Mev On l2
Mev On l2
Mev On l2
Contents
1 Introduction 2
2 Background 2
2.1 Miner Extractable Value . . . . . . . . . . . . . . . . . . . . . . . 2
2.2 Layer 2s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
3 MEV Inspector 6
3.1 Preliminary Knowledge . . . . . . . . . . . . . . . . . . . . . . . 7
3.1.1 Ethereum Clients . . . . . . . . . . . . . . . . . . . . . . . 7
3.1.2 Transaction traces . . . . . . . . . . . . . . . . . . . . . . 7
3.2 mev-inspect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2.1 Running mev-inspect-py on Optimism . . . . . . . . . . . 9
3.3 Running Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4 Results 10
4.1 About The Data . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.2 Optimism . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.3 Polygon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.4 Comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5 Future Work 14
5.1 Cross Domain MEV . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.1.1 Higher Barrier of Entry . . . . . . . . . . . . . . . . . . . 15
5.1.2 Cross Domain Collusion/Sequencer Centralization . . . . 15
5.1.3 Quantifying Cross-Domain MEV . . . . . . . . . . . . . . 15
5.2 Formalizing MEV . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
1
1 Introduction
2021 is the year of roll ups and MEV for the blockchain world. The boom in
DeFI has lead to an increasing dissatisfaction pertaining to low block space/rate
and high gas fees on L1. This resulted in a large interest in L2 scaling solutions,
which move computation and/or data off-chain, posting only a small summary
of activity on L1 while still inheriting the security of Ethereum mainnet. Chains
like Arbitrum have already attracted significant volume and metrics like total
value locked (TVL) are expected to increase rapidly in coming months. In par-
allel to the growing emphasis on L2 technology, Maximal Extractable Value
[1] (MEV) has become a central topic of discussion on blockchain forums and
academic papers. Topics of debate range from whether MEV is inherently detri-
mental to the health of the blockchain ecosystem, to the feasibility of different
solutions designed to mitigate MEV. Since value which can be extracted at the
application layer provides incentive for consensus destabilization, it is important
to render MEV extraction transparent and measurable, at the very least. Based
on this observation, FlashBots, one of the foremost research groups in the space,
developed and released mev inspect.py, a tool which classifies transactions into
different MEV extraction models.
In this project, we study the marriage of these two topics: MEV on L2s. In
summary, our contributions are
1. Summarizing what is currently known about MEV, including main ex-
traction techniques, quantification techniques, and open challenges.
2. Modifying an MEV quantifyer tool to work with GETH traces, deploying
it on Optimism.
2 Background
2.1 Miner Extractable Value
Miner Extractable Value (MEV) [1] was first coined in 2019 by Daian et al
as a measure of the profit miners can make by arbitrarily reordering, includ-
ing, and excluding transactions within the blocks. In Eth1 miners are the only
party that can guarantee the inclusion of a transaction or an MEV opportunity
within a block, hence they are the ones that are supposed to collect the profit
[2]. However, in practice specific users, called searchers, also accrue MEV by
watching the mempool, analyzing blockchain data to detect MEV opportunities
and running bots that automatically submit the respective transactions. These
bots participate in Priority Gas Auctions (PGAs) in an attempt to frontrun
each other by incentivizing miners to execute their transactions first, which
subsequently increases the transaction fees that miners receive [1]. As a result,
miners still accrue a portion of the MEV. After the realization that any par-
ticipant (e.g., miners, searchers, bots) can extract MEV, MEV was renamed to
Maximal Extractable Value.
2
A lot of research has been done on MEV strategies on L1 ETH, with some
of the most common being the following:
1. Decentralized exchange (DEX) arbitrage: Searchers can leverage ineffi-
ciencies in DEXs that offer the same token at different exchange rates [2].
To do so, they can execute atomically in one transaction the following two
orders: 1) an order to buy the token from the pool with the low exchange
rate and 2) and order to sell the token on the pool with the high exchange
rate. To make sure that the orders will both either succeed or fail, they can
use a smart contract called proxy contract that executes multiple orders
atomically within a single transaction.
2. Cyclic arbitrage: Starting with Uniswap2 and the usage of Wrapped Ether
(WETH), it is possible to create pools between any two tokens with the
exchange rates of the pools not being constant [3]. Searchers -or in this
case arbitrageurs- can submit atomic cyclic transactions (a series of DEXs
that start and end with the same asset) to leverage the unbalanced ex-
change rates of the pools [4]. For example, an arbitrageur can submit
transactions to atomically exchange token A for token B, token B for to-
ken C, and then token C for token A to accrue MEV if the product of the
exchange rates is larger than the total amount of transaction fees.
3. Sandwiching: the sandwiching technique is a combination of frontrunning
and backrunning a DEX transaction [5]. Searchers are watching the mem-
pool to identify transactions that present profitable MEV opportunities by
having a significant impact on the price of an asset. After the identifica-
tion of such a transaction, called a victim transaction, their bots submit a
frontrunning transaction and a backrunning one to leverage the exchange
rates variance. For example, suppose that the victim transaction increases
the price of asset A. The bot will submit a frontrunning transaction to
buy A -that will slightly increase the price-, the victim transaction will
then move the price up even more and the backrunning transaction sub-
mitted by the bot to sell A will sell at a price better than the original.
Since most clients order transactions within the blocks according to their
gas fees, bots can do successful sandwich attacks with high probability by
adjusting the gas price of the transactions they submit.
4. Liquidations: the existence of lending protocols on L1 provides searchers
with MEV opportunities. Searchers are monitoring the mempool to detect
borrowers that can be liquidated and run bots that submit transactions
that aim to collect the liquidation fee [2].
MEV is a potentially consensus-destabilizing landscape. In particular, very
profitable MEV opportunities can lead to two different types of attacks: 1)
fee-based attacks [6], where miners fork blocks that include high MEV and
2) time-bandid attacks [5] where miners try to fork a large part of the chain
in order to levy past MEV. For this reason, it is important to mitigate the
3
negative potential consequences of the known MEV strategies. Flahsbots [7]
is a research organization that focuses on shedding light on MEV to enable
searchers to capture MEV opportunities without being frontrun and mitigate
the negative externalities of MEV. Eskandari et al [8] have identified a number
of ways to mitigate front-running attacks on L1, which they classify as follows:
1. deprive miners of the ability to arbitrarily order transactions by enforcing
a specific ordering (transaction sequencing)
2. leverage cryptographic techniques (e.g., commit/reveal) to reduce the vis-
ibility of transactions and ensure confidentiality so that the searchers do
not have the necessary information to engage with frontrunning
3. redesign DApps to inherently eliminate ordering/time dependencies.
In the past months Layer 2s (L2s) have garnered a lot of attention since the
network congestion problem and the high gas fees on Ethereum have pushed
users to find more scalable and less expensive solutions. This growth in scala-
bility solutions built on top of a L1 has brought new challenges and increased
complexity in the potentially consensus-destabilizing MEV landscape. Many of
the L2s have been running only for a few months (e.g., Optimism, Arbitrum)
and hence, very little is known about the state of MEV on L2, the effectiveness
of the MEV strategies, and the vulnerabilities they exploit.
2.2 Layer 2s
Rollups [12] are a L2 scaling paradigm that aims to solve the network congestion
problem by moving computation and state storage off-chain while keeping the
bare minimum of transaction data on chain. There is an on-chain smart contract
which stores the state root, i.e., the Merkle root of the state of the rollup, that
enables fraud detection. In rollups, the transactions are published in batches.
There are two types of rollups:
1. optimistic rollups that optimistically assume correctness until challenged
by on-chain fraud proofs [13]. After a batch is published, any party can
publish within a certain dispute period a fraud proof that shows that one
4
the of the batch’s state transitions was invalid. If the proof is verified, the
invalid batch as well as the following batches will be reverted. While a
long dispute period results in a long finality window it can also act as a
mechanism against censorship attacks.
2. ZK rollups [13, 14] where every batch includes a validity proof -called ZK-
SNARK- that has been computed off-chain and proves the correctness of
the new state. ZK-SNARKS enable instant batch verification and hence
short finality time.
A sequencer [12, 13] is a party that is responsible for executing and storing on
L2 transactions submitted by users, and for submitting the state root of the
batch of the respective state transitions on L1. In L2, sequencers can be chosen
in multiple ways with the most common being the centralized sequencer, i.e., a
single operator that can submit batches. While this is an efficient solution, it
relies on a single actor for liveness and hence introduces centralization in the
L2s. One simple way to decentralize the sequencer would be to still use one
sequencer at a time but use a mechanism to rotate the sequencers. As discussed
in Section 2.1, sequencer auctions (e,g,, MEVA [9]) and FSS [11, 10] developed
by Chainlink can decentralize the sequencer and increase trust-minimization.
In optimistic rollups sequencers play a major role and factoring in that they
can introduce centralization into the system, it is important to understand how
they work. Users send transactions to the sequencer, who checks their validity,
executes them, and rolls the resulted state transitions up in a batch that will
submit on L1 for finalization. Since the sequencers are the actors that choose
the transactions that will be included in the next block, a concern that arises is
whether the sequencer can censor transactions and how can the liveness of the
system be ensured in case the rollup has a centralized sequencer that suddenly
goes offline. Sequencers are required to include users’ transactions in a block
within a time window called “forced inclusion period” [15]. If the sequencer
does not include some user transactions (called “forced transactions”) within
that period, the next L2 block will include only those forced transactions. This
mechanism -that is enforced via fraud proofs- essentially allows the users to
bypass the sequencer if needed and submit transactions directly to L1.
Another EVM compatible L2 solution that uses optimistic rollups -this time
with multi-round fraud proofs- to increase Ethereum’s capacity, scale dApps,
5
and decrease transaction costs is Arbitrum [18]. Abtitrum used a centralized
sequencer, but it is currently exploring Chainlink’s FSS [11], a decentralized
transaction ordering solution that helps decentralize the sequencer and ensure
fair ordering by using decentralized oracle networks to collect transactions from
users, order them, and submit them to L1. An important characteristic of Ar-
bitrum that is related to MEV opportunities is that there is no mempool for
bots to frontrun. Of course, it is possible for mempools to arise in applications.
3 MEV Inspector
In the introduction we argued for the importance to create tools that help us
better understand and quantify MEV. Rollups are gaining traction this year
and therefore it’s important to make them as transparent as possible from the
start. Ideally, they are where most of the application-layer volume will flow to
in the Ethereum ecosystem and therefore making them as trustworthy as pos-
sible is imperative. This is in accordance with the current vision of making the
Ethereum mainnet less congested and reducing it’s main use to becoming the
execution layer for scalability solutions.
To quantify the amount of MEV extracted on Ethereum mainnet Flashbots have
built mev-inspect-py. Mev-inspect-py categorises each transaction by comput-
ing the transaction traces and then if the transaction pattern fits with one of
the patterns identified as MEV it quantifies how large the extraction was and
adds it to a SQL database. As, unfortunately, happens with most codebases
we can’t take mev-inspect-py out of the box and implement it on other chains.
In order to understand the limitations and what to modify we will first provide
some information on the different Ethereum clients and how they implement
transaction traces. We will then discuss how mev-inspect-py works, the neces-
sary modifications implemented by the Marlin Protocol team to get it to work
on Polygon, and how we have gotten it to work on Optimism.
6
3.1 Preliminary Knowledge
In order to understand how mev-inspect-py works and what the problem with
it’s initial implementations were we will briefly discuss Ethereum clients and
how they implement transaction traces.
7
every single call made by the transaction with the input parameters and recipi-
ent address of the call. This is, in fact, all that is needed to classify a transaction
for MEV since by using ABI to decode calldata of known formats. We can get
transaction traces by calling the ‘track block‘ api endpoint on a Parity client.
Unfortunately, L2 clients have been developed with forks of Geth which trace
transactions slightly differently. The basic transaction trace that Geth produces
are raw EVM opcode traces. For every VM instruction, the transaction exe-
cution returns an entry with what the stack, memory and storage are at that
point in the execution. This is clearly a lot more information than we need.
To solve this problem the Marlin Protocol implemented a filter of the traces to
get an output that resembles that of Parity which, with some other necessary
modifications, can then run in mev-inspect-py.
To summarise, mev-inspect-py was initially developed to work with Parity-like
traces. However, the L2s which we considered have developed clients that are
forks of Geth. This means that in order to run the software we need to modify
the program to accept Geth traces by modifying the output of the filtered geth
traces to being equivalent with Parity traces.
3.2 mev-inspect
mev-inspect-py is a software created by Flashbots with the aim of identifying,
classifying and quantifying MEV on Ethereum with the aim of ”illuminating
the dark forest”. Before they developed this there was only anecdotal informa-
tion of how much MEV was being extracted on Ethereum and who the major
players were. mev-inspect-py works by analysing the transaction traces of each
Ethereum block, classifying them according to whether the transaction can be
classified as MEV, so whether the transaction is an arbitrage or liquidation and,
finally save all of these results to a sql database. We now give some clarifica-
tions on how mev-inspect works by looking at the function inspect block() which
classifies all transactions inside a block.
1. Along with the block we want to inspect we provide client endpoint and
a sql db to the function.
2. We then fetch all the information from the block which we will require
to classify. That is: transaction traces, transaction receipts and block
metadata (timestamp, miner, base fee)
3. Using the traces classify the traces for each transaction. The developers
created specs for each protocol / exchange that they wanted to analyse,
they included the ABI (application binary interface) for all functions that
could be called which could be included in a transaction with MEV (e.g
swap() for a uniswap pool). Then the software iterates through each trans-
action and checks whether the calls we identified when tracing correspond
to any of these specs. If the classifier is successful we save it.
4. The classified traces are then further refined to check for different types
of MEV: arbitrages, liquidations, punk snipes. For each of these we can
8
calculate what the value generated by the transaction was and how much
profit was paid to the miner.
As we discussed, mev-inspect-py was initially implemented with Parity-like
traces. The modifications that the Marlin protocol implemented which we then
piggy-backed on to run it on Optimism. These modifications were mainly at the
tracing level, in order to make the Geth traces compatible with the mev-inspect
format they used filtered tracing and modified the output to complement.
9
4 Results
4.1 About The Data
The measure of the value of each transaction must be considered as an approx-
imation and not an exact value for the following reasons:
• We were only able to access hourly historical price data. Hence, in times
of extreme volatility, the value at the exact moment of transaction may
be quite far removed from the value we used.
4.2 Optimism
Optimism Geth tracing has been available since the 11 of November. We ran
our implementation of mev-inspect over the entirety of the chain from that date
(obtained from our own node). The results, at first, may be somewhat surpris-
ing. We only found four arbitrageurs and a meager total profit of $34K (almost
exclusively using ETH).
Some potential explanation for such low MEV could be the immaturity of the
network and the lack of volume and exchanges that come hand in hand with
that. It is possible that our script captured a small percentage of the total ar-
bitrage revenue. The strongest explanation, however, comes out when one digs
a little deeper. Up until today (17 December ’21), Optimism has reserved a
whitelist of accounts allowed to launch smart contracts on the network. Since
most arbitrage relies on an atomic group of swaps facilitated by a smart con-
tract, traditional arbitrage was nigh impossible up until recently.
The question then becomes how, in the absence of the ability to create contracts
for atomic arbitrage, any arbitrage took place. The answer lies in the contracts
which were already launched by the whitelist. Uniswap for example, maintains
a ”router” contract which facilitates swaps between multiple pools. Traditional
MEV searchers do not use the router because it is gas inefficient and conspic-
uous, rendering one vulnerable to frontrunning. All of the arbitrage found on
optimism ran through such routers.
Since routers are specific to exchanges, no inter-exchange arbitrage was possi-
ble. This is traditionally where most of the opportunity lies so we anticipate a
significant increase in arbitrage on Optimism in the weeks to come, as any EOA
is now able to launch a smart contract.
10
4.3 Polygon
Our analysis is based on work done by Marlin Protocol, who supplied us with a
database of transactions identified as arbitrages along with the related increase
in token. The main reason we sourced this data from another party is that,
due to Polygon’s block size and rate, simulating and tracing transactions can
be executed at only slightly faster than the network speed, making this a very
expensive process (note: event-based tracing significantly improves this process,
but it still remains expensive). In order to complete the data supplied by the
team from Marlin, we needed to collect data from several API providers to 1)
11
12
map token addresses to token symbols, 2) retrieve historical price data 3) map
block numbers to block hashes and then block timestamps.
Interestingly, almost half of the 3.7 million total revenue was generated in a
week, with 5.8 million coming in on a single day. After some digging, we found
that this spike in arbitrage revenue correlates with the collapse of Titan Token.
We hypothesise that the collapse of the token lead to a spike in price fluctuation,
opening up the opportunity for arbitrage.
The largest arbitrage revenue on Polygon came in at $726K on the 16th
of June. This is the same day in which 5.8 million profit was taken, the
largest recorded day. The majority of arbitrages started and finished in MATIC
(%63.7), followed by ETH (%20.6) and USDC (%15.3). It is unclear why these
tokens are chosen over others. The attraction of USDC is clear as a stable asset.
It may be that MATIC also has appeal for gas reasons as it is the native token
on Polygon. Other factors may include volume and volatility of the respective
tokens, but this remains an open question.
4.4 Comparison
Comparing the scale of arbitrage between Polygon and Optimism seems to be
a somewhat uninformative venture. Even accounting for the longer time period
over which arbitrage in Polygon was measured, arbitrage on Polygon is two or-
ders of magnitude greater than Optimism.
Scale being out of the question, we consider the efficiency of the arbitrageurs:
• Revenue per arbitrage opportunity on Optimism is approximately $22.61
• Revenue per arbitrage opportunity on Polygon is approximately $4.09
this significant difference can be explained by the high ratio of failed ot succeeded
arbitrage transactions on Polygon as explained in the background section. Since
gas on Polygon is so cheap, a trial and error method with very little filtering for
bad transactions leads to such a low return per transaction.
4.5 Conclusion
We set out to analyse MEV on L2 scaling solutions. In the process of doing so,
we ran multiple versions of Optimism and Arbitrum’s clients, spoke to multiple
well-known founders, downloaded a very large fraction of the Polygon chain and
accessed more API’s than we would like to remember. The conclusions were
not straightforward clean insights as one would hope for, but this is a feature
of such a new field. In a sense, we feel we have been too early. Arbitrum’s
tracing functionality is set to come out in the next few weeks and arbitrage on
Optimism has likely already picked up significantly in the last day since the
whitelist has been removed.
What we have done is learned that MEV profits are concentrated in a handful of
13
tokens, that large events that cause extreme volatility like the collapse of Titan
Token contribute a disproportionate amount to total arbitrage revenues and
established a methodology through which future analysis of single-domain MEV
can be conducted. We plan to continue our analysis, setting up dashboards,
incorporating more forms of MEV and developing finer-grained insights as the
space develops.
5 Future Work
We have ported the MEV Inspector tool to work with GETH traces, deployed
it on Optimism, and analyzed results on Polygon (data courtesy of the Poly-
gon guys) and Optimism. There are two main limitations. First, the tool
only scrapes and classifies traces of a single blockchain, but we live in a multi-
chain world. For as long as multiple self-contained domains exists, the ordering
matters not only within chain but also between chains (Section 5.1). Second,
only arbitrages and liquidations are currently quantified. As the community is
reporting new forms of MEV which are long tail, more subtle, potentially appli-
cation specific, theory is struggling to keep up. To better characterise existing
MEV opportunities, predict novel ones, and design MEV mitigation strategies,
we first need to agree on a formalization of MEV (Section 5.2).
14
5.1.1 Higher Barrier of Entry
A single-domain arbitrage opportunity could be captured by a player with a
small capital investment completely at a fee using flash loans or partially cap-
tured with their own capital. In contrast, extending flash loans to the multi-
domain setting (i.e., lend on one domain, pay on another domain) is unclear.
Further, players could risk failed execution due to non-atomicity of the trade
and large cross domain delays.
Instead, the optimal MEV extractor would have a large reserve of the main
tokens (e.g.: WETH, MATIC, USDC) on multiple domains. As soon as an arbi-
trage opportunity presents itself, the agent could directly execute the arbitrage
path on their respective domains, bypassing the cost and delay of cross-domain
communication completely. This clearly has a lower operation cost than relying
on technologies like bridges along with a higher chance of success, which is why
platforms offering cross-domain arbitrage paths suggest this strategy1 . In short,
cross domain MEV will have a higher barrier of entry.
15
Figure 3: Arbitrage between Polygon and Ethereum.
extraction occurs over the span of multiple transactions or blocks, this will not
be included in the final value we report.
Even if we kept expanding our set of models, there are still cases which can
never be quantified, such as when one entity owns multiple wallets. Without
making additional assumptions on how players use different wallets with differ-
ent public keys, it is impossible (as well as computationally infeasible) to cluster
public keys into players and track MEV based on players instead of public keys.
Different public keys on different domains is exactly why cross domain MEV
may also be more opaque than single-domain MEV.
16
traders to provide some form of economic incentive to the miners (e.g., gas
fees, bundle payments, etc.), and this requires upfront capital. Another
level up in terms of costs as well as (potential) profits could be by running
a mining node or locking up stake in order to influence transaction orders.
3. Beyond Single-Block: More subtle types of MEV could occur over the
span of multiple blocks and/or domains.
4. Non-miner MEV: A blockchain ecosystem contains many different actor
roles, each with their own action space, which can be used to influence the
final block ordering (directly as a miner or indirectly otherwise) to extract
MEV.
Note that Eq. 2 does not achieve all of the properties listed above. First, it
depends on p, and therefore, p’s reputation. Instead, to get a permissionless
definition of MEV which does not depend on the player, we can take the mini-
mum MEV over the set of all possible players to get the value extractable by the
least priviledged player. Second, this definition lumps together MEV extractable
by any player regardless of their initial balance. Third, while the definition ac-
counts for multi-block MEV extraction, it does not account for multi-domain
MEV, or actions other than block proposal for MEV extraction. Finally, the
action space here is clearly in the block ordering, and doesn’t account for MEV
extractable by, say, traders.
Drawing from Obadia et al. and Salles, we can patch this definition up to
achieve the properties we want. To achieve the permissionless property, the
MEV should be a quantity independent of the player, which we can achieve by
taking the minimum MEV over all players. Instead, MEV should be dependent
on the investment capital of this least priviledged player to achieve the second
property. To go beyond miner MEV, we can use a generalized notion of action
spaces instead of just block sequences. Going beyond single block, we would
17
incorporate the sum of extractable values for some player over all domains as a
function of the actions they can take on all of these different domains together.
Putting it all together, a patched definition of MEV in some state s for any player
with a balance of at least K, a combined action space A(p) = A1 ∪ . . . An , and
combined balance B(p) = B1 ∪ . . . Bn over domains i ∈ [n] is
X
M EV (s; K) = P min max evb (p, s, a1 , . . . , an )
{p∈P| b(p,s)≥K} a1 ,...,an ∈A(p)
b∈B(p) b∈B(p)
(3)
This definition seems to align well with our current understanding of MEV.
For instance, a larger combined action space A can only increase MEV. This
makes sense in light of our discussion about sequencer centralization (Sec. 5.1.2).
We can also understand fair consensus protocols or proposer-builder separation
as mechanisms for reducing the action space of certain players. We can also
articulate what is the ideal case for MEV if we can’t completely prevent it. For
example, we might want MEV to be close to a linear function of K, implying
low barrier of entry (since players with any amount of initial capital can extract
an amount of profit proportional to their investment).
References
[1] Philip Daian et al. “Flash Boys 2.0: Frontrunning, Transaction Reorder-
ing, and Consensus Instability in Decentralized Exchanges”. In: CoRR
abs/1904.05234 (2019). arXiv: 1904.05234. url: http://arxiv.org/
abs/1904.05234.
[2] MINER EXTRACTABLE VALUE (MEV). 2021. url: https://ethereum.
org/en/developers/docs/mev/ (visited on 12/15/2021).
[3] Uniswap V2 Overview. 2020. url: https://uniswap.org/blog/uniswap-
v2 (visited on 12/14/2021).
[4] Ye Wang et al. “Cyclic Arbitrage in Decentralized Exchange Markets”.
In: Available at SSRN 3834535 (2021). arXiv: 2105.02784. url: https:
//arxiv.org/abs/2105.02784.
[5] Zhou Liyi et al. “High-Frequency Trading on Decentralized On-Chain Ex-
changes”. In: 2021 IEEE Symposium on Security and Privacy (SP). IEEE
(2020). arXiv: 2009.14021. url: https://arxiv.org/abs/2009.14021.
[6] Carlsten Miles et al. “On the Instability of Bitcoin Without the Block
Reward”. In: Proceedings of the 2016 ACM SIGSAC Conference on Com-
puter and Communications Security. 2016, pp. 154–167. isbn: 9781450341394.
doi: 10 . 1145 / 2976749 . 2978408. url: https : / / doi . org / 10 . 1145 /
2976749.2978408.
[7] welcome to flashbots. url: https://docs.flashbots.net/ (visited on
12/15/2021).
18
[8] Eskandari Shayan, Moosavi Mahsa, and Clark Jeremy. “SoK: Transparent
Dishonesty: Front-Running Attacks on Blockchain”. In: FC 2019: Finan-
cial Cryptography and Data Security, Available at SSRN (2019). url:
https://ssrn.com/abstract=3369236.
[9] Karl Floersch. MEV Auction: Auctioning transaction ordering rights as a
solution to Miner Extractable Value. 2020. url: https://ethresear.ch/
t/mev- auction- auctioning- transaction- ordering- rights- as- a-
solution-to-miner-extractable-value/6788 (visited on 12/14/2021).
[10] Ari Juels, Lorenz Breidenbach, and Florian Tramèr. Fair Sequencing Ser-
vices: Enabling a Provably Fair DeFi Ecosystem. 2020. url: https://
blog.chain.link/chainlink-fair-sequencing-services-enabling-
a-provably-fair-defi-ecosystem/ (visited on 12/14/2021).
[11] Creating a Highly Scalable and MEV-Resistant DeFi Ecosystem Using Ar-
bitrum and Fair Sequencing Services. 2021. url: https://blog.chain.
link/arbitrum-and-chainlink-fair-sequencing-services/ (visited
on 12/14/2021).
[12] An Incomplete Guide to Rollups. 2021. url: https : / / vitalik . ca /
general/2021/01/05/rollup.html (visited on 12/15/2021).
[13] (Almost) Everything you need to know about Optimistic Rollup. 2021. url:
https://research.paradigm.xyz/rollups (visited on 12/15/2021).
[14] LAYER 2 ROLLUPS. 2021. url: https://ethereum.org/en/developers/
docs/scaling/layer-2-rollups/ (visited on 12/15/2021).
[15] Optimistic Sequencing. url: https://community.optimism.io/docs/
protocol/sequencing.html (visited on 12/15/2021).
[16] OPTIMISTIC ETHEREUM. url: hhttps://www.optimism.io/ (visited
on 12/15/2021).
[17] Optimism API. url: https : / / docs . alchemy . com / alchemy / apis /
optimism-api (visited on 12/15/2021).
[18] ARBITRUM. url: https://arbitrum.io/ (visited on 12/15/2021).
[19] polygon - Ethereum’s Internet of Blockchains. url: https://polygon.
technology/ (visited on 12/15/2021).
[20] Robert Miller. MEV negative externalities. url: https://twitter.com/
bertcmiller/status/1412579402345586696 (visited on 12/15/2021).
[21] Tweet - Client Incentive Program. 2021. url: https://twitter.com/
AyaMiyagotchi/status/1470654120180649986 (visited on 12/15/2021).
[22] Ethereum Nodes Data. 2021. url: https://www.ethernodes.org/ (vis-
ited on 12/16/2021).
[23] Alexandre Obadia et al. Unity is Strength: A Formalization of Cross-
Domain Maximal Extractable Value. 2021. arXiv: 2112.01472 [cs.CR].
19
[24] Kushal Babel et al. “Clockwork Finance: Automated Analysis of Economic
Security in Smart Contracts”. In: CoRR abs/2109.04347 (2021). arXiv:
2109.04347. url: https://arxiv.org/abs/2109.04347.
[25] Alejo Salles. On the Formalization of MEV. 2021. url: https://writings.
flashbots.net/research/formalization-mev/#current-mev-definitions
(visited on 12/13/2021).
20