Repository logo
  • Log In
    Log in via Symplectic to deposit your publication(s).
Repository logo
  • Communities & Collections
  • Research Outputs
  • Statistics
  • Log In
    Log in via Symplectic to deposit your publication(s).
  1. Home
  2. Faculty of Engineering
  3. Computing
  4. Computing
  5. Demystifying Just-in-Time (JIT) liquidity attacks on Uniswap V3
 
  • Details
Demystifying Just-in-Time (JIT) liquidity attacks on Uniswap V3
File(s)
2023-973.pdf (1.15 MB)
Accepted version
Author(s)
Xiong, Xihan
Wang, zhipeng
Knottenbelt, William
Huth, Michael
Type
Conference Paper
Abstract
Uniswap is currently the most liquid Decentralized
Exchange (DEX) on Ethereum. In May 2021, it upgraded to the third protocol version named Uniswap V3. The key feature update is “concentrated liquidity”, which supports liquidity provision within custom price ranges. However, this design introduces a new type of Miner Extractable Value (MEV) source called Just-in-Time (JIT) liquidity attack, where the adversary mints and burns a liquidity position right before and after a sizable swap. We begin by formally defining the JIT liquidity attack and
subsequently conduct empirical measurements on Ethereum. Over a span of 20 months, we identify 36,671 such attacks, which have collectively generated profits of 7,498 ETH. Our analysis suggests that the JIT liquidity attack essentially represents a whales’ game, predominantly controlled by a select few bots. The most active bot, identified as 0xa57...6CF, has managed to amass 92% of the total profit. Furthermore, we find that this attack strategy poses significant entry barriers, as it necessitates adversaries to provide liquidity that is, on average, 269 times greater than the swap volume. In addition, our findings reveal that the JIT liquidity attack exhibits relatively poor pr ofitability, with an average Return On Investment (ROI) of merely 0.007%. We also
find this type of attack to be detrimental to existing Liquidity Providers (LPs) within the pool, as their shares of liquidity undergo an average dilution of 85%. On the contrary, this attack proves advantageous for liquidity takers, who secure execution prices that are, on average, 0.139% better than before. We further dissect the behaviors of the top MEV bots and evaluate their
strategies through local simulation. Our observations reveal that the most active bot, 0xa57...6CF, conducted 27% of non-optimal attacks, thereby failing to capture at least 7,766 ETH (equivalent to 16.1M USD) of the potential attack profit.
Date Issued
2023-11-17
Date Acceptance
2023-07-31
Citation
Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services, 2023, 5
URI
http://hdl.handle.net/10044/1/106055
URL
https://ieeexplore.ieee.org/document/10316935
DOI
https://www.dx.doi.org/10.1109/BRAINS59668.2023.10316935
ISBN
979-8-3503-1782-4
ISSN
2835-3021
Publisher
IEEE
Journal / Book Title
Proceedings of the 5th Conference on Blockchain Research & Applications for Innovative Networks and Services
Volume
5
Copyright Statement
Copyright © 2023 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.
Identifier
https://ieeexplore.ieee.org/document/10316935
Source
2023 5th Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)
Publication Status
Published
Start Date
2023-10-11
Finish Date
2023-10-13
Coverage Spatial
Paris, France
Date Publish Online
2023-11-17
About
Spiral Depositing with Spiral Publishing with Spiral Symplectic
Contact us
Open access team Report an issue
Other Services
Scholarly Communications Library Services
logo

Imperial College London

South Kensington Campus

London SW7 2AZ, UK

tel: +44 (0)20 7589 5111

Accessibility Modern slavery statement Cookie Policy

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback