Are autonomous vehicles so great if your car gets hacked?
What if someone took control of a city’s traffic signals or water treatment? With reliance on remote sensing and control algorithms, how can someone be sure they aren’t falling prey to faked data when making decisions? Think about what’s needed to protect against interference with the electronic and human systems embedded in every process.
Departments conducting research relating to Cybersecurity are wide-ranging. Learn more about the multi-disciplinary approaches to gaining Cybersecurity in your undergraduate degree.
Prof. Zetian Mi’s team are the first to achieve high-performance, highly stable green micro-LEDs with dimensions less than 1 micrometer on silicon, which can support ultrahigh-resolution full-color displays and other applications.
The new approach moves energy efficiently and could reduce energy losses converting light into electricity.
The hectoSTAR probe, with 128 stimulating micro-LEDs and 256 recording electrodes integrated in the same neural probe, was designed for some stellar brain mapping projects
The post Next generation neural probe leads to expanded understanding of the brain appeared first on Engineering Research News.
Virtual assortment of user devices provides a realistic training environment for distributed machine learning, protects privacy by learning where data lives.
The post Open source platform enables research on privacy-preserving machine learning appeared first on Engineering Research News.
The adaptive immune system serves as a template for defending neural nets from confusion-sowing attacks
A charge-neutral information carrier could cut energy waste from computing, now that it can potentially be transported within chips.
The post ‘Exciton surfing’ could enable next-gen energy, computing and communications tech appeared first on Engineering Research News.
A medical security expert outlines the risks and how hospitals can protect themselves.
The post 5 ways to keep vaccine cold storage equipment safe from hackers appeared first on Engineering Research News.
Two researchers have debunked the common assumption that the famous Paxos consensus protocol is too complex to be proven safe without hours of manual labor.
The post Distributed protocol underpinning cloud computing automatically determined safe and secure appeared first on Engineering Research News.
The researchers compare them to fat deposits in living creatures.
“The technology can give users the confidence they deserve when reusing respirators or other PPE.”
Public policy and engineering team up to improve food access.
The post Hunger and COVID: Fighting pandemic-related food insecurity in Detroit appeared first on Engineering Research News.
U-M is a core member of a new NSF-led Institute that is a collaboration between 11 institutions, three government research labs, and four global companies.
The post $20M NSF AI-EDGE Institute aims to transform 5G and beyond networks appeared first on Engineering Research News.
The nation is using inexpensive commodity equipment to block 170K domains on more than 1K privately-owned ISPs.
The post How Russia’s online censorship could jeopardize internet freedom worldwide appeared first on Engineering Research News.
Circuit elements that store information in their electrical resistances enable a brain-like form of computing, storing and processing information in the same place.
The post First programmable memristor computer aims to bring AI processing down from the cloud appeared first on Engineering Research News.
Censored Planet could provide new insight into the flow of online information
The post Online censorship detector aims to make the internet a freer place appeared first on Engineering Research News.
New, preliminary research found automated speech test accurately diagnoses Huntington’s disease 81 percent of the time and tracks the disease’s progression.
The post Detecting Huntington’s disease with an algorithm that analyzes speech appeared first on Engineering Research News.
System sniffs out fakes up to 76 percent of the time.
The post Fake news detector algorithm works better than a human appeared first on Engineering Research News.
The post Chat tool simplifies tricky online privacy policies appeared first on Engineering Research News.
Verdict can make databases deliver answers more than 200 times faster while maintaining 99 percent accuracy.
The post “Learning database” speeds queries from hours to seconds appeared first on Engineering Research News.
Highlights include Bloomberg, New York Times and the Detroit News.
The post In the news: Michigan Engineering experts May 24-28 appeared first on Engineering Research News.
The algorithm can pick out weak signals from nuclear weapons materials, hidden in ordinary radiation sources like fertilizer.
The post Catching nuclear smugglers: fast algorithm could enable cost-effective detectors at borders appeared first on Engineering Research News.
Highlights include Newsweek and The Conversation.
The post In the news: Michigan Engineering experts June 7-11 appeared first on Engineering Research News.
Highlights include Nature and Newsweek.
The post In the news: Michigan Engineering experts September 27 – October 1 appeared first on Engineering Research News.
Highlights include the Los Angeles Times.
The post In the news: Michigan Engineering experts August 9-13 appeared first on Engineering Research News.
Highlights include NPR, Popular Science and The Conversation.
The post In the news: Michigan Engineering experts May 17-21 appeared first on Engineering Research News.
Highlights include The Conversation, MLive and the Washington Post.
The post In the news: Michigan Engineering experts May 10-14 appeared first on Engineering Research News.
Highlights include the CBC and MLive.
The post In the news: Michigan Engineering experts July 19-23 appeared first on Engineering Research News.
Highlights include Popular Science, CNet and Science Alert
The post In the news: Michigan Engineering experts June 14-18 appeared first on Engineering Research News.
University of Michigan’s MORPHEUS technology emerges unscathed from bug bounty effort.
The post DARPA pitted 500+ hackers against this computer chip. The chip won. appeared first on Engineering Research News.
More than 250 students had a hand in a satellite scheduled to launch on January 17th, the first in space for a project to keep nanosats in orbit by harnessing Earth’s magnetic field.
The post Pioneering a way to keep very small satellites in orbit appeared first on Engineering Research News.
Graphical online simulation could spur more targeted COVID-19 protection measures.
Powered by a broadband infrared laser, the device can zero in on the ‘spectral fingerprint region’.
Vehicles that perceive obstacles that aren’t really there could cause traffic accidents.
The post Autonomous vehicles can be fooled to ‘see’ nonexistent obstacles appeared first on Engineering Research News.
The frame in which a human marks out the boundaries of an object makes a huge difference in how well AI software can identify that object through the rest of the video.
The post Computer vision: Finding the best teaching frame in a video for fake video fightback appeared first on Engineering Research News.
By putting a twist on new “2D” semiconductors, researchers have demonstrated their potential for using single photons to transmit information.
An interdisciplinary team from four universities are developing a new class of semiconductors for novel artificial photosynthesis and the production of clean chemicals and fuels using sunlight, as part of a DoD MURI
How the safety of a wireless charging room stacks up to that of a cell phone.
The post Wireless electricity and safety: A Q&A with Alanson Sample appeared first on Engineering Research News.
Highlights include Wired and CNN.
The post In the news: Michigan Engineering experts August 2-6 appeared first on Engineering Research News.
Could censorship end the internet as we know it? Not if Roya Ensafi can help it.
A self-erasing chip for security and anti-counterfeit tech.
New software finally makes ‘memory disaggregation’ practical.
Ironpatch could head off growing danger of security vulnerabilities in vehicle systems.
The post $1.8M DARPA project aims to protect cars, trucks and spacecraft from hackers appeared first on Engineering Research News.
A Q&A with J. Alex Halderman, who co-founded the nonprofit organization.
DARPA’s initiative to reinvigorate the microelectronics industry draws deeply on Michigan Engineering expertise.
The post Beyond Moore’s law: $16.7M for advanced computing projects appeared first on Engineering Research News.
Expert advice for voting in an unprecedented election.
The post 5 ways Americans can keep their vote secure and accurate appeared first on Engineering Research News.
Researchers carried out the first study on voter behavior with electronic assistive devices, found 93% missed incorrect ballots.
The post Not enough voters detecting ballot errors and potential hacks, study finds appeared first on Engineering Research News.
Patches can provide protection.
The post Intel processor vulnerability could put millions of PCs at risk appeared first on Engineering Research News.
U-M profs weigh new business model, European-style regulation
The post Zuckerberg Capitol Hill testimony: Engineering experts offer comments appeared first on Engineering Research News.
In this video, CSE PhD Student Matt Bernhard weighs in on the matter Facebook data harvesting, such as that done by Cambridge Analytica.
The post CSE PhD student Matt Bernhard on the Facebook data breach appeared first on Engineering Research News.
Censys is the first commercially available internet-wide scanning tool. It helps IT experts to secure large networks with a constantly changing array of devices.
The post Internet-scanning U-M startup offers new approach to cybersecurity appeared first on Engineering Research News.
New vulnerabilities form when hardware like electronic locks, thermostats, ovens, sprinklers, lights and motion sensors are networked and set up to be controlled remotely.
A five-nanometer-thick layer of silver and copper outperforms conventional indium tin oxide without adding cost.
The post Nanotech OLED electrode liberates 20% more light, could slash display power consumption appeared first on Engineering Research News.
Researchers demonstrated the use of stacked, transparent graphene photodetectors combined with image processing algorithms to produce 3D images and range detection.
The post A 3D camera for safer autonomy and advanced biomedical imaging appeared first on Engineering Research News.
Mingyan Liu, recipient of the 2018 Distinguished Innovator of the Year award, gave a talk about her startup company and participated on a panel discussing data science commercialiation.
Liu’s most recent research involves online learning, modeling of large-scale internet measurement data, and incentive mechanisms for security games.
This new book by Mingyan Liu offers an engineering and strategic approach to improving cybersecurity through cyber insurance
The workshop, co-organized by a team including two EECS faculty, focused on ensuring the safety of Level 3 autonomous vehicles, where humans must be ready to take over control.
Zhang is working to improve data security and address important ethical issues related to AI and discriminatory data sets.
With $7.5M MURI grant, Professor Anthony Grbic is developing metamaterials for a new generation of integrated electromagnetic and photonic systems.
Yektakhah’s system improves on the speed, portability, and accuracy of many commercial models
One of the paper describes and demonstrates a malicious hardware backdoor. The other demonstrated security failings in a commercial smart home platform.
Thomas and his group are working to improve upon artificial neural network design through a process called sparse coding.
Her dissertation focused on “opacity,” which captures whether a given secret of the system can be inferred by intruders who observe the behavior of the system.
She computationally measures, represents, and analyzes human behavior data to illuminate fundamental human behavior and emotion perception, and develop natural human-machine interfaces.
The IEEE Geoscience and Remote Sensing Society is a remote sensing organization with more than 3700 members around the globe.
Peterson’s findings could be used in wireless sensing and actuation systems, including those that deal with monitoring of the environment and medical conditions.
Since coming to the University in 1984, Bhattacharya has pioneered several important technological advances.
The researchers believe that metasurfaces could one day be used to completely control the phase, amplitude, and polarization of light.
The research group developed special fabrication processes that allows them to stack and bond seven different devices in layers.
By shining the laser on a target and analyzing the reflected light, researchers can tell the chemical composition of the target.
The technology could potentially identify a hidden weapon from a distance in less than a second.
McCullagh is working to develop energy harvesting devices and circuits to power wireless sensor nodes which can monitor bridge health.
The carbon nanotube carpet is about half the thickness of a sheet of paper and absorbs 99.9 percent of the light that hits it.
Mingyan Liu, renowned for her research specializing in communication networks and cybersecurity, has served as Chair of ECE since 2018.
Ozay presented on her research that is relevant to cybersecurity and the future of space exploration.
Karl (BSE MSE PhD EE) talks about how his time at Michigan helped prepare him for his dream job at Intel and a career advancing embedded memory technology and circuits.
ECE alum Kurt Rohloff helped create one of the world’s best homomorphic encryption software libraries, and he reflects on how his time at Michigan helped shape his career.
Porche discussed the changing definition of war and how information is playing a greater role than ever.
Porche shares the global state of cyber warfare, and how his time at Michigan led him to the front lines.
Analytic software company FICO of San Jose, Calif., bought QuadMetrics to help in its development of a FICO Enterprise Security Score.
QuadMetrics offers a pair of services to help companies both assess the effectiveness of their security and decide the best way to allocate (or increase) their security budget.
His paper detailed his use of big data analysis to solve a major problem of cyber security.
Parinaz’s research is in combining communications with economics to assess the security of a network and then apply that to cyber-insurance contracts.
The Rising Star Award is based on an individual’s whole body of work in the first five years after the PhD.
His work in the area of real-time computing has spanned decades and has had impact in a broad range of applications.
Secrets lurk in the dark web, the 95 percent of the internet that most of us can’t see. One U-M professor is bringing some of those secrets to light, making the digital and the real world a little safer.
He has built software systems for information extraction, database integration, and feature engineering and applied these to problems in the social sciences.
Prof. Mozafari is passionate about building large-scale data-intensive systems that are more scalable, more robust, and more predictable.
The software enables users to ask questions about the hosts and networks that compose the Internet and get an immediate reply.
Probabilities with a negative sign have been of great use in quantum physics.
Baris Kasikci plans to improve software fuzzers by learning how deployed software is most commonly run by users.
Prof. Greg Bodwin has devised a solution to an important open question in graph theory that offers promising new options for repairing and constructing resilient networks.
The thesis completely solves a longstanding open problem in the theory of distributed computing.
Through his work, Tim hopes to dramatically accelerate genomic sequencing analysis, enabling the use of handheld genomic sequencers to produce actionable diagnostic data within minutes.
The Michigan Game Studios database, developed by lecturer Austin Yarger, helps organize the state’s rapidly growing scene.
How automated guarantees that our most complex programs are secure and trustworthy can save us time, money, and anxiety.
The new technique automatically constructs policies for applications that keep them from compromising other programs.
The award recognizes early career faculty who show great promise in developing future computing technologies.
His work is in complexity theory of distributed computing.
A new secure code is needed to protect private information from the power of quantum computing.
The system targets software that runs using concurrent execution, a widespread method for boosting performance, and proves whether a program will output what it’s supposed to.
“My research has the potential to democratize programming and make it possible for millions of people around the globe to automate otherwise tedious tasks using programming.”
Researchers are working with the city on two key initiatives to address food availability for elderly and low-income populations.
The team will build high-quality datasets to enable automatic quality checking and fraud detection of the new coronavirus data.
The student’s project targets critical moments where the next instruction in a program is only available in a slower type of memory.
Subarno Banerjee uses program analysis to improve software systems’ safety and security.
Goel designs algorithms that can automatically demonstrate the correctness of hardware systems.
Most programs in use today have to be completely rewritten at a very low level to reap the benefits of hardware acceleration. This system demonstrates how to make that translation automatic.
Researchers have demonstrated the ability to “unlearn” sensitive identifying data from audio used to train machine learning models.
A team at Michigan proposed an approach to generating realistic and high-fidelity stock market data to enable broader study of financial markets.
This round of funding strongly encourages pioneering work with the potential for major expansion.
Comparing graphs the team’s tool is up to an order of magnitude faster than competitive baselines.
Researchers designed three new systems to speed up code at several key bottlenecks.
Researchers plan to establish a framework for a national institute that would enable research using sensitive data, while preventing misuse and misinterpretation.
The team’s new tool will combine of software and data to make gathering structured data dramatically easier.
Tang’s project will redesign data center systems to support large-scale use of hardware accelerators to meet future computational demand.
As a fungal infection ravages bat populations, the new game hopes to promote public awareness of ongoing research to combat the issue.
Using real-time fMRI readings, researchers linked spatial reasoning with CS problem solving.
Erie provided database repairs that were previously performed exclusively by human programmers.
Danai Koutra earned the award for her proposal to innovate the way we use networks to understand the world and speed up our technology.
Perez’s research focuses on analyzing speech patterns of patients with Huntington Disease.
The goal of the work was to identify seven things about who the subject was talking to just by analyzing text messages.
Chowdhury’s lab multiplied the number of jobs a GPU cluster can finish in a set amount of time
Graphs that are customized, stored locally, and able to change over time can enable faster and more accurate searching and digital assistants
Kasikci presents a method to improve a program’s ability to use data in a straightforward, efficient way
This conversational in-vehicle digital assistant can respond to drivers’ questions and commands in natural language
Researchers used hierarchical trees to provide a better idea of how concepts are represented and related in a collection of text.
Researchers have implemented a new way to diagnose software failures with a high degree of accuracy and efficiency.
Foofah is a tool that can help to minimize the effort and required background knowledge needed to clean up data.
Jie Song devised a method to combine summarized datasets that group information by incompatible units.
The researchers identified movement between industry, academia, and government work, tracked the growth of important organizations, and built predictive models for career transitions and employer retention.
Even though we interact with different web services in different ways, there are clues in the data that can indicate trends and identify a unique profile.
Jason Mars, CEO of Ann Arbor startup Clinc, was named #2 in Bank Innovations’s “10 Most innovative CEOs in Banking 2017” list. Clinc is leading the pack for development of intelligent banking assistant software.
Prof. Mao and her students have played an important role in understanding the efficiency, security, and performance of a number of mobile systems.
A group of researchers at U-M is working on the full big data stack for training machine learning models on millions of devices worldwide.
A new system called Leap earned a Best Paper award at USENIX ATC ‘20 for producing remote memory access speed on par with local machines over data center networks.
Their findings reduce average job completion time by up to 95% when the system load is high, while treating every job fairly.
The teams designed systems for faster and more efficient distributed and large-scale computing.
The team will develop a secure, data-intensive network solution to effectively transport extremely high volumes of research data on and off campus.
Akshitha Sriraman works to enable hyperscale computing on high-demand web services.
Edge Fabric offers providers real-time performance analysis and a way to incorporate this data into routing decisions.
Chowdhury’s work has produced important results that can make memory in data centers both cheaper and more efficient.
Danai Koutra has earned an Army Young Investigator Award to speed up graph methods for distributed applications.
Sensing technology could keep seniors safe.
SkyCore is a complete software solution to deploying mobile networks on unmanned drones
A new approach recreates the power of a large server by linking up and pooling the resources of smaller computers with fast networking technology.
The researchers, including Prof. Harsha Madhyastha and CSE graduate students Vaspol Ruamviboonsuk and Muhammed Uluyol, received prize for their paper, “Vroom: Accelerating the Mobile Web with Server-Aided Dependency Resolution.”
On Dec. 14, the FCC will vote on the rules that today ensure internet service providers treat all web content equally.
New Vroom software could double its speed.
Researchers have for the first time characterized a widespread vulnerability in the software that runs on mobile devices.
A total of five papers authored by CSE researchers were presented.
High tail latency has been identified as one of the key challenges facing modern data center design.
Klotski seeks to improve users’ perceptions of how quickly a page loads by maximizing the amount of important content on the page that is fetched and displayed within the user’s attention span.
Not all online traffic is the same; should we treat it the same anyway?
GridWatch can detect power outages by monitoring changes to its own power state, locally verifying these outages using a variety of sensors that reduce the likelihood of false power outage reports, and corroborating actual reports with other phones through data aggregation in the cloud.
The project aims to create a new software stack for analytics over geo-distributed datasets.
Let’s Encrypt allows anyone to request a free website security certificate without needing an invitation.
The focal point of the project will be a new computing resource, called ConFlux, which is designed to enable supercomputer simulations to interface with large datasets while running.
A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of Michigan has shown.
TrustForge, based on U-M research spearheaded by Austin and Bertacco, provides users with the ability to protect data using a process called sequestered encryption
A medical security expert outlines the risks and how hospitals can protect themselves.
Microphones that “hear” light; microprocessors that “tell” us secrets; self-driving cars that “see” fake objects; sensors that “feel” the wrong temperature. Our devices are under attack in new, increasingly sophisticated ways. Security researchers at CSE are exploring the limits of hardware and finding new, sobering vulnerabilities in our computers and homes.
Today, over 225 million websites are protected by free certificates issued by Let’s Encrypt.
The winning paper broke open a new area of investigation in hardware-based data leaks.
Censored Planet is releasing technical details for other researchers and for activists.
Prof. Roya Ensafi and PhD candidate Reethika Ramesh led organizing efforts for USENIX’s Tenth Workshop on Free and Open Communications on the Internet.
The two organizations will connect their membership and partner networks to work on advancing security for life-saving devices.
The projects impact voting systems, physical sensors, integrated circuit fabrication, and multiple microarchitectural side-channel vulnerabilities.
Prof. Austin is a creative, outside-the-box thinker who has produced a body of work that has had extraordinary impact in the area of computer architecture.
The team says their framework can scalably and semi-automatically monitor the use of filtering technologies for censorship at global scale.
The proposal provides a chip-level safeguard against sensitive data being transmitted after it’s accessed.
The newly discovered microphone vulnerability allows attackers to remotely inject inaudible and invisible commands into voice assistants using light.
The new system is designed to save security researchers time and effort spent reverse-engineering the message format of every vehicle they study.
Technology pioneered by Michigan researchers can circumvent many effective website blocking tools
All three of these attacks put users’ privacy at risk, exploiting new routes to sensitive data.
The researchers demonstrated that an adversary could remotely manipulate the temperature sensor measurements without tampering with the targeted system or triggering automatic temperature alarms.
The research generated a chatbot to help users sift through important details in privacy policies.
The research suggests that common blacklist-based prevention systems are ineffective.
The meeting began the commission’s review and assessment of election security in Michigan.
The effort seeks to protect the integrity of every vote.
In congressional testimony, professor urges $370M in federal funding to replace outdated machines.
McDonald works to develop better privacy and security tools for marginalized communities
A team of researchers unearthed new data on geographic denial of access to web content in a new paper.
A new special topics course on election cybersecurity gives students an examination of the past, present, and future of US elections.
“The work is an important step towards understanding how to make tradeoffs between usability and security.”
When it comes to their smartphones, immigrants struggle to apply instinctive caution, according to a study by a team of University of Michigan researchers.
A large quantum computer could retroactively decrypt almost all internet communication ever recorded.
The vulnerability allows an attacker to manipulate a new intelligent traffic control algorithm and cause severe traffic jams.
What happened to people inside the U.S. Embassy in Havana?
With election security experts waylaid by years debunking false claims of election fraud, little has improved since 2020.
The post Expert: 4 ways Americans can keep their vote secure and accurate appeared first on Engineering Research News.