Tagged with: hacking


PROPOSAL

The Deconstructed Cloud Databases project stems from a simple question: What are the minimum components required to build a data management system in the cloud? Our motivation for this project is based on the idea that reducing a system to its minimum set of components makes it easier to build, test, and maintain cloud data management systems. This approach requires less engineering effort, …
Supervisors: Martin Hentschel
Semester: Fall 2024
Tags: data management, performance, benchmarking, hacking

PROPOSAL

Hash-based authentication is an effective way of protecting passwords in software systems. Hashing obscures the original passwords, such that it cannot be recovered in case of a database breach. However, as demonstrated by our paper titled Hash-Based Authentication Revisited in the Age of High-Performance Computers, the practical security depends on which hashing algorithm is used as well as the …
Supervisors: Pınar Tözün, Niclas Hedam
Tags: benchmarking, hashing, security, GPU, hacking, HPC