Niclas Hedam

Niclas Hedam
  • Doctor of Philosophy
  • Security Advisor at itm8 A/S

About

8
Publications
8,614
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
41
Citations
Introduction
Niclas Hedam is a dedicated security expert, focusing on safeguarding information, systems, and people against evolving threats and vulnerabilities. With significant technical experience and a deep passion for security and privacy, Niclas is committed to ensuring the confidentiality, integrity, and availability of critical infrastructure in a rapidly evolving digital landscape.
Current institution
itm8 A/S
Current position
  • Security Advisor
Additional affiliations
August 2020 - August 2024
IT University of Copenhagen
Position
  • PhD Fellow
Description
  • My PhD is funded by the DAPHNE project, which is an EU research project for designing integrated data analysis pipelines for large-scale data management, HPC, and machine learning.
July 2019 - July 2020
IT University of Copenhagen
Position
  • Research Assistant
Description
  • Assisting in the research of the Open-Channel SSD technology with the Data Systems group at the Institute of Computer Science. For regulatory reasons, the contractual position is "Student Worker". However, my duties resembles that of a Research Assistant.
Education
August 2019 - July 2022
IT University of Copenhagen
Field of study
  • Computer Science
August 2016 - July 2019
IT University of Copenhagen
Field of study
  • Software Development

Publications

Publications (8)
Thesis
Full-text available
In the two decades since the end of Dennard scaling, improving processing capabilities without increasing processor frequency has become a key challenge for computer science researchers. Concurrently, while storage device throughput has increased exponentially, the throughput between CPU and memory has only improved linearly. Computational storage,...
Conference Paper
Full-text available
The idea of pushing computation to storage devices has been explored for decades, without widespread adoption so far. The definition of Computational Programs namespaces in NVMe (TP 4091) might be a breakthrough. The proposal defines device-specific programs , that are installed statically, and downloadable programs, offloaded from a host at run-ti...
Preprint
Full-text available
eBPF allows software developers to write programs that are executed in the kernel without requiring recompi-lation and system restart. These programs can collect critical performance metrics or alter user-space system contexts when a kernel function is invoked. In this paper , we will describe and discuss the architecture of eBPF as well as the cor...
Technical Report
Full-text available
Report and prototype of used data path optimization techniques and automatic data placement in hybrid memory and storage configurations. This deliverable describes the second version of the demonstrator of the Delilah computational storage prototype. The report also describes data path optimizations and placement in the context of the DAPHNE storag...
Conference Paper
Full-text available
Integrated data analysis (IDA) pipelines---that combine data management (DM) and query processing, high-performance computing (HPC), and machine learning (ML) training and scoring---become increasingly common in practice. Interestingly, systems of these areas share many compilation and runtime techniques, and the used---increasingly heterogeneous--...
Technical Report
Full-text available
Report on state-of-the-art techniques for computational storage, near-data processing, and potential side effects in the context of the I/O hierarchy, as well as an overview of automatically determining the capabilities of a storage configuration.
Conference Paper
Full-text available
Hash-based authentication is a widespread technique for protecting passwords in many modern software systems including databases. A hashing function is a one-way mathematical function that is used in various security contexts in this domain. In this paper, we revisit three popular hashing algorithms (MD5, SHA-1, and NTLM), that are considered weak...
Conference Paper
Full-text available
Open-Channel SSDs are storage devices that let hosts take full control over data placement and I/O scheduling. In recent years, they have gained acceptance in data centers (e.g., Alibaba) and for computational storage (e.g., Pliops). Open-Channel SSDs require a host-based Flash Translation Layer (FTL) that manages the physical address space they ex...

Network

Cited By