{"title":"Multiblock MEV opportunities & protections in dynamic AMMs","authors":"Matthew Willetts, Christian Harrington","doi":"arxiv-2404.15489","DOIUrl":null,"url":null,"abstract":"Maximal Extractable Value (MEV) in Constant Function Market Making is fairly\nwell understood. Does having dynamic weights, as found in liquidity boostrap\npools (LBPs), Temporal-function market makers (TFMMs), and Replicating market\nmakers (RMMs), introduce new attack vectors? In this paper we explore how\ninter-block weight changes can be analogous to trades, and can potentially lead\nto a multi-block MEV attack. New inter-block protections required to guard\nagainst this new attack vector are analysed. We also carry our a raft of\nnumerical simulations, more than 450 million potential attack scenarios,\nshowing both successful attacks and successful defense.","PeriodicalId":501478,"journal":{"name":"arXiv - QuantFin - Trading and Market Microstructure","volume":"101 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - QuantFin - Trading and Market Microstructure","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2404.15489","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Maximal Extractable Value (MEV) in Constant Function Market Making is fairly
well understood. Does having dynamic weights, as found in liquidity boostrap
pools (LBPs), Temporal-function market makers (TFMMs), and Replicating market
makers (RMMs), introduce new attack vectors? In this paper we explore how
inter-block weight changes can be analogous to trades, and can potentially lead
to a multi-block MEV attack. New inter-block protections required to guard
against this new attack vector are analysed. We also carry our a raft of
numerical simulations, more than 450 million potential attack scenarios,
showing both successful attacks and successful defense.