-
Discovery of a Lyα blob photo-ionised by a super-cluster of massive stars associated to a z = 3.49 galaxy
Authors:
S. Zarattini,
J. M. Rodríguez Espinosa,
C. Muñoz-Tuñon,
J. M. Mas-Hesse,
P. Harrabal Haro
Abstract:
We report the discovery and characterisation of a Lya blob close to a galaxy at redshift z=3.49. We present our analysis to check whether the companion galaxy could be the source of the ionised photons responsible for the Lya emission from the blob. We use images obtained from the 10.4 m GTC telescope that are part of the SHARDS project. The blob is only visible in the F551W17 filter, centred arou…
▽ More
We report the discovery and characterisation of a Lya blob close to a galaxy at redshift z=3.49. We present our analysis to check whether the companion galaxy could be the source of the ionised photons responsible for the Lya emission from the blob. We use images obtained from the 10.4 m GTC telescope that are part of the SHARDS project. The blob is only visible in the F551W17 filter, centred around the Lya line at the redshift of the galaxy. We measure the luminosity of the blob with a two-step procedure. First, we describe the radial surface brightness (SB) profile of the galaxy using a Sersic function. We then remove this model from the SB profile of the blob and measure the luminosity of the blob alone. We also estimate the Lya continuum of the galaxy using an ACS image from the HST in the filter F606W, that is wider than the SHARDS one and centred at about the same wavelength. In this image the galaxy is visible, but the blob is not detected, since its Lya emission is diluted in the larger wavelength range of the F606W filter. We find that the Lya luminosity of the blob is 1.0x1043 erg s-1, in agreement with other Lya blobs reported in the literature. The luminosity of the galaxy in the same filter is 2.9x1042 erg s-1. The luminosity within the HST/ACS image is Lcont=1.1x1043 erg s-1. With these values we are able to estimate the Lya equivalent width (EW), that is found to be 111 Å (rest-frame). This value suggests that a super-cluster of massive (1-2x107 Msun) and young (2-4 Myr) stars could be responsible for the ionisation of the blob. We also use two other methods to estimate the luminosity of the galaxy and the blob, both supporting our conclusions. It is worth noting that the Lya blob is spatially decoupled from the galaxy by 5.7 kpc. This misalignment could suggest the presence of an ionised cone of escaping material, as found in nearby galaxies such as M82.
△ Less
Submitted 10 December, 2024;
originally announced December 2024.
-
SoK: Cross-Chain Bridging Architectural Design Flaws and Mitigations
Authors:
Jakob Svennevik Notland,
Jinguye Li,
Mariusz Nowostawski,
Peter Halland Haro
Abstract:
Cross-chain bridges are solutions that enable interoperability between heterogeneous blockchains. In contrast to the underlying blockchains, the bridges often provide inferior security guarantees and have been targets of hacks causing damage in the range of 1.5 to 2 billion USD in 2022. The current state of bridge architectures is that they are ambiguous, and there is next to no notion of how diff…
▽ More
Cross-chain bridges are solutions that enable interoperability between heterogeneous blockchains. In contrast to the underlying blockchains, the bridges often provide inferior security guarantees and have been targets of hacks causing damage in the range of 1.5 to 2 billion USD in 2022. The current state of bridge architectures is that they are ambiguous, and there is next to no notion of how different architectures and their components are related to different vulnerabilities. Throughout this study, we have analysed 60 different bridges and 34 bridge exploits in the last three years (2021-2023). Our analyses identified 13 architectural components of the bridges. We linked the components to eight types of vulnerabilities, also called design flaws. We identified prevention measures and proposed 11 impact reduction measures based on the existing and possible countermeasures to address the imminent exploits of the design flaws. The results are meant to be used as guidelines for designing and implementing secure cross-chain bridge architectures, preventing design flaws, and mitigating the negative impacts of exploits.
△ Less
Submitted 1 March, 2024;
originally announced March 2024.
-
Consensus in Blockchain Systems with Low Network Throughput: A Systematic Mapping Study
Authors:
Henrik Knudsen,
Jakob Svennevik Notland,
Peter Halland Haro,
Truls Bakkejord Ræder,
Jingyue Li
Abstract:
Blockchain technologies originate from cryptocurrencies. Thus, most blockchain technologies assume an environment with a fast and stable network. However, in some blockchain-based systems, e.g., supply chain management (SCM) systems, some Internet of Things (IOT) nodes can only rely on the low-quality network sometimes to achieve consensus. Thus, it is critical to understand the applicability of e…
▽ More
Blockchain technologies originate from cryptocurrencies. Thus, most blockchain technologies assume an environment with a fast and stable network. However, in some blockchain-based systems, e.g., supply chain management (SCM) systems, some Internet of Things (IOT) nodes can only rely on the low-quality network sometimes to achieve consensus. Thus, it is critical to understand the applicability of existing consensus algorithms in such environments. We performed a systematic mapping study to evaluate and compare existing consensus mechanisms' capability to provide integrity and security with varying network properties. Our study identified 25 state-of-the-art consensus algorithms from published and preprint literature. We categorized and compared the consensus algorithms qualitatively based on established performance and integrity metrics and well-known blockchain security issues. Results show that consensus algorithms rely on the synchronous network for correctness cannot provide the expected integrity. Such consensus algorithms may also be vulnerable to distributed-denial-of-service (DDOS) and routing attacks, given limited network throughput. Conversely, asynchronous consensus algorithms, e.g., Honey-BadgerBFT, are deemed more robust against many of these attacks and may provide high integrity in asynchrony events.
△ Less
Submitted 4 March, 2021;
originally announced March 2021.