Skip to main content

Data Independent Order Policy Enforcement: Limitations and Solutions

Publication ,  Conference
Wadhwa, S; Zanolini, L; Asgaonkar, A; D’Amato, F; Fang, C; Zhang, F; Nayak, K
Published in: CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security
December 9, 2024

Order manipulation attacks such as frontrunning and sandwiching have become an increasing concern in blockchain applications such as DeFi. To protect from such attacks, several recent works have designed order policy enforcement (OPE) protocols to order transactions fairly in a data-independent fashion. However, while the manipulation attacks are motivated by monetary profits, the defenses assume honesty among a significantly large set of participants. In existing protocols, if all participants are rational, they may be incentivized to collude and circumvent the order policy without incurring any penalty. This work makes two key contributions. First, we explore whether the need for the honesty assumption is fundamental. Indeed, we show that it is impossible to design OPE protocols under some requirements when all parties are rational. Second, we explore the tradeoffs needed to circumvent the impossibility result. In the process, we propose a novel concept of rationally binding transactions that allows us to construct AnimaguSwap1, the first content-oblivious Automated Market Makers (AMM) interface that is secure under rationality. We report on a prototype implementation of AnimaguSwap and performance evaluation results demonstrating its practicality.

Duke Scholars

Published In

CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security

DOI

Publication Date

December 9, 2024

Start / End Page

378 / 392
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Wadhwa, S., Zanolini, L., Asgaonkar, A., D’Amato, F., Fang, C., Zhang, F., & Nayak, K. (2024). Data Independent Order Policy Enforcement: Limitations and Solutions. In CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (pp. 378–392). https://doi.org/10.1145/3658644.3670367
Wadhwa, S., L. Zanolini, A. Asgaonkar, F. D’Amato, C. Fang, F. Zhang, and K. Nayak. “Data Independent Order Policy Enforcement: Limitations and Solutions.” In CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, 378–92, 2024. https://doi.org/10.1145/3658644.3670367.
Wadhwa S, Zanolini L, Asgaonkar A, D’Amato F, Fang C, Zhang F, et al. Data Independent Order Policy Enforcement: Limitations and Solutions. In: CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security. 2024. p. 378–92.
Wadhwa, S., et al. “Data Independent Order Policy Enforcement: Limitations and Solutions.” CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, 2024, pp. 378–92. Scopus, doi:10.1145/3658644.3670367.
Wadhwa S, Zanolini L, Asgaonkar A, D’Amato F, Fang C, Zhang F, Nayak K. Data Independent Order Policy Enforcement: Limitations and Solutions. CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security. 2024. p. 378–392.

Published In

CCS 2024 - Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security

DOI

Publication Date

December 9, 2024

Start / End Page

378 / 392