Red Hat Research Quarterly
Highlights from this issue
Opening the doors of tech: Why diversity is critical to the future of computing
An interview with Barbora Buhnová.
Volume 3, Issue 3 • ISSN 2691-5278
Departments
Features
Inside this issue
Timing attacks have been used successfully against a variety of popular encryption techniques, but they can be prevented with consistent use of constant-time code practice. Cryptography provides privacy for millions of people, whether by ensuring end-to-end encrypted messaging, securing more than ninety percent of the web behind HTTPS, or establishing trust behind the digital signatures […]
Exclusivity of resources is becoming obsolete. The Elastic Secure Infrastructure Project (ESI) provides a solution for sharing computing resources and getting the most from hardware investments. Using resources efficiently is an important goal for any organization. If those resources are computers, then theoretically that goal should be easily achievable, because machines don’t get tired and […]
Is there a way to gain the performance benefits of a unikernel without severing it from an existing general-purpose code base? Boston University professors, BU PhD students, and Red Hat engineers at the Red Hat Collaboratory at Boston University are getting close to finding the answer. A unikernel is a single bootable image consisting of […]
Machine learning has been driving research breakthroughs in many fields. Now there is an open source curriculum designed to help non-specialists build the skills they need to use it. Machine learning is an increasingly important competency in a growing number of fields. Biochemists are using it to create models for protein engineering. Economists are using […]
This notion of time is what struck me as so interesting about this issue’s feature on constant-time cryptography. It turns out that a crypto implementation whose execution time varies depending on what you feed to it is inherently leaky. By looking at the inputs to a non-constant-time crypto function, an attacker can infer enough about the secret key the function depends on to guess the key, often trivially. Like a drummer who gets distracted by a solo and rushes or drags the time, the crypto function reflects back information about the secret it is protecting.
The Collaboratory solicited proposals from BU faculty for both large and small research projects to drive innovation for the open hybrid cloud. The Red Hat Collaboratory at Boston University has moved into a new phase of identifying and funding promising research projects, and the selection process is currently underway. The submission deadline was October 1, […]
A new project seeks to make effective testing more compatible with expeditious releases In August 2021, a team of graduate students from IDC Herzliya, a leading research college in Israel, began working on a test case prioritization (TCP) project under the guidance of senior engineers from Red Hat. The goal of the TCP project is […]
Researchers from Red Hat and Karlstad University, Sweden, have recently finished their first year of work on enhancing the performance of the eXpress Data Path (XDP), a data path integrated into the Linux kernel that permits flexible programmable networking. The group’s year one report, “Building the next generation of programmable networking—powered by Linux,” was released […]
Red Hat Research University Program Manager Matej Hrušovský interviewed Barbora Buhnová, Associate Professor and Vice Dean for industrial partners at Masaryk University, Faculty of Informatics in Brno, Czech Republic. She is also the chair of the Association of Industrial Partners of Masaryk University, Faculty of Informatics, and is a co-founding and governing board member of […]
Each quarter, Red Hat Research Quarterly highlights new and ongoing research collaborations from around the world. This quarter we highlight collaborative projects in the Czech Republic, at Masaryk University (Brno), Brno University of Technology, and Czech Technical University (Prague). Contact academic@redhat.com for more information on any project described here, or visit the Red Hat Research […]
RHRQ interviewed Idan Levi, the Research Interest Group leader in Israel, to find out how research collaboration has changed over the last year and a half as the world went virtual. RHRQ: As the leader of Red Hat Research in Israel, you work with universities that are geographically dispersed, for example, Technion to the north, […]