Skip to Main content Open mobile menu Close mobile menu
Researchers take control of Siri, Alexa, and Google Home with lasers
  1. Researchers take control of Siri, Alexa, and Google Home with lasers

    The newly discovered microphone vulnerability allows attackers to remotely inject inaudible and invisible commands into voice assistants using light.

  2. Offensive vehicle security toolbox makes car hacking easier

    The new system is designed to save security researchers time and effort spent reverse-engineering the message format of every vehicle they study.

  3. New tool combats evolving internet censorship methods

    Technology pioneered by Michigan researchers can circumvent many effective website blocking tools

  4. Michigan AI celebrates second annual symposium

    The goal of the symposium is to facilitate conversations between AI practitioners from Michigan and beyond.

  5. Year of vulnerability hunting uncovers potential attacks on Intel Chips, RAM

    All three of these attacks put users’ privacy at risk, exploiting new routes to sensitive data.

  6. CSE faculty bring significant showing to major systems conference

    Researchers designed three new systems to speed up code at several key bottlenecks.

  7. Five EECS faculty and alumni recognized for business success

    Nominees were selected based on their career accomplishments, impact in their field, and contributions to their community.

  8. $2M NSF grant to explore data equity systems

    Researchers plan to establish a framework for a national institute that would enable research using sensitive data, while preventing misuse and misinterpretation.

  9. $1M NSF grant supports new system for gathering, structuring data with ease

    The team’s new tool will combine of software and data to make gathering structured data dramatically easier.

  10. Remote attack on temperature sensors threatens safety in incubators and industry

    The researchers demonstrated that an adversary could remotely manipulate the temperature sensor measurements without tampering with the targeted system or triggering automatic temperature alarms.