Niclas Hedam

Niclas Hedam
IT University of Copenhagen · Computer Science

Master of Science
Working with eBPF and Computational Storage in the context of DAPHNE

About

4
Publications
3,996
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2
Citations
Introduction
Niclas is interested in cross-disciplinary research between security and data systems. Key research interests include Data Systems, Security, Privacy, Persistent Storage, Computational Storage, Trusted Storage
Additional affiliations
August 2020 - present
IT University of Copenhagen
Position
  • PhD Student
July 2019 - July 2020
IT University of Copenhagen
Position
  • Research Assistant
Description
  • Assisting in the research of the Open-Channel SSD technology with the Data Systems group at the Institute of Computer Science. For regulatory reasons, the contractual position is "Student Worker". However, my duties resembles that of a Research Assistant.
Education
August 2019 - July 2022
IT University of Copenhagen
Field of study
  • Computer Science
August 2016 - July 2019
IT University of Copenhagen
Field of study
  • Software Development

Publications

Publications (4)
Conference Paper
Full-text available
Integrated data analysis (IDA) pipelines---that combine data management (DM) and query processing, high-performance computing (HPC), and machine learning (ML) training and scoring---become increasingly common in practice. Interestingly, systems of these areas share many compilation and runtime techniques, and the used---increasingly heterogeneous--...
Preprint
Full-text available
eBPF allows software developers to write programs that are executed in the kernel without requiring recompi-lation and system restart. These programs can collect critical performance metrics or alter user-space system contexts when a kernel function is invoked. In this paper , we will describe and discuss the architecture of eBPF as well as the cor...
Conference Paper
Full-text available
Hash-based authentication is a widespread technique for protecting passwords in many modern software systems including databases. A hashing function is a one-way mathematical function that is used in various security contexts in this domain. In this paper, we revisit three popular hashing algorithms (MD5, SHA-1, and NTLM), that are considered weak...
Conference Paper
Full-text available
Open-Channel SSDs are storage devices that let hosts take full control over data placement and I/O scheduling. In recent years, they have gained acceptance in data centers (e.g., Alibaba) and for computational storage (e.g., Pliops). Open-Channel SSDs require a host-based Flash Translation Layer (FTL) that manages the physical address space they ex...

Network

Cited By

Projects

Project (1)
Project
Understanding the fundamentals of eBPF to use in the context of computational storage.