Papers
Topics
Authors
Recent
Search
2000 character limit reached

Maximum Extractable Value (MEV)

Updated 21 April 2026
  • Maximum Extractable Value (MEV) is the maximum surplus profit achieved by optimally reordering, inserting, or censoring blockchain transactions beyond standard rewards.
  • It arises from the combinatorial ordering of pending transactions, enabling strategies like front-running, sandwich attacks, and arbitrage that affect network fairness and protocol security.
  • Mitigation strategies include fair ordering protocols, cryptographic privacy techniques, and auction-based mechanisms that balance participant incentives and improve block-space efficiency.

Maximum Extractable Value (MEV) is the maximal surplus profit a privileged entity—such as a block producer, validator, or sequencer—can obtain by optimally selecting, reordering, inserting, or censoring transactions within a block, in excess of standard block rewards and fees. In decentralized finance and blockchain networks, MEV arises due to the combinatorial space of transaction orderings and the visibility of pending transactions, introducing complex economic incentives and externalities that challenge network fairness, user welfare, and protocol security.

1. Foundational Definitions and Mathematical Formalism

MEV is defined with respect to a block BB containing a set of pending transactions T={t1,,tn}T = \{t_1,\ldots,t_n\}. Consider all possible permutations (and inclusion/exclusion choices) Π\Pi of TT; for each permutation πΠ\pi \in \Pi, let f(π,ti)f(\pi, t_i) be the profit achieved by executing tit_i in position π\pi, and C(π)C(\pi) the cost incurred (gas, bribes, etc). The formal MEV opportunity is

MEV(B,T)=maxπΠ[i=1nf(π,ti)C(π)]\mathrm{MEV}(B,T) = \max_{\pi \in \Pi} \left[ \sum_{i=1}^{n} f(\pi, t_i) - C(\pi) \right]

This optimizes over all possible orderings, inclusions, and strategic insertions of transactions (e.g., sandwiching, arbitrage, liquidations), accounting for both direct profits and the competitive costs required to win in the presence of adversaries (Materwala et al., 2024).

In a block production context with standard rewards T={t1,,tn}T = \{t_1,\ldots,t_n\}0 and gas fees,

T={t1,,tn}T = \{t_1,\ldots,t_n\}1

where T={t1,,tn}T = \{t_1,\ldots,t_n\}2 captures DeFi profit induced by transaction ordering (Alipanahloo et al., 2024).

2. Transaction Types, Extraction Mechanisms, and Taxonomy

MEV encompasses a spectrum of extraction strategies, classifiable as value-diverting or market-stabilizing (Materwala et al., 2024):

  • Front-running: Searcher observes a pending trade (e.g., buy) and places a similar transaction with a higher priority to extract profit from subsequent price slippage.
  • Back-running: Searcher inserts a transaction immediately after a profit-inducing action (e.g., liquidation, large swap) to capture residual arbitrage.
  • Sandwich attacks: Surrounding a victim’s transaction with a buy before and a sell after to maximize price impact extraction.
  • Arbitrage: Exploiting price discrepancies across venues (e.g., AMMs and CEX/DEX) via multi-path, cyclic, or multi-hop trades; includes CEX-DEX and cross-domain arbitrage (Ladóczk et al., 17 Apr 2026).
  • Liquidations: Repayment of undercollateralized loans at a discount, sometimes via auction mechanisms.
  • Suppression, displacement, and time-bandit attacks: Transaction flooding, reorgs, or exploitation of consensus instability.

The profit per event is formalized as, e.g., for swaps,

T={t1,,tn}T = \{t_1,\ldots,t_n\}3

with T={t1,,tn}T = \{t_1,\ldots,t_n\}4 over all detected events (Bagourd et al., 2023).

3. Economic, Game-Theoretic, and Protocol-Level Analysis

3.1. Game-Theoretic Formulations

MEV is rigorously modeled as a "MEV game," in which searchers and block producers act strategically according to the domain's ordering mechanism. Notably:

  • In PGA (priority-gas auctions), Nash equilibria induce block-space waste; price-of-anarchy (PoA) metrics show the number of redundant transactions grows linearly with player count, PoMEV=T={t1,,tn}T = \{t_1,\ldots,t_n\}5 (Mazorra et al., 2022).
  • Sealed-bid relay auctions (e.g., Flashbots’ architecture) internalize competition; only the winner’s bundle is included, so PoMEV=1.
  • Under continuous-time models, the optimal adversarial strategy for block producers or searchers is to solve a discrete or continuous optimization over ordering, censoring, and inserting (Chitra, 2023).

3.2. Invariance Properties and Protocol Design

For frictionless pools with deterministic block times and path-independent states, the aggregate arbitrage profit extractable as MEV is invariant under changes in block ordering or block time—only dependencies on AMM geometry, fee structure, and asset volatility remain (Guo, 2023). This shows that manipulating block ordering cannot increase total system-wide risk-neutral MEV; only its distribution among participants changes.

3.3. Auction Theory and Revenue Loss

Empirical studies confirm that extracted MEV follows a heavy-tailed log-normal law. Competition intensity differs by attack type (sandwich, arbitrage, liquidation), and revenue equivalence breaks down under valuation affiliation. English and second-price auctions dominate other formats under realistic parameters, with observed linkage gaps of 14–28%, amounting to T={t1,,tn}T = \{t_1,\ldots,t_n\}6 million in foregone builder revenue in 2025 (Adadurov et al., 17 Mar 2026).

4. Empirical Findings and MEV in Layer-1 / Layer-2 / Cross-Domain Contexts

4.1. Layer 1 and Layer 2 Quantitative Results

Empirical analysis on major EVM L2s—Polygon, Arbitrum, Optimism—reports:

Network Extracted MEV (M USD) MEV TX Count Mean Profit/MEV TX (USD)
Polygon 213 7.7 million 27.74
Arbitrum 0.25 87,706 6.44
Optimism 0.12 900,000 0.14

On Polygon, 99.99% of detected L2 MEV is arbitrage (liquidations are rare) (Bagourd et al., 2023). L2 protocols exhibit major MEV risk and demand continuous monitoring.

4.2. Cross-Domain (Cross-Chain/L2) MEV

MEV has generalized from single-domain miner-extractable value to being present across rollups, bridges, and external venues. Cross-domain MEV, such as CEX-DEX arbitrage, frequently dominates extracted profit, accounting for the bulk of MEV on Ethereum (Ladóczk et al., 17 Apr 2026). Multi-domain coordination enables super-additive MEV, far exceeding naive single-domain estimates (Mancino et al., 8 Mar 2026).

5. Mitigation, Sharing, and Fairness Mechanisms

5.1. Sequencing, Cryptography, and Application-Level Design

Mitigation strategies fall into categories:

  • Ordering protocols: Proposer-Builder Separation (PBS/MEV-Boost), fair (e.g., FCFS, TimeBoost, committee-based) ordering; randomized or cryptographically enforced sequencing (Alipanahloo et al., 2024).
  • Privacy methods: Threshold encryption, delay encryption, trusted execution environments, commit-reveal schemes, and verifiable secret sharing hide transaction content until ordering is finalized (Malkhi et al., 2022).
  • DApp-level reforms: Batch auctions (e.g., CoWswap), intent-based protocols, and AMM-level commit-reveal or fairness-enhancing architectures (FairMM).
  • Rebating mechanisms: Shapley and Banzhaf-value-inspired rebates, Sybil-resistant mechanisms, and combinatorial orderflow auctions for equitable MEV sharing (Mazorra et al., 2023).
  • Dynamic MEV extraction rates: Protocol-level adjustment of the MEV extraction share for miners (parameter T={t1,,tn}T = \{t_1,\ldots,t_n\}7), akin to EIP-1559 mechanisms, can yield stability, welfare maximization, or regulated trade-offs between user surplus and producer income (Braga et al., 2024).

5.2. Time-Advantaged and Auction-Based Extraction

Time-advantage mechanisms, where sequencers auction off a guaranteed early-execution window, yield distinct equilibrium and sharing outcomes:

  • The optimal arbitrageur delays action to the last instant of exclusivity.
  • Protocol-side AMM fee-splitting can capture up to 25% of available MEV, with 50% accruing to the time-advantaged arbitrageur and 25% left unrealized (Fritsch et al., 2024).

5.3. Price of MEV and Block-Space Efficiency

The "Price of MEV" (PoMEV) quantifies externality in block-space usage. Protocols like PGAs result in T={t1,,tn}T = \{t_1,\ldots,t_n\}8 (wasteful for T={t1,,tn}T = \{t_1,\ldots,t_n\}9 players); sealed-bid bundling yields Π\Pi0, achieving maximal block-space efficiency (Mazorra et al., 2022).

6. Measurement, Detection, and Empirical Methodologies

MEV measurement and detection leverage:

  • Rule-based heuristics: Pattern matching to identify front-running, sandwich, or back-running via gas price, index, and event signatures.
  • Graph and pattern mining: Detects arbitrage cycles and complex composite behaviors.
  • Machine learning: Supervised classifiers and graph neural networks for advanced detection of MEV transaction types (Materwala et al., 2024).

Empirical studies consistently report that large MEV opportunities are dominated by arbitrage (especially at price jumps), and that detected harmful strategies (sandwiches, time-bandits) are a minority, though they disproportionately affect user welfare.

7. Challenges, Research Directions, and Open Problems

Challenges and areas for future work include:

  • Relay, builder, and sequencer centralization: PBS and private relays risk new forms of power concentration.
  • Protocol integration: Ensuring scalability, latency, and compatibility of MEV mitigation with existing and future ecosystems (sharded L2s, ZK rollups).
  • Standardization: Need for unified measurement benchmarks, ground-truth datasets, and open-sourced detection tools (Mancino et al., 8 Mar 2026).
  • Cross-domain infrastructure: Secure, atomic, and decentralized infrastructure for bridging and sequencing across L1, L2, and external systems.
  • Benign vs harmful MEV: Refining frameworks to distinguish welfare-improving (market-making/price-discovery) from value-diverting (predatory) extraction, with mitigation tailored to each (Ladóczk et al., 17 Apr 2026, Materwala et al., 2024).

Ongoing work aims to formalize application-specific sequencing rules via the combinatorial degree of economic payoff functions (Chitra, 2023), and to develop rigorous, mechanized proofs of MEV bounds and optimal adversarial strategies (Bartoletti et al., 16 Oct 2025). Future MEV-resistant design must balance protocol-level invariance, fair and efficient block-space allocation, and adversary-robust cross-domain settlement.

Topic to Video (Beta)

No one has generated a video about this topic yet.

Whiteboard

No one has generated a whiteboard explanation for this topic yet.

Follow Topic

Get notified by email when new papers are published related to Maximum Extractable Value (MEV).