
Niclas Hedam- Doctor of Philosophy
- Security Advisor at itm8 A/S
Niclas Hedam
- Doctor of Philosophy
- Security Advisor at itm8 A/S
About
8
Publications
8,614
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
41
Citations
Introduction
Niclas Hedam is a dedicated security expert, focusing on safeguarding information, systems, and people against evolving threats and vulnerabilities. With significant technical experience and a deep passion for security and privacy, Niclas is committed to ensuring the confidentiality, integrity, and availability of critical infrastructure in a rapidly evolving digital landscape.
Current institution
itm8 A/S
Current position
- Security Advisor
Additional affiliations
July 2019 - July 2020
Education
August 2019 - July 2022
August 2016 - July 2019
Publications
Publications (8)
In the two decades since the end of Dennard scaling, improving processing capabilities without increasing processor frequency has become a key challenge for computer science researchers. Concurrently, while storage device throughput has increased exponentially, the throughput between CPU and memory has only improved linearly. Computational storage,...
The idea of pushing computation to storage devices has been explored for decades, without widespread adoption so far. The definition of Computational Programs namespaces in NVMe (TP 4091) might be a breakthrough. The proposal defines device-specific programs , that are installed statically, and downloadable programs, offloaded from a host at run-ti...
eBPF allows software developers to write programs that are executed in the kernel without requiring recompi-lation and system restart. These programs can collect critical performance metrics or alter user-space system contexts when a kernel function is invoked. In this paper , we will describe and discuss the architecture of eBPF as well as the cor...
Report and prototype of used data path optimization techniques and automatic data placement in hybrid memory and storage configurations. This deliverable describes the second version of the demonstrator of the Delilah computational storage prototype. The report also describes data path optimizations and placement in the context of the DAPHNE storag...
Integrated data analysis (IDA) pipelines---that combine data management (DM) and query processing, high-performance computing (HPC), and machine learning (ML) training and scoring---become increasingly common in practice. Interestingly, systems of these areas share many compilation and runtime techniques, and the used---increasingly heterogeneous--...
Report on state-of-the-art techniques for computational storage, near-data processing, and potential side effects in the context of the I/O hierarchy, as well as an overview of automatically determining the capabilities of a storage configuration.
Hash-based authentication is a widespread technique for protecting passwords in many modern software systems including databases. A hashing function is a one-way mathematical function that is used in various security contexts in this domain. In this paper, we revisit three popular hashing algorithms (MD5, SHA-1, and NTLM), that are considered weak...
Open-Channel SSDs are storage devices that let hosts take full control over data placement and I/O scheduling. In recent years, they have gained acceptance in data centers (e.g., Alibaba) and for computational storage (e.g., Pliops). Open-Channel SSDs require a host-based Flash Translation Layer (FTL) that manages the physical address space they ex...