-
What it takes to solve the Origin(s) of Life: An integrated review of techniques
Authors:
OoLEN,
Silke Asche,
Carla Bautista,
David Boulesteix,
Alexandre Champagne-Ruel,
Cole Mathis,
Omer Markovitch,
Zhen Peng,
Alyssa Adams,
Avinash Vicholous Dass,
Arnaud Buch,
Eloi Camprubi,
Enrico Sandro Colizzi,
Stephanie Colón-Santos,
Hannah Dromiack,
Valentina Erastova,
Amanda Garcia,
Ghjuvan Grimaud,
Aaron Halpern,
Stuart A Harrison,
Seán F. Jordan,
Tony Z Jia,
Amit Kahana,
Artemy Kolchinsky,
Odin Moron-Garcia
, et al. (13 additional authors not shown)
Abstract:
Understanding the origin(s) of life (OoL) is a fundamental challenge for science in the 21st century. Research on OoL spans many disciplines, including chemistry, physics, biology, planetary sciences, computer science, mathematics and philosophy. The sheer number of different scientific perspectives relevant to the problem has resulted in the coexistence of diverse tools, techniques, data, and sof…
▽ More
Understanding the origin(s) of life (OoL) is a fundamental challenge for science in the 21st century. Research on OoL spans many disciplines, including chemistry, physics, biology, planetary sciences, computer science, mathematics and philosophy. The sheer number of different scientific perspectives relevant to the problem has resulted in the coexistence of diverse tools, techniques, data, and software in OoL studies. This has made communication between the disciplines relevant to the OoL extremely difficult because the interpretation of data, analyses, or standards of evidence can vary dramatically. Here, we hope to bridge this wide field of study by providing common ground via the consolidation of tools and techniques rather than positing a unifying view on how life emerges. We review the common tools and techniques that have been used significantly in OoL studies in recent years. In particular, we aim to identify which information is most relevant for comparing and integrating the results of experimental analyses into mathematical and computational models. This review aims to provide a baseline expectation and understanding of technical aspects of origins research, rather than being a primer on any particular topic. As such, it spans broadly -- from analytical chemistry to mathematical models -- and highlights areas of future work that will benefit from a multidisciplinary approach to tackling the mystery of life's origin. Ultimately, we hope to empower a new generation of OoL scientists by reviewing how they can investigate life's origin, rather than dictating how to think about the problem.
△ Less
Submitted 24 August, 2023; v1 submitted 22 August, 2023;
originally announced August 2023.
-
From MMU to MPU: adaptation of the Pip kernel to constrained devices
Authors:
Nicolas Dejon,
Chrystel Gaber,
Gilles Grimaud
Abstract:
This article presents a hardware-based memory isolation solution for constrained devices. Existing solutions target high-end embedded systems (typically ARM Cortex-A with a Memory Management Unit, MMU) such as seL4 or Pip (formally verified kernels) or target low-end devices such as ACES, MINION, TrustLite, EwoK but with limited flexibility by proposing a single level of isolation. Our approach co…
▽ More
This article presents a hardware-based memory isolation solution for constrained devices. Existing solutions target high-end embedded systems (typically ARM Cortex-A with a Memory Management Unit, MMU) such as seL4 or Pip (formally verified kernels) or target low-end devices such as ACES, MINION, TrustLite, EwoK but with limited flexibility by proposing a single level of isolation. Our approach consists in adapting Pip to inherit its flexibility (multiple levels of isolation) but using the Memory Protection Unit (MPU) instead of the MMU since the MPU is commonly available on constrained embedded systems (typically ARMv7 Cortex-M4 or ARMv8 Cortex-M33 and similar devices). This paper describes our design of Pip-MPU (Pip's variant based on the MPU) and the rationale behind our choices. We validate our proposal with an implementation on an nRF52840 development kit and we perform various evaluations such as memory footprint, CPU cycles and energy consumption. We demonstrate that although our prototyped Pip-MPU causes a 16% overhead on both performance and energy consumption, it can reduce the attack surface of the accessible application memory from 100% down to 2% and the privileged operations by 99%. Pip-MPU takes less than 10 kB of Flash (6 kB for its core components) and 550 B of RAM.
△ Less
Submitted 11 January, 2023;
originally announced January 2023.
-
One Year of DDoS Attacks Against a Cloud Provider: an Overview
Authors:
Clément Boin,
Xavier Guillaume,
Gilles Grimaud,
Tristan Groléat,
Michaël Hauspie
Abstract:
Distributed denial of service attacks represents one of the most important threats to cloud-providers. Over the years, volumetric DDoS attacks have become increasingly important and complex. Due to the rapid adaptation of attackers to the detection and mitigation methods designed to counter them, the industry needs to constantly monitor and analyse the attacks they face. In this paper, we present…
▽ More
Distributed denial of service attacks represents one of the most important threats to cloud-providers. Over the years, volumetric DDoS attacks have become increasingly important and complex. Due to the rapid adaptation of attackers to the detection and mitigation methods designed to counter them, the industry needs to constantly monitor and analyse the attacks they face. In this paper, we present an overview of the attacks that were perpetrated against our infrastructure in 2021. Our motivation is to give an insight of the challenge that DDoS attacks still represent within a large European cloud provider
△ Less
Submitted 30 August, 2022;
originally announced August 2022.
-
A Low-Footprint Class Loading Mechanism for Embedded Java Virtual Machines
Authors:
Christophe Rippert,
Alexandre Courbot,
Gilles Grimaud
Abstract:
This paper shows that it is possible to dramatically reduce the memory consumption of classes loaded in an embedded Java virtual machine without reducing its functionalities. We describe how to pack the constant pool by deleting entries which are only used during the class loading process. We present some benchmarks which demonstrate the efficiency of this mechanism. We finally suggest some addi…
▽ More
This paper shows that it is possible to dramatically reduce the memory consumption of classes loaded in an embedded Java virtual machine without reducing its functionalities. We describe how to pack the constant pool by deleting entries which are only used during the class loading process. We present some benchmarks which demonstrate the efficiency of this mechanism. We finally suggest some additional optimizations which can be applied if some restrictions to the functionalities of the virtual machine can be tolerated.
△ Less
Submitted 14 November, 2006;
originally announced November 2006.