DEF CON 29 Blockchain Village - Gokul Alex, Tejaswa Rastogi - Preventing Sandwich Attacks

preview_player
Показать описание
A sandwich attack is Upon observing a trade of asset X for asset Y, an attacker front runs the victim trade by also buying asset Y, lets the victim execute the trade, and then back runs (executes after) the victim by trading back the amount gained in the first trade. Intuitively, one uses the knowledge that someone’s going to buy an asset, and that this trade will increase its price, to make a profit. The attacker’s plan is to buy this asset cheap, let the victim buy at an increased price, and then sell the received amount again at a higher price afterwards.

Our solution is the convergence of our research work in the space of Ethereum Security, Zero Knowledge Proofs, Verifiable Delay Functions, Verifiable Random Functions, Hash Time Locks, Polynomial Commitments, Pedersen Hash Functions, Hash Time Locked Contracts , Ring Signatures, Lattice Cryptography, Super Singular Isogenies etc. over the last one year. We have come up with a one of the first solution architecture combining Ring Signatures, Zero Knowledge Databases, Super Singular Isogenies and Hash Time Locks to prevent the manipulation of block time, block header and block body indexes.
Рекомендации по теме