Skip to Main content Open mobile menu Close mobile menu
Blog
  1. Shared Memory in Mobile Operating Systems Provides Ingress Point for Hackers

  2. Sneak attack through smartphone shared memory

    A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of Michigan has shown.

  3. Researchers demo hack to seize control of municipal traffic signal systems

  4. Can our computers continue to get smaller and more powerful?

  5. Peter Tchoryk: An entrepreneurial CEO

    At MAC, Peter’s been able to combine his passions for scientific research and entrepreneurial creation.

  6. Shrinking the size of optical systems, exponentially

    The researchers believe that metasurfaces could one day be used to completely control the phase, amplitude, and polarization of light.

  7. Wakefield and Kieras win Best Paper Award at ICAD 2014

    The paper addresses how to manage multiple sources so that the user can maximize the information gained from each acoustic source.

  8. Parinaz Naghizadeh, Researcher in economic network security, is named a Barbour Scholar

    Parinaz’s research is in combining communications with economics to assess the security of a network and then apply that to cyber-insurance contracts.

  9. T-ray converts light to sound for weapons detection, medical imaging

    U-M researchers demonstrated a unique terahertz detector and imaging system that could bridge the terahertz gap.

  10. Making smartphones smarter: hijack adopted for use in commercial product