Empirical and Theoretical Analysis of Liquid Staking Protocols
- URL: http://arxiv.org/abs/2401.16353v1
- Date: Mon, 29 Jan 2024 17:56:45 GMT
- Title: Empirical and Theoretical Analysis of Liquid Staking Protocols
- Authors: Krzysztof Gogol, Benjamin Kraner, Malte Schlosser, Tao Yan, Claudio Tessone, Burkhard Stiller,
- Abstract summary: Liquid staking protocols allow for earning staking rewards without the disadvantage of locking the capital at the validators.
They are seen by some as a threat to the Proof-of-Stake blockchain security.
This paper is the first work that classifies liquid staking implementations.
- Score: 3.2963988742807295
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Liquid staking has become the largest category of decentralized finance protocols in terms of total value locked. However, few studies exist on its implementation designs or underlying risks. The liquid staking protocols allow for earning staking rewards without the disadvantage of locking the capital at the validators. Yet, they are seen by some as a threat to the Proof-of-Stake blockchain security. This paper is the first work that classifies liquid staking implementations. It analyzes the historical performance of major liquid staking tokens in comparison to the traditional staking for the largest Proof-of-Stake blockchains. Furthermore, the research investigates the impact of centralization, maximum extractable value and the migration of Ethereum from Proof-of-Work to Proof-of-Stake on the tokens' performance. Examining the tracking error of the liquid stacking providers to the staking rewards shows that they are persistent and cannot be explained by macro-variables of the currency, such as the variance or return.
Related papers
- Phantom Events: Demystifying the Issues of Log Forgery in Blockchain [31.570414211726888]
We present the first in-depth security analysis of transaction log forgery in EVM-based blockchains.
We propose a tool designed to detect event forgery vulnerabilities in smart contracts.
We have successfully identified real-world instances for all five types of attacks across multiple decentralized applications.
arXiv Detail & Related papers (2025-02-19T08:07:26Z) - Leveraging Ensemble-Based Semi-Supervised Learning for Illicit Account Detection in Ethereum DeFi Transactions [0.0]
Decentralized Finance (DeFi) has introduced significant security risks, including the proliferation of illicit accounts.
Traditional detection methods are limited by the scarcity of labeled data and the evolving tactics of malicious actors.
We propose a novel Self-Learning Ensemble-based Illicit account Detection framework to address these challenges.
arXiv Detail & Related papers (2024-12-03T12:03:13Z) - A Game-Theoretic Approach to the Study of Blockchain's Robustness [0.0]
This thesis investigates the robustness of blockchain protocols, specifically focusing on Proof-of-Stake.
We define robustness in terms of two critical properties: Safety, which ensures that the blockchain will not have permanent conflicting blocks, and Liveness, which guarantees the continuous addition of new reliable blocks.
Our research addresses the gap between traditional distributed systems approaches, which classify agents as either honest or Byzantine (i.e. malicious or faulty), and game-theoretic models that consider rational agents driven by incentives.
arXiv Detail & Related papers (2024-11-28T14:29:14Z) - Mitigating Challenges in Ethereum's Proof-of-Stake Consensus: Evaluating the Impact of EigenLayer and Lido [4.606106768645647]
The transition from a Proof-of-Work (PoW) to a Proof-of-Stake (PoS) consensus mechanism introduces a transformative approach to blockchain validation.
This paper explores two innovative solutions: EigenLayer and Lido.
We conclude with an evaluation of the combined potential of EigenLayer and Lido to foster a more resilient and inclusive ecosystem.
arXiv Detail & Related papers (2024-10-30T19:58:46Z) - Maximal Extractable Value Mitigation Approaches in Ethereum and Layer-2 Chains: A Comprehensive Survey [1.2453219864236247]
MEV arises when miners or validators manipulate transaction ordering to extract additional value.
This not only affects user experience by introducing unpredictability and potential financial losses but also threatens the underlying principles of decentralization and trust.
This paper presents a comprehensive survey of MEV mitigation techniques as applied to both protocolss L1 and various L2 solutions.
arXiv Detail & Related papers (2024-07-28T19:51:22Z) - SoK: Liquid Staking Tokens (LSTs) and Emerging Trends in Restaking [0.0]
Liquid staking and restaking represent recent innovations in Decentralized Finance (DeFi)
Liquid Staking Tokens (LSTs), tokenized representations of staked tokens on Proof-of-Stake (PoS) blockchains, are the leading staking method.
Restaking builds upon this concept by allowing staked tokens, LSTs or native Bitcoin tokens to secure additional protocols and PoS chains for supplementary rewards.
arXiv Detail & Related papers (2024-03-31T11:08:12Z) - Vulnerability Scanners for Ethereum Smart Contracts: A Large-Scale Study [44.25093111430751]
In 2023 alone, such vulnerabilities led to substantial financial losses exceeding a billion of US dollars.
Various tools have been developed to detect and mitigate vulnerabilities in smart contracts.
This study investigates the gap between the effectiveness of existing security scanners and the vulnerabilities that still persist in practice.
arXiv Detail & Related papers (2023-12-27T11:26:26Z) - Demystifying DeFi MEV Activities in Flashbots Bundle [36.64508078443365]
Decentralized Finance, mushrooming in permissionless blockchains, has attracted a recent surge in popularity.
Due to the transparency of permissionless blockchains, opportunistic traders can compete to earn revenue by extracting Miner Extractable Value (MEV)
The Flashbots bundle mechanism further aggravates the MEV competition because it empowers opportunistic traders with the capability of designing more sophisticated MEV extraction.
arXiv Detail & Related papers (2023-12-02T09:46:39Z) - Diffusion Variational Autoencoder for Tackling Stochasticity in
Multi-Step Regression Stock Price Prediction [54.21695754082441]
Multi-step stock price prediction over a long-term horizon is crucial for forecasting its volatility.
Current solutions to multi-step stock price prediction are mostly designed for single-step, classification-based predictions.
We combine a deep hierarchical variational-autoencoder (VAE) and diffusion probabilistic techniques to do seq2seq stock prediction.
Our model is shown to outperform state-of-the-art solutions in terms of its prediction accuracy and variance.
arXiv Detail & Related papers (2023-08-18T16:21:15Z) - Onchain Sports Betting using UBET Automated Market Maker [45.410818354926406]
Decentralized sports betting requires automated market makers (AMMs) for efficient liquidity provision.
Existing AMMs like Uniswap lack alignment with fair odds, creating risks for liquidity providers.
The paper introduces UBET AMM (UAMM), utilizing smart contracts and algorithms to price sports odds fairly.
arXiv Detail & Related papers (2023-08-18T02:19:30Z) - CubeFlow: Money Laundering Detection with Coupled Tensors [39.26866956921283]
Money laundering (ML) is the behavior to conceal the source of money achieved by illegitimate activities.
Most existing methods detect dense blocks in a graph or a tensor, which do not consider the fact that money are frequently transferred through middle accounts.
CubeFlow proposed in this paper is a scalable, flow-based approach to spot fraud from a mass of transactions.
arXiv Detail & Related papers (2021-03-23T09:24:31Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.