Scalaris | An upgraded version of Tendermint
Scalaris | An upgraded version of Tendermint
Scalaris | An upgraded version of Tendermint
  • Scalaris: High-Performance, Leaderless, Parallel, and MEV-Mitigated Consensus Framework
  • Overview
    • What is Scalaris?
    • Introduction
    • Background
    • DAG-based Consensus
    • Narwhal: Achieving Scalability and Throughput
    • The Bullshark Protocol
      • Fairness and Garbage Collection in DAG-Based BFT
    • Mysticeti: Enhanced Consensus Protocol for Scalaris
      • DAG Structure
      • Consensus Protocol
        • Decision Steps
        • Commit Phase
        • Summary
    • Scalaris Framework
      • Parallel Consensus
      • Scalaris Architecture
        • Compatibility with ABCI and Cosmos SDK
        • Support for EVM Execution
        • Support for Move Language
      • MEV Mitigation in the Scalaris Framework
        • Understanding MEV Attacks
        • MEV in Old BFT-Based Blockchains
        • Scalaris Framework Mitigation
      • Parallel Transaction Execution for EVM in Scalaris Framework
        • Challenges with Parallel Execution
        • Parallel Transaction Executor (PTE)
        • General Scheme
        • Modular Architecture
        • Construction Process of Transaction DAG
        • DAG Execution Process
    • Conclusion
  • Guides
    • Install Scalaris
    • Quick start
  • Apps
    • Using ABCI-CLI
    • Getting started
    • Indexing transactions
    • Application architecture guide
  • Core
    • Using Scalaris
    • Configuration
    • Running in production
    • Metrics
    • Validators
    • How to read logs
    • Subscribing to events via Websocket
    • Block structure
    • RPC
    • Block sync
    • State Sync
    • Mempool
    • Light client
  • Network
    • Docker compose
  • Tools
    • Debugging
    • Benchmarking
  • Spec
    • Core
    • ABCI++
    • Consensus
    • Light client
    • P2C
    • RPC
    • Blockchain
  • Scalaris Quality Assurance
  • RPC
Powered by GitBook
On this page
  1. Overview
  2. Scalaris Framework
  3. MEV Mitigation in the Scalaris Framework

Scalaris Framework Mitigation

PreviousMEV in Old BFT-Based BlockchainsNextParallel Transaction Execution for EVM in Scalaris Framework

Last updated 11 months ago

The Scalaris framework addresses MEV attacks through a novel commit phase approach:

  1. Transaction Collection: Validators collect all transactions in the sub-DAG of an anchor, encompassing all transactions from the previous round.

  2. Fixed Transaction Set: Validators work with a predetermined set of transactions, ensuring transparency before shuffling.

  3. Random Shuffling: Transactions are shuffled using a verifiable and unpredictable random seed number generated in the next round. This ensures the final transaction order cannot be predicted in advance.

  4. Deterrence of Malicious Behavior: While a malicious validator may attempt to insert beneficial transactions, the unpredictable nature of the random seed prevents them from ensuring a favorable order. This significantly reduces the success of MEV attacks.

By employing these mechanisms, the Scalaris framework ensures fair and tamper-resistant transaction ordering, effectively mitigating the risk of MEV attacks and enhancing blockchain integrity.

In Scalaris, consider an example above in round 3 where the anchor A2 is chosen across all local views of the validators. The anchor examines its DAG-subgraph and gathers all transactions from vertices V12, V22, and V32, as well as its own anchor vertex A2, assuming all prior anchor vertices have recursively committed all transactions. Although attackers or malicious actors can inject any transactions in the round, by the time round 3 is reached, the transactions in V12, V22, and V32 have already occurred in the previous round and cannot be manipulated to alter the set of V12, V22, and V32.

An unpredictable random number is selected in round 3 and is used to shuffle the set of V12, V22, and V32, and the anchor A2. This mechanism effectively mitigates MEV attacks within the Scalaris consensus framework by preventing malicious actors from manipulating transaction order.