt-update-c9c90c05953fGoogle ScholarGoogle Scholar
  170. yearn: Incident disclosure 2021-10-27. https://github.com/yearn/yearn-security/blob/master/disclosures/2021-10-27.md (Oct 27, 2021)Google ScholarGoogle Scholar
  171. Zamyatin, A., Al-Bassam, M., Zindros, D., Kokoris-Kogias, E., Moreno-Sanchez, P., Kiayias, A., Knottenbelt, W.J.: Sok: communication across distributed ledgers. IACR Cryptol. ePrint Arch. (2020)Google ScholarGoogle Scholar
  172. Zamyatin, A., Harz, D., Lind, J., Panayiotou, P., Gervais, A., Knottenbelt, W.: Xclaim: Trustless, interoperable, cryptocurrency-backed assets. In: 2019 IEEE Symposium on Security and Privacy (SP). pp. 193--210. IEEE (2019)Google ScholarGoogle ScholarCross RefCross Ref
  173. Zcash: Zcash (2021), https://z.cash/Google ScholarGoogle Scholar
  174. Zhang, F., Cecchetti, E., Croman, K., Juels, A., Shi, E.: Town crier: An authenticated data feed for smart contracts. In: Proceedings of the 2016 aCM sIGSAC conference on computer and communications security. pp. 270--282 (2016)Google ScholarGoogle ScholarDigital LibraryDigital Library
  175. Zhang, R., Xue, R., Liu, L.: Security and privacy on blockchain. ACM Computing Surveys (CSUR) 52(3), 1--34(2019)Google ScholarGoogle Scholar
  176. Zhang, Y., Chen, X., Park, D.: Formal specification of constant product (xy= k) market maker model and implementation (2018), https://github.com/runtimeverification/verified-smart-contracts/blob/uniswap/uniswap/x-y-k.pdfGoogle ScholarGoogle Scholar
  177. Zhao, W., Li, H., Yuan, Y.: Understand volatility of algorithmic stablecoin: Modeling, verification and empirical analysis. arXiv preprint arXiv:2101.08423 (2021)Google ScholarGoogle Scholar
  178. Zhou, L., Qin, K., Cully, A., Livshits, B., Gervais, A.: On the just-in-time discovery of profit-generating transactions in defi protocols. arXiv preprint arXiv:2103.02228 (2021)Google ScholarGoogle Scholar
  179. Zhou, L., Qin, K., Torres, C.F., Le, D.V., Gervais, A.: High-frequency trading on decentralized on-chain exchanges. arXiv preprint arXiv:2009.14021 (2020)Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    AFT '22: Proceedings of the 4th ACM Conference on Advances in Financial Technologies
    September 2022
    330 pages
    ISBN:9781450398619
    DOI:10.1145/3558535

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 5 July 2023

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader