Red Hat Research Days Events 2021

A monthly series of virtual conversations between researchers and Red Hat experts

 

 

Watch the recordings from previous events

Connect with researchers and Red Hat experts to discuss research innovations in open source. Monthly research events include live video discussions where all attendees can join the conversations.

 

Join Upcoming Research Days Events

No event found!

Session Recordings 

The Future of Big Data: Massive Real-Time Data Streams | March 2  

 

by Ilya Kolchinsky | Red Hat, Technion
and Oren Oichman | Red Hat

Show the abstract

As we enter the era of Big Data, a large number of data-driven systems and applications have become an integral part of our daily lives, and this trend is accelerating dramatically. It is estimated that 1.7MB of data is created every second for every person on Earth, for a total of over 2.5 quintillion bytes of new data every day, reaching 163 zettabytes by 2025. In addition to the growing volume, velocity, and variety of continuously generated data, novel technological trends such as edge processing, IoT, 5G, and federated AI bring new requirements for faster processing and deeper, more computationally heavy data analysis. Therefore, we can no longer rely on the “old school” data processing mechanisms, and a new paradigm is needed.

In this talk, we explore this new paradigm, which we call Big Data Stream Processing (BDSP). BDSP comprises a variety of methods for scalable and efficient data processing that do not rely on traditional databases for storing and processing the data. We cover examples of real-life applications that can greatly benefit from incorporating BDSP capabilities.

In particular, we cover:
– On-the-fly detection of complex patterns in streaming data
– Stream-oriented machine learning and data mining

 

Mining Issued Common Criteria and FIPS 140-2 Certificates | March 24 

 

by Petr Švenda Masaryk University

Show the abstract

Security certification reports might be long, but they are also a trove of publicly available data about proprietary devices and other products otherwise available only under NDAs. While downloading and reading a single certificate is easy, reasoning about the characteristics of the whole ecosystem, which covers more than ten thousand certified devices based on human-written documents, is different. Are there observable systematic differences between the Common Criteria and FIPS 140-2 certificates? Can I quickly find out if my device is using a certified component recently found vulnerable? Most importantly, can we measure and quantify whether the whole process is actually increasing the security of the products being certificated? This talk address these questions using an open source tool for automatic analysis of publicly available certification reports, accompanied by catchy graphs.

A Plan for Practical Programming of FPGAs in the Data Center | April 22  

 

by Martin Herbordt | Boston University, Robert Munafo |  CAAD Lab at Boston University
and Ahmed Sanaullah | Red Hat

Show the abstract

To leverage the flexibility and performance potential of FPGAs in the data center requires either expensive specialized engineering talent, or commercial proprietary C-to-hardware tools that yield demonstrably poor performance. This is the performance portability programmability problem (P^4). 

In previous work, we found that there exists within current compilers the capability of delivering excellent FPGA performance for arbitrary C code, but that this capability is brittle, inconsistent, and requires some expertise on the part of the user to extract. Still, this result demonstrates that P^4 can be reduced to the problem of generating the correct sequence of optimizations for a particular input code and target architecture. Our hypothesis is that a solution to P^4 can be built using existing open source tools, primarily based on GCC, coupled with well-known machine learning techniques.

In this talk, we describe our plan in detail, together with problems to be solved, and outline our work to date. In particular, we report on an ongoing project that aims to use machine learning to control a newly customizable version of the GCC C compiler to automatically determine optimization pass ordering for FPGA targets specifically, and thereby improve performance as compared to existing (all proprietary) C-to-FPGA methods.

Platypus: Power Side Channels In Software | June 23  

 

by Daniel Gruss, Moritz Lipp | Graz University of Technology
and Jon Masters | Red Hat

Show the abstract

In this talk, we demonstrate how we can attack modern processors purely in software, using techniques from classical power side-channel attacks. We explain how we abuse the unprivileged access to energy-monitoring features of modern Intel and AMD CPUs. With Platypus, we show how to steal cryptographic keys from the operating system or trusted-execution environments, and how to break kernel address-space layout randomization within seconds. Finally, we discuss the mitigations that prevent our attacks.

About Red Hat Research Days

Research Days events highlight Red Hat’s research initiatives. We bring together international researchers, Red Hat engineers, industry representatives, customers, partners, and others to share knowledge about the latest research findings, network with research enthusiasts from around the world and learn about moving great research ideas into open source communities.