View Proposal


Proposer
Jamie Gabbay
Title
Hacking the mempool
Goal
Detect fraudulent transactions, or making legitimate trading decisions, by analysing pending transactions (= mempool)
Description
Many exploits and legitimate uses of blockchains work by taking advantage of information in the set of pending transactions. This is often called the *mempool*. You will analyse the mempool of a leading blockchain and study it either from the point of view of making trades, or of detecting illegal uses of the blockchain.
Resources
Background
Url
Difficulty Level
High
Ethical Approval
None
Number Of Students
1
Supervisor
Jamie Gabbay
Keywords
Degrees
Bachelor of Science in Computer Science
Bachelor of Science in Computer Systems
Bachelor of Science in Information Systems
Bachelor of Science in Software Development for Business (GA)
Master of Engineering in Software Engineering
Master of Design in Games Design and Development
Master of Science in Artificial Intelligence
Master of Science in Artificial Intelligence with SMI
Master of Science in Business Information Management
Master of Science in Computer Science for Cyber Security
Master of Science in Computer Systems Management
Master of Science in Computing (2 Years)
Master of Science in Data Science
Master of Science in Human Robot Interaction
Master of Science in Information Technology (Business)
Master of Science in Information Technology (Software Systems)
Master of Science in Network Security
Master of Science in Robotics
Master of Science in Software Engineering
Bachelor of Science in Computing Science
Bachelor of Engineering in Robotics
Bachelor of Science in Computer Science (Cyber Security)
Master of Science in Robotics with Industrial Application
Postgraduate Diploma in Artificial Intelligence