AI Ethics on Blockchain: Topic Analysis on Twitter Data for Blockchain
Security
- URL: http://arxiv.org/abs/2212.06951v5
- Date: Sat, 8 Jul 2023 10:00:29 GMT
- Title: AI Ethics on Blockchain: Topic Analysis on Twitter Data for Blockchain
Security
- Authors: Yihang Fu, Zesen Zhuang, Luyao Zhang
- Abstract summary: Existing research recognizes MEV as a severe security issue and proposes potential solutions, including prominent Flashbots.
We applied natural language processing (NLP) methods to comprehensively analyze topics in tweets on MEV.
Our results show that the tweets discussed profound topics of ethical concern, including security, equity, emotional sentiments, and the desire for solutions to MEV.
- Score: 0.7251305766151019
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Blockchain has empowered computer systems to be more secure using a
distributed network. However, the current blockchain design suffers from
fairness issues in transaction ordering. Miners are able to reorder
transactions to generate profits, the so-called miner extractable value (MEV).
Existing research recognizes MEV as a severe security issue and proposes
potential solutions, including prominent Flashbots. However, previous studies
have mostly analyzed blockchain data, which might not capture the impacts of
MEV in a much broader AI society. Thus, in this research, we applied natural
language processing (NLP) methods to comprehensively analyze topics in tweets
on MEV. We collected more than 20000 tweets with #MEV and #Flashbots hashtags
and analyzed their topics. Our results show that the tweets discussed profound
topics of ethical concern, including security, equity, emotional sentiments,
and the desire for solutions to MEV. We also identify the co-movements of MEV
activities on blockchain and social media platforms. Our study contributes to
the literature at the interface of blockchain security, MEV solutions, and AI
ethics.
Related papers
- Mastering AI: Big Data, Deep Learning, and the Evolution of Large Language Models -- Blockchain and Applications [17.293955748551053]
The article begins with an introduction to cryptography fundamentals.
It covers topics such as proof-of-work, proof-of-stake, and smart contracts.
The article concludes by addressing the current state of academic research on blockchain.
arXiv Detail & Related papers (2024-10-14T02:56:36Z) - Remeasuring the Arbitrage and Sandwich Attacks of Maximal Extractable Value in Ethereum [7.381773144616746]
Maximal Extractable Value (MEV) drives the prosperity of the blockchain ecosystem.
We propose a profitability identification algorithm to identify MEV activities on our collected largest-ever dataset.
We have characterized the overall landscape of the MEV ecosystem, the impact the private transaction architectures bring in, and the adoption of back-running mechanisms.
arXiv Detail & Related papers (2024-05-28T08:17:15Z) - IT Strategic alignment in the decentralized finance (DeFi): CBDC and digital currencies [49.1574468325115]
Decentralized finance (DeFi) is a disruptive-based financial infrastructure.
This paper seeks to answer two main questions 1) What are the common IT elements in the DeFi?
And 2) How the elements to the IT strategic alignment in DeFi?
arXiv Detail & Related papers (2024-05-17T10:19:20Z) - Blockchains for Internet of Things: Fundamentals, Applications, and Challenges [38.29453164670072]
Not every blockchain system is suitable for specific IoT applications.
Public blockchains are not suitable for storing sensitive data.
We explore the blockchain's application in three pivotal IoT areas: edge AI, communications, and healthcare.
arXiv Detail & Related papers (2024-05-08T04:25:57Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - Challenges in Blockchain as a Solution for IoT Ecosystem Threats and Access Control: A Survey [1.5884920236067408]
The Internet of Things (IoT) is increasingly influencing and transforming various aspects of our daily lives.
Contrary to popular belief, it raises security and privacy issues as it is used to collect data from consumers or automated systems.
This article summarises difficulties that have been outlined in numerous recent articles and articulates various attacks and security challenges.
arXiv Detail & Related papers (2023-11-26T13:13:15Z) - The MEV Saga: Can Regulation Illuminate the Dark Forest? [2.512827436728378]
Maximal Extractable Value or MEV has been one of the major concerns in blockchain designs as it creates a centralizing force which affects user transactions.
We explain the concept behind the novel Proposal Builder Separation design as an effort by Flashbots to increase decentralization through modularity.
We discuss the shift of trust from validators to builders in PoS blockchains such as, acknowledging the impact that the later ones may have on users' transactions.
arXiv Detail & Related papers (2023-05-02T10:41:08Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.