One minor point is that the shorts only had 2x collateral at the price they shorted at so you'd only get 2*(.01666 + .02 + .025)
Otherwise I think this attack is basically a variant of the SIDS attack described in the OP. I think the defense against this is just to have sufficient market depth: "b) no market trading will be allowed anytime either side of the order book has a depth below D% of the share supply."
I don't see how that changes the fundamental idea of buying Asks and then sucking out their money with a fake high price.
For example, I can repeat what I did several times: build a full order book on both sides and walk it up slowly, I just place Bid, Ask, Bid, Ask, Bid, Ask, at higher and higher prices (Bitshares per Bitasset), and I'm always buying my own Bitasset (leaving me unexposed), or placing BIDs that go permanently unfilled.
Then the price just rolls up and up and up. I have to tie up more capital, but I get all of it back when I later combine my own long and short positions (both of which I already own) to cover. I still steal everyone's money that had an ASK and double up almost instantly.
To prevent this, you'd need a way of telling a scenario like this from a different scenario where the underlying asset DID actually slowly increase to 2x 4x its initial value (because BitSharesX needs to be able to handle that to qualify as an exchange).
I'm going to sleep but I'll check this sometime tomorrow, I was just watching the video and was curious about how this worked. I have a background in mechanism design but I still found this question puzzling. I assumed that I misunderstood the mechanism but now the case may be that I uncovered a defect, which is far more interesting. Perhaps on the train tomorrow I will try to block my own attack in a convenient way.