Scalaris Framework Mitigation
Last updated
Last updated
The Scalaris framework addresses MEV attacks through a novel commit phase approach:
Transaction Collection: Validators collect all transactions in the sub-DAG of an anchor, encompassing all transactions from the previous round.
Fixed Transaction Set: Validators work with a predetermined set of transactions, ensuring transparency before shuffling.
Random Shuffling: Transactions are shuffled using a verifiable and unpredictable random seed number generated in the next round. This ensures the final transaction order cannot be predicted in advance.
Deterrence of Malicious Behavior: While a malicious validator may attempt to insert beneficial transactions, the unpredictable nature of the random seed prevents them from ensuring a favorable order. This significantly reduces the success of MEV attacks.
By employing these mechanisms, the Scalaris framework ensures fair and tamper-resistant transaction ordering, effectively mitigating the risk of MEV attacks and enhancing blockchain integrity.
In Scalaris, consider an example above in round 3 where the anchor A2 is chosen across all local views of the validators. The anchor examines its DAG-subgraph and gathers all transactions from vertices V12, V22, and V32, as well as its own anchor vertex A2, assuming all prior anchor vertices have recursively committed all transactions. Although attackers or malicious actors can inject any transactions in the round, by the time round 3 is reached, the transactions in V12, V22, and V32 have already occurred in the previous round and cannot be manipulated to alter the set of V12, V22, and V32.
An unpredictable random number is selected in round 3 and is used to shuffle the set of V12, V22, and V32, and the anchor A2. This mechanism effectively mitigates MEV attacks within the Scalaris consensus framework by preventing malicious actors from manipulating transaction order.