Estimation of the Probability of Success of a Suppression Attack

dc.contributor.authorVykhlo, Anton
dc.contributor.authorKovalchuk, Lyudmila
dc.date.accessioned2026-02-25T09:50:26Z
dc.date.available2026-02-25T09:50:26Z
dc.date.issued2025
dc.description.abstractThis work presents the results of research on suppression attacks, which are a specific case of fron-trunning attacks. We provide a formal step-by-step algorithm for executing the attack, along with amathematical model and explicit analytical formulas for calculating an upper bound on the successprobability of such an attack with numerical examples.This study continues the research presented in [1], which investigated insertion and displacementattacks.
dc.format.pagerangeP. 65-70
dc.identifier.citationVykhlo, A. Estimation of the Probability of Success of a Suppression Attack / Anton Vykhlo, Lyudmila Kovalchuk // Theoretical and Applied Cybersecurity: scientific journal. – 2025. – Vol. 7, No. 1. – P. 65-70. – Bibliogr.: 16 ref.
dc.identifier.doihttps://doi.org/10.20535/tacs.2664-29132025.1.332340
dc.identifier.orcid0009-0005-8387-7493
dc.identifier.urihttps://ela.kpi.ua/handle/123456789/79033
dc.language.isoen
dc.publisherIgor Sikorsky Kyiv Polytechnic Institute
dc.publisher.placeKyiv
dc.relation.ispartofTheoretical and Applied Cybersecurity: scientific journal, Vol. 7, No. 1
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/deed.uk
dc.subjectsuppression attack
dc.subjectfrontrunning attack
dc.subjectblockchain
dc.subjectmempool
dc.subjectsmart contract
dc.subject.udc621.391:519.2:519.7
dc.titleEstimation of the Probability of Success of a Suppression Attack
dc.typeArticle

Файли

Контейнер файлів
Зараз показуємо 1 - 1 з 1
Вантажиться...
Ескіз
Назва:
65-70.pdf
Розмір:
5.85 MB
Формат:
Adobe Portable Document Format
Ліцензійна угода
Зараз показуємо 1 - 1 з 1
Ескіз недоступний
Назва:
license.txt
Розмір:
8.98 KB
Формат:
Item-specific license agreed upon to submission
Опис: