MAD-DAG: Protecting Blockchain Consensus from MEV
- URL: http://arxiv.org/abs/2511.21552v1
- Date: Wed, 26 Nov 2025 16:22:41 GMT
- Title: MAD-DAG: Protecting Blockchain Consensus from MEV
- Authors: Roi Bar-Zur, Aviv Tamar, Ittay Eyal,
- Abstract summary: We present MAD-DAG, the first practical protocol to counter selfish mining under adverse conditions.<n>We analyze selfish mining in both Colordag and MAD-DAG by modeling a rational miner using a Markov Decision Process (MDP)<n>To the best of our knowledge, this is the first tractable model of selfish mining in a practical DAG-based blockchain.
- Score: 23.235268600785002
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Blockchain security is threatened by selfish mining, where a miner (operator) deviates from the protocol to increase their revenue. Selfish mining is exacerbated by adverse conditions: rushing (network propagation advantage for the selfish miner), varying block rewards due to block contents, called miner extractable value (MEV), and petty-compliant miners who accept bribes from the selfish miner. The state-of-the-art selfish-mining-resistant blockchain protocol, Colordag, does not treat these adverse conditions and was proven secure only when its latency is impractically high. We present MAD-DAG, Mutually-Assured-Destruction Directed-Acyclic-Graph, the first practical protocol to counter selfish mining under adverse conditions. MAD-DAG achieves this thanks to its novel ledger function, which discards the contents of equal-length chains competing to be the longest. We analyze selfish mining in both Colordag and MAD-DAG by modeling a rational miner using a Markov Decision Process (MDP). We obtain a tractable model for both by developing conservative reward rules that favor the selfish miner to yield an upper bound on selfish mining revenue. To the best of our knowledge, this is the first tractable model of selfish mining in a practical DAG-based blockchain. This enables us to obtain a lower bound on the security threshold, the minimum fraction of computational power a miner needs in order to profit from selfish mining. MAD-DAG withstands adverse conditions under which Colordag and Bitcoin fail, while otherwise maintaining comparable security. For example, with petty-compliant miners and high levels of block reward variability, MAD-DAG's security threshold ranges from 11% to 31%, whereas both Colordag and Bitcoin achieve 0% for all levels.
Related papers
- Incentive Attacks in BTC: Short-Term Revenue Changes and Long-Term Efficiencies [45.776687601070705]
Bitcoin's Difficulty Adjustment Algorithm (DAA) has been a source of vulnerability for incentive attacks such as selfish mining, block withholding and coin hopping strategies.<n>We study the short-term revenue change per hashpower of the adversarial and honest miners for these incentive attacks.<n>For block withholding strategies, it turns out, the honest miners outside the pool profit from the attack, usually even more than the attacker both in the short-term and the long-term.
arXiv Detail & Related papers (2025-11-14T18:18:17Z) - The Rich Get Richer in Bitcoin Mining Induced by Blockchain Forks [2.9281463284266973]
Fairness in the distribution of mining rewards plays a crucial role in preventing the concentration of computational power in a few miners.<n>If miners with greater computational resources receive disproportionately higher rewards, it indicates a threat to the system's decentralization.<n>This study analyzes TRGR in Bitcoin by focusing on unintentional blockchain forks.
arXiv Detail & Related papers (2025-06-16T11:03:50Z) - When Should Selfish Miners Double-Spend? [45.776687601070705]
Selfish mining literature usually ignores the chance of the attacker to double-spend at no-cost in each attack cycle.<n>In this paper, we give a rigorous analysis of an attack where the goal of the adversary is to double-spend while mining selfishly.<n>We show that, at each attack cycle, if the level of stubbornness is higher than $k$, the adversary gets a free shot at double-spending.
arXiv Detail & Related papers (2025-01-06T18:59:26Z) - Bitcoin under Volatile Block Rewards: How Mempool Statistics Can Influence Bitcoin Mining [7.273897301039592]
As Bitcoin experiences more halving events, the protocol reward converges to zero, making transaction fees the primary source of miner rewards.<n>Previous security analyses of Bitcoin have either considered a fixed block reward model or a highly simplified volatile model.<n>This paper presents a reinforcement learning-based tool to develop mining strategies under a more realistic volatile model.
arXiv Detail & Related papers (2024-11-18T16:29:20Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.<n>Our measurements from the Aptos mainnet show that the optimistic approach reduces latency overhead by 71%.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Targeted Nakamoto: A Bitcoin Protocol to Balance Network Security and Carbon Emissions [0.0]
Targeted Nakamoto is a Proof-of-Work protocol augmentation that incentivizes miners to hone in on a target hashrate interval.<n>When hashrate is above target a ceiling is placed on the block reward a miner can receive.<n>When hashrate is below target a floor is placed underneath the miner's block reward.
arXiv Detail & Related papers (2024-05-23T22:26:25Z) - Transaction Capacity, Security and Latency in Blockchains [45.776687601070705]
We analyze how secure a block is after the block becomes $k$-deep, i.e., security-latency, for Nakamoto consensus.<n>We connect the security-latency analysis to sustainable transaction rate of the queue system.
arXiv Detail & Related papers (2024-02-15T17:43:13Z) - Undetectable Selfish Mining [4.625489011466493]
A strategic Bitcoin miner may profit by deviating from the intended Bitcoin protocol.
We develop a selfish mining variant that is provably *statistically undetectable*
We show that our strategy is strictly profitable for attackers with $38.2% ll 50%$ of the total hashrate.
arXiv Detail & Related papers (2023-09-13T09:51:32Z) - Partial Selfish Mining for More Profits [21.636578888742477]
Mining attacks aim to gain an unfair share of extra rewards in the blockchain mining.
In this paper, we propose a new and feasible Partial Selfish Mining (PSM) attack.
We show that PSM attackers can be more profitable than selfish miners under a certain range of mining power and network conditions.
arXiv Detail & Related papers (2022-07-27T11:58:38Z) - Bitcoin-Enhanced Proof-of-Stake Security: Possibilities and Impossibilities [45.90740335615872]
Bitcoin is the most secure blockchain in the world, supported by the immense hash power of its Proof-of-Work miners.<n>Proof-of-Stake chains are energy-efficient, have fast finality but face several security issues.<n>We show that these security issues are inherent in any PoS chain without an external trusted source.<n>We propose a new protocol, Babylon, where an off-the-shelf PoS protocol checkpoints onto Bitcoin to resolve these issues.
arXiv Detail & Related papers (2022-07-18T06:01:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.