Disentangling Decentralized Finance (DeFi) Compositions
- URL: http://arxiv.org/abs/2111.11933v2
- Date: Fri, 30 Sep 2022 12:42:56 GMT
- Title: Disentangling Decentralized Finance (DeFi) Compositions
- Authors: Stefan Kitzler and Friedhelm Victor and Pietro Saggese and Bernhard
Haslhofer
- Abstract summary: Decentralized Finance protocols aim to disrupt traditional finance and offer services on top of distributed ledgers.
We study the interactions of protocols and associated smart contracts.
We propose an algorithm to decompose a protocol call into a nested set of building blocks that may be part of other DeFi protocols.
- Score: 1.7205106391379026
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: We present a measurement study on compositions of Decentralized Finance
protocols, which aim to disrupt traditional finance and offer services on top
of distributed ledgers, such as Ethereum. DeFi compositions may impact the
development of ecosystem interoperability, are increasingly integrated with web
technologies, and may introduce risks through complexity. Starting from a
dataset of 23 labeled DeFi protocols and 10,663,881 associated Ethereum
accounts, we study the interactions of protocols and associated smart
contracts. From a network perspective, we find that decentralized exchanges and
lending protocols have high degree and centrality values, that interactions
among protocol nodes primarily occur in a strongly connected component, and
that known community detection methods cannot disentangle DeFi protocols.
Therefore, we propose an algorithm to decompose a protocol call into a nested
set of building blocks that may be part of other DeFi protocols. With a ground
truth dataset we have collected, we can demonstrate the algorithm's capability
by finding that swaps are the most frequently used building blocks. As building
blocks can be nested, i.e., contained in each other, we provide visualizations
of composition trees for deeper inspections. We also present a broad picture of
DeFi compositions by extracting and flattening the entire nested building block
structure across multiple DeFi protocols. Finally, to demonstrate the
practicality of our approach, we present a case study that is inspired by the
recent collapse of the UST stablecoin in the Terra ecosystem. Under the
hypothetical assumption that the stablecoin USD Tether would experience a
similar fate, we study which building blocks and, thereby, DeFi protocols would
be affected. Overall, our results and methods contribute to a better
understanding of a new family of financial products.
Related papers
- The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - IT Strategic alignment in the decentralized finance (DeFi): CBDC and digital currencies [49.1574468325115]
Decentralized finance (DeFi) is a disruptive-based financial infrastructure.
This paper seeks to answer two main questions 1) What are the common IT elements in the DeFi?
And 2) How the elements to the IT strategic alignment in DeFi?
arXiv Detail & Related papers (2024-05-17T10:19:20Z) - SoK: Decentralized Finance (DeFi) -- Fundamentals, Taxonomy and Risks [0.40462801392105]
Decentralized Finance (DeFi) refers to financial services that are not necessarily related to crypto-currencies.
This work systematically presents the major categories of DeFi protocols that cover over 90% of total value locked (TVL) in DeFi.
Every DeFi protocol is classified into one of three groups: liquidity pools, pegged and synthetic tokens, and aggregator protocols, followed by risk analysis.
arXiv Detail & Related papers (2024-04-17T11:42:53Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Trustless Privacy-Preserving Data Aggregation on Ethereum with Hypercube Network Topology [0.0]
We have proposed a scalable privacy-preserving data aggregation protocol for summation on the blockchain.
The protocol consists of four stages as contract deployment, user registration, private submission and proof verification.
arXiv Detail & Related papers (2023-08-29T12:51:26Z) - PTTS: Zero-Knowledge Proof-based Private Token Transfer System on Ethereum Blockchain and its Network Flow Based Balance Range Privacy Attack Analysis [0.0]
We propose a Private Token Transfer System (PTTS) for the public blockchain.
For the proposed framework, zero-knowledge based protocol has been designed using Zokrates and integrated into our private token smart contract.
In the second part of the paper, we provide security and privacy analysis including the replay attack and the balance range privacy attack.
arXiv Detail & Related papers (2023-08-29T09:13:31Z) - FedChain: An Efficient and Secure Consensus Protocol based on Proof of Useful Federated Learning for Blockchain [0.3480973072524161]
The core of the blockchain is the consensus protocol, which establishes consensus among all the participants.
We propose an efficient and secure consensus protocol based on proof of useful federated learning for blockchain (called FedChain)
Our approach has been tested and validated through extensive experiments, demonstrating its performance.
arXiv Detail & Related papers (2023-08-29T08:04:07Z) - Leveraging Machine Learning for Multichain DeFi Fraud Detection [5.213509776274283]
We present a framework for extracting features from different chains, including the largest one, and it is evaluated over an extensive dataset.
Different Machine Learning methods were employed, such as XGBoost and a Neural Network for identifying fraud accounts detection interacting with DeFi.
We demonstrate that the introduction of novel DeFi-related features, significantly improves the evaluation results.
arXiv Detail & Related papers (2023-05-17T15:48:21Z) - QuTE: decentralized multiple testing on sensor networks with false
discovery rate control [130.7122910646076]
This paper designs methods for decentralized multiple hypothesis testing on graphs equipped with provable guarantees on the false discovery rate (FDR)
We consider the setting where distinct agents reside on the nodes of an undirected graph, and each agent possesses p-values corresponding to one or more hypotheses local to its node.
Each agent must individually decide whether to reject one or more of its local hypotheses by only communicating with its neighbors, with the joint aim that the global FDR over the entire graph must be controlled at a predefined level.
arXiv Detail & Related papers (2022-10-09T19:48:39Z) - Is Vertical Logistic Regression Privacy-Preserving? A Comprehensive
Privacy Analysis and Beyond [57.10914865054868]
We consider vertical logistic regression (VLR) trained with mini-batch descent gradient.
We provide a comprehensive and rigorous privacy analysis of VLR in a class of open-source Federated Learning frameworks.
arXiv Detail & Related papers (2022-07-19T05:47:30Z) - ESCORT: Ethereum Smart COntRacTs Vulnerability Detection using Deep
Neural Network and Transfer Learning [80.85273827468063]
Existing machine learning-based vulnerability detection methods are limited and only inspect whether the smart contract is vulnerable.
We propose ESCORT, the first Deep Neural Network (DNN)-based vulnerability detection framework for smart contracts.
We show that ESCORT achieves an average F1-score of 95% on six vulnerability types and the detection time is 0.02 seconds per contract.
arXiv Detail & Related papers (2021-03-23T15:04:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.