R-Pool and Settlement Markets for Recoverable ERC-20R Tokens
- URL: http://arxiv.org/abs/2312.14375v1
- Date: Fri, 22 Dec 2023 02:00:23 GMT
- Title: R-Pool and Settlement Markets for Recoverable ERC-20R Tokens
- Authors: Kaili Wang, Qinchen Wang, Calvin Cai, Dan Boneh,
- Abstract summary: ERC-20R supports asset recovery within a limited time window after an asset is transferred.
When an honest recipient receives an ERC-20R asset, they must wait until the recovery windows elapses.
We explore how to design a pool to exchange an unsettled ERC-20R asset for a base ERC-20 of the same asset.
- Score: 14.112164089246571
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: ERC-20R is a wrapper around ERC-20 that supports asset recovery within a limited time window after an asset is transferred. It is designed to reduce theft and losses on the blockchain by allowing a victim to recover their stolen or lost assets during the recovery window. When an honest recipient receives an ERC-20R asset, they must wait until the recovery windows elapses (say, 24 hours), before they can unwrap the asset back to its base ERC-20 form. We argue that many DeFi services will likely refuse to accept unsettled recoverable assets because they can interfere with their normal operations. Consequently, when Alice receives an ERC-20R token, she must wait 24 hours before she can use it with a DeFi service. But what if Alice is willing to pay a fee to exchange the wrapped token for an unwrapped ERC-20 token that can be used right away? In this paper we explore how to design a pool to exchange an unsettled ERC-20R asset for a base ERC-20 of the same asset. Designing such a pool raises several challenging questions and we present our solutions.
Related papers
- BRC20 Pinning Attack [9.2705406817139]
BRC20 tokens are a type of non-fungible asset on the Bitcoin network.
We present the first in-depth analysis of the BRC20 transfer mechanism and identify a critical attack vector.
arXiv Detail & Related papers (2024-10-15T05:33:16Z) - Count of Monte Crypto: Accounting-based Defenses for Cross-Chain Bridges [6.96405583604427]
Between 2021 and 2023, crypto assets valued at over $US2.6 billion were stolen via attacks on "bridges"
In this paper, we empirically analyze twenty million transactions used by key bridges during this period.
We show that a simple invariant that balances cross-chain inflows and outflows is compatible with legitimate use, yet precisely identifies every known attack.
arXiv Detail & Related papers (2024-10-01T22:33:03Z) - Not All Prompts Are Secure: A Switchable Backdoor Attack Against Pre-trained Vision Transformers [51.0477382050976]
An extra prompt token, called the switch token in this work, can turn the backdoor mode on, converting a benign model into a backdoored one.
To attack a pre-trained model, our proposed attack, named SWARM, learns a trigger and prompt tokens including a switch token.
Experiments on diverse visual recognition tasks confirm the success of our switchable backdoor attack, achieving 95%+ attack success rate.
arXiv Detail & Related papers (2024-05-17T08:19:48Z) - Bridging BRC-20 to Ethereum [3.2763090690491343]
We design, implement, and evaluate a lightweight bridge to connect the Bitcoin and networks that were heterogeneously uncontactable before.
Inspired by the recently introduced Bitcoin Request Comment (BRC-20) standard, we leverage the flexibility of Bitcoin inscriptions by embedding editable operations within each satoshi.
A user can initialize his/her requests from the Bitcoin network, subsequently triggering corresponding actions on the network.
arXiv Detail & Related papers (2023-10-16T04:58:17Z) - BRC-20: Hope or Hype [2.3909240294391236]
BRC-20 (short for Bitcoin Request for Comment 20) token mania was a key storyline in the middle of 2023.
We pioneer the exploration of this concept, covering its intricate mechanisms, features, and state-of-the-art applications.
arXiv Detail & Related papers (2023-08-31T02:59:52Z) - Efficient Adversarial Contrastive Learning via Robustness-Aware Coreset
Selection [59.77647907277523]
Adversarial contrast learning (ACL) does not require expensive data annotations but outputs a robust representation that withstands adversarial attacks.
ACL needs tremendous running time to generate the adversarial variants of all training data.
This paper proposes a robustness-aware coreset selection (RCS) method to speed up ACL.
arXiv Detail & Related papers (2023-02-08T03:20:14Z) - Low Emission Building Control with Zero-Shot Reinforcement Learning [70.70479436076238]
Control via Reinforcement Learning (RL) has been shown to significantly improve building energy efficiency.
We show it is possible to obtain emission-reducing policies without a priori--a paradigm we call zero-shot building control.
arXiv Detail & Related papers (2022-08-12T17:13:25Z) - Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and in the Binance Smart Chain (BNB) [50.888293380932616]
We study the ecosystem of the tokens and liquidity pools.
We find that about 60% of tokens are active for less than one day.
We estimate that 1-day rug pulls generated $240 million in profits.
arXiv Detail & Related papers (2022-06-16T14:20:19Z) - Evaluating the COVID-19 Identification ResNet (CIdeR) on the INTERSPEECH
COVID-19 from Audio Challenges [59.78485839636553]
CIdeR is an end-to-end deep learning neural network originally designed to classify whether an individual is COVID-positive or COVID-negative.
We demonstrate the potential of CIdeR at binary COVID-19 diagnosis from both the COVID-19 Cough and Speech Sub-Challenges of INTERSPEECH 2021, ComParE and DiCOVA.
arXiv Detail & Related papers (2021-07-30T10:59:08Z) - Rectifying Administrated ERC20 Tokens [9.185979263744263]
Many smart contracts are administrated, and the owners of these tokens carry lesser social and legal responsibilities.
This entails two major problems: a) the owners of the tokens have the ability to quickly steal all the funds and disappear from the market; and b) if the private key of the owner's account is stolen, all the assets might immediately turn into the property of the attacker.
We introduce SafelyAdministrated - a library that enforces a responsible ownership and management of ERC20 tokens.
arXiv Detail & Related papers (2021-07-17T18:40:34Z) - BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning [80.99426477001619]
We migrate backdoor attacks to more complex RL systems involving multiple agents.
As a proof of concept, we demonstrate that an adversary agent can trigger the backdoor of the victim agent with its own action.
The results show that when the backdoor is activated, the winning rate of the victim drops by 17% to 37% compared to when not activated.
arXiv Detail & Related papers (2021-05-02T23:47:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.