 Hi everyone, I'm Cheyenne and this is a talk about translating this honesty. I spent some time making this website so I would just stop talking about myself. So I'm presenting Quentus Diligence and Concordia University. This live-in talk is for shielding this paper. This paper was a peer-reviewed first paper on blockchain front-running that was published. In financial cryptography, you can find this paper online. It's an interesting read. I'll tell you a short description here. So what is front-running? You can hear it all everywhere. Front-running in the financial industry market has been around for more than three decades and there is no clear definition of it. Actually, it took the financial cryptography since 1987 to talk about front-running and in 2012 there was more rules about what this is and this is the unethical thing to do. They thought this is a really cool thing to do and they made a lot of money out of it. So in blockchain front-running, especially in Ethereum, they've been talking a lot about this. This is a talk on DEF CON 3 in Cancun. They're talking about front-running on blockchain. So I'm talking too fast. I have a lot to say here. There was a lot of things on Bancorp that was attacked with front-running. A lot of projects consider front-running an attack and they start talking about it early on. This is a great paper, Flash Boys, to point out by Phil Dian that might prepare front-running on this paper, so on the first. And also in the recent fair game, Ponzi scheme or fair scheme that front-running was a big issue and Daniel Luka, one of our colleagues actually started to find this blog and started talking about it. So to have the same base, I defined front-running as benefitting from acting on early access to information. And this benefitting means even d-dossing the system like anything that you benefit as an attacker. An attacker could be just doing this for fun. And also the early means in Ethereum, all the nodes have early access to this information. It's called mempool, like just a transaction that was sent. And now all front-running attacks are the same. We just say this is a front-running attack, but we don't know what that means exactly. We spend pages on talking about what attack we're talking about. So let's talk about some examples. So I'll go by 1.1.1, but let's say Alice wants to send a transaction to do something on Ethereum. So in this case, Alice wants to send a transaction to buy a domain name, let's say DNS. And everyone can see that transaction and get that domain before her. So just have a way to talk about this. You don't really care if Alice's transaction gets accepted after yours. You just want to get your transaction before that. So recall this displacement attack, this displacement front-running attack so you can displace that transaction. There is some other ones. So Alice wants to trade on an essential exchange. What you want to do as an attacker, you want to sandwich a trade or get your trade before her trade. So in this case, you care about Alice's transaction. You want to just run before that. So in this case, we call it insertion front-running attack. So insert your transaction right before that. The other one, Alice wants to buy a lottery ticket. If you know a formal 3D, that was a whole big lottery on Ethereum going on. So you want to buy your...you have a lottery ticket, you want to prevent her from buying the ticket. So in this case, you want to run your transaction and prevent her or anyone else from running a transaction. So we call it a suppression attack. Or on some blogs, it's called block-stopping attack. There is some other attacks like more details. Alice wants to cancel her transaction on the essential exchange or sends the transaction to cancel. So you want to fill the order before it is canceled and get profit from that. So you don't care about Alice's transaction. So it would be a displacement attack. But the transaction you're sending is filled. So it's different than canceled. So it's a different one. So it's asymmetric. It's asymmetric. It's a different transaction. So in this paper, we come up with this paper, with this table, it's the tax on the front-running attacks that you can explain any kind of attacks with two or three words instead of like explaining a whole paragraph or more on this. And we try to add some more best practices. So on the paper, we go also on the key mitigation leaps of mind and other things. There's no time to talk about this. But there is a lot that we talk. Please read this paper. I would like to discuss this on Twitter or any other place. And show you that yes, it's my website. You can get my Twitter, email, or any other thing. And the concept of this is who I work with right now. Thanks.