Loading... Loading... Loading... Loading...

Loading...

Loading...

In this comprehensive workshop, Laurence Kirk breaks down the sophisticated obfuscation techniques used in MEV to hide transactions, evade frontrunners, and manipulate smart contracts. This session explores cutting-edge methods to defeat generalized frontrunners through bytecode manipulation, address obfuscation, and EVM-level tricks.

Key Focus Areas: Learn how frontrunning bots work by simulating transactions locally, replacing addresses with their own, and checking for profit opportunities. Then discover advanced countermeasures including address shifting, bytecode splitting, vanity address techniques, and coinbase-dependent execution flows.

Obfuscation Techniques

Learn how MEV traders disguise transactions to avoid detection and frontrunning

Bytecode Analysis

Deep dive into low-level bytecode tricks and contract manipulation techniques

Defensive Strategies

Implement protection mechanisms for smart contracts and DeFi protocols

What You'll Learn

  • MEV & Frontrunning Fundamentals: Understanding sandwich attacks, arbitrage opportunities, and mempool dynamics
  • Address Obfuscation Techniques: Using PUSH20 alternatives, address shifting with bit manipulation, and address splitting strategies
  • Advanced Bytecode Tricks: XOR operations for address reconstruction, vanity address optimization, and stack management
  • EVM-Level Defense: EXTCODESIZE checks, coinbase-dependent execution flows, and jump table optimization
  • Gas Optimization: Storage slot packing, assembly techniques, and call data vs memory usage
  • Real-World Applications: Hands-on examples using EVM playground and practical implementation strategies

Workshop Overview

This workshop takes you deep into the arms race between MEV extractors and frontrunning bots. Starting with a comprehensive review of MEV fundamentals—including sandwich attacks, arbitrage strategies, and mempool dynamics—we then explore how generalized frontrunners work by simulating transactions and replacing addresses to steal opportunities.

Core Techniques Covered: Learn practical obfuscation methods including address shifting (adding bytes and using bit shifts), address splitting (breaking addresses into multiple parts), XOR-based reconstruction, and coinbase-dependent execution flows that behave differently when simulated locally vs. on mainnet.

Hands-On Learning: Using the EVM playground, you'll implement these techniques step-by-step, understanding stack manipulation, opcode optimization, and gas efficiency strategies. Perfect for developers building MEV strategies or protocols needing protection from sophisticated attacks.

Who This Is For

  • Smart Contract Developers looking to protect their protocols from MEV attacks
  • Security Researchers wanting to understand advanced obfuscation techniques
  • DeFi Protocol Teams seeking to implement robust MEV defenses
  • MEV Traders interested in understanding the competitive landscape
  • Blockchain Auditors needing to identify sophisticated attack vectors

Ready to Dive Deeper into MEV Security?

Explore our comprehensive security courses for advanced blockchain protection strategies.

Browse Courses

Share This Workshop