Are autonomous vehicles so great if your car gets hacked?
What if someone took control of a city’s traffic signals or water treatment? With reliance on remote sensing and control algorithms, how can someone be sure they aren’t falling prey to faked data when making decisions? Think about what’s needed to protect against interference with the electronic and human systems embedded in every process.
Prof. Ozay presented on her research that is relevant to cybersecurity and the future of space exploration.
Since coming to the University in 1984, Prof. Bhattacharya has pioneered several important technological advances.
Prof. Peterson’s findings could be used in wireless sensing and actuation systems, including those that deal with monitoring of the environment and medical conditions.
The IEEE Geoscience and Remote Sensing Society is a remote sensing organization with more than 3700 members around the globe.
All have solutions, some are implemented.
The post Four election vulnerabilities uncovered by a Michigan Engineer appeared first on Michigan Engineering News.
Thinner than a human hair, the device amplifies and converts near infrared light into visible light with the potential for low power consumption and long battery life.
The post An OLED for compact, lightweight night vision appeared first on Michigan Engineering News.
It uses magnetic fields to display images at the same resolution as a squid’s color-changing skin.
The post This screen stores and displays encrypted images without electronics appeared first on Michigan Engineering News.
The anonymity could reduce unnecessary surveillance in an age of smart devices.
The post You’re just a stick figure to this camera appeared first on Michigan Engineering News.
Delaying a phone’s swiping and tapping functions forces users to think harder, making it easier for them to consider whether to keep scrolling.
The post Managing screen time by making phones slightly more annoying to use appeared first on Michigan Engineering News.
Synchronizing light and matter adds blue to the OLED color palette
The post Blue PHOLEDs: Final color of efficient OLEDs finally viable in lighting appeared first on Michigan Engineering News.
‘The innovation needs of the auto industry present a new set of opportunities for the semiconductor community.’
The post Automotive semiconductor effort builds momentum appeared first on Michigan Engineering News.
The award recognizes the outstanding contributions of a young scientist in the field of theoretical computer science.
With VizLens, users can touch buttons while their phones read out the labels, and Image Explorer provides a workaround for bad or missing alt text.
The post New apps for visually impaired users provide virtual labels for controls and a way to explore images appeared first on Michigan Engineering News.
Integrating a new ferroelectric semiconductor, it paves the way for single amplifiers that can do the work of multiple conventional amplifiers, among other possibilities.
The post New kind of transistor could shrink communications devices on smartphones appeared first on Michigan Engineering News.
Wintenberg is developing computer algorithms and tools to improve the security of cyber and cyber-physical systems.
Next-gen computing material gets down to the right size for modern manufacturing.
The post Nanoscale ferroelectric semiconductor could power AI and post-Moore’s Law computing on a phone appeared first on Michigan Engineering News.
Led by Prof. Becky Peterson, the research focuses on a category of materials important for low power logic operations, high pixel density screens, touch screens, and haptic displays.
The post Scalable method to manufacture thin film transistors achieves ultra-clean interface for high performance, low-voltage device operation appeared first on Michigan Engineering News.
Elaheh Ahmadi, David Blaauw, Michael Flynn, Hun-Seok Kim, Hessam Mahdavifar, and Zhengya Zhang bring their expertise and creativity to this nationwide undertaking in the area of semiconductors and information & communication technologies.
Dr. Mehdi Saligane, a leader in the open-source chip design community, was among the first researchers to fabricate a successful chip as part of Google’s multi-project wafer program.
The post Open-source hardware: a growing movement to democratize IC design appeared first on Michigan Engineering News.
Thatchaphol Saranurak and collaborators were recognized at SODA ’23 for their work that broke an approximation barrier in dynamic graph matching.
A new attack discovered by the University of Michigan and NASA exploits a trusted network technology to create unexpected and potentially catastrophic behavior
The post Cyber vulnerability in networks used by spacecraft, aircraft and energy generation systems appeared first on Michigan Engineering News.
With election security experts waylaid by years debunking false claims of election fraud, little has improved since 2020.
The post Expert: 4 ways Americans can keep their vote secure and accurate appeared first on Michigan Engineering News.
What happened to people inside the U.S. Embassy in Havana?
The vulnerability allows an attacker to manipulate a new intelligent traffic control algorithm and cause severe traffic jams.
A large quantum computer could retroactively decrypt almost all internet communication ever recorded.
When it comes to their smartphones, immigrants struggle to apply instinctive caution, according to a study by a team of University of Michigan researchers.
“The work is an important step towards understanding how to make tradeoffs between usability and security.”
A new special topics course on election cybersecurity gives students an examination of the past, present, and future of US elections.
A team of researchers unearthed new data on geographic denial of access to web content in a new paper.
McDonald works to develop better privacy and security tools for marginalized communities
In congressional testimony, professor urges $370M in federal funding to replace outdated machines.
The effort seeks to protect the integrity of every vote.
The meeting began the commission’s review and assessment of election security in Michigan.
The research suggests that common blacklist-based prevention systems are ineffective.
The research generated a chatbot to help users sift through important details in privacy policies.
The researchers demonstrated that an adversary could remotely manipulate the temperature sensor measurements without tampering with the targeted system or triggering automatic temperature alarms.
All three of these attacks put users’ privacy at risk, exploiting new routes to sensitive data.
Technology pioneered by Michigan researchers can circumvent many effective website blocking tools
The new system is designed to save security researchers time and effort spent reverse-engineering the message format of every vehicle they study.
The newly discovered microphone vulnerability allows attackers to remotely inject inaudible and invisible commands into voice assistants using light.
The proposal provides a chip-level safeguard against sensitive data being transmitted after it’s accessed.
The team says their framework can scalably and semi-automatically monitor the use of filtering technologies for censorship at global scale.
Prof. Austin is a creative, outside-the-box thinker who has produced a body of work that has had extraordinary impact in the area of computer architecture.
The projects impact voting systems, physical sensors, integrated circuit fabrication, and multiple microarchitectural side-channel vulnerabilities.
The two organizations will connect their membership and partner networks to work on advancing security for life-saving devices.
Prof. Roya Ensafi and PhD candidate Reethika Ramesh led organizing efforts for USENIX’s Tenth Workshop on Free and Open Communications on the Internet.
Censored Planet is releasing technical details for other researchers and for activists.
The winning paper broke open a new area of investigation in hardware-based data leaks.
Today, over 225 million websites are protected by free certificates issued by Let’s Encrypt.
Microphones that “hear” light; microprocessors that “tell” us secrets; self-driving cars that “see” fake objects; sensors that “feel” the wrong temperature. Our devices are under attack in new, increasingly sophisticated ways. Security researchers at CSE are exploring the limits of hardware and finding new, sobering vulnerabilities in our computers and homes.
A medical security expert outlines the risks and how hospitals can protect themselves.
TrustForge, based on U-M research spearheaded by Austin and Bertacco, provides users with the ability to protect data using a process called sequestered encryption
A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of Michigan has shown.
The focal point of the project will be a new computing resource, called ConFlux, which is designed to enable supercomputer simulations to interface with large datasets while running.
Let’s Encrypt allows anyone to request a free website security certificate without needing an invitation.
The project aims to create a new software stack for analytics over geo-distributed datasets.
GridWatch can detect power outages by monitoring changes to its own power state, locally verifying these outages using a variety of sensors that reduce the likelihood of false power outage reports, and corroborating actual reports with other phones through data aggregation in the cloud.
Not all online traffic is the same; should we treat it the same anyway?
Klotski seeks to improve users’ perceptions of how quickly a page loads by maximizing the amount of important content on the page that is fetched and displayed within the user’s attention span.
High tail latency has been identified as one of the key challenges facing modern data center design.
A total of five papers authored by CSE researchers were presented.
Researchers have for the first time characterized a widespread vulnerability in the software that runs on mobile devices.
On Dec. 14, the FCC will vote on the rules that today ensure internet service providers treat all web content equally.
The researchers, including Prof. Harsha Madhyastha and CSE graduate students Vaspol Ruamviboonsuk and Muhammed Uluyol, received prize for their paper, “Vroom: Accelerating the Mobile Web with Server-Aided Dependency Resolution.”
A new approach recreates the power of a large server by linking up and pooling the resources of smaller computers with fast networking technology.
SkyCore is a complete software solution to deploying mobile networks on unmanned drones
Sensing technology could keep seniors safe.
Danai Koutra has earned an Army Young Investigator Award to speed up graph methods for distributed applications.
Chowdhury’s work has produced important results that can make memory in data centers both cheaper and more efficient.
Edge Fabric offers providers real-time performance analysis and a way to incorporate this data into routing decisions.
Akshitha Sriraman works to enable hyperscale computing on high-demand web services.
The team will develop a secure, data-intensive network solution to effectively transport extremely high volumes of research data on and off campus.
The teams designed systems for faster and more efficient distributed and large-scale computing.
Their findings reduce average job completion time by up to 95% when the system load is high, while treating every job fairly.
A new system called Leap earned a Best Paper award at USENIX ATC ‘20 for producing remote memory access speed on par with local machines over data center networks.
A group of researchers at U-M is working on the full big data stack for training machine learning models on millions of devices worldwide.
Prof. Mao and her students have played an important role in understanding the efficiency, security, and performance of a number of mobile systems.
Jason Mars, CEO of Ann Arbor startup Clinc, was named #2 in Bank Innovations’s “10 Most innovative CEOs in Banking 2017” list. Clinc is leading the pack for development of intelligent banking assistant software.
Even though we interact with different web services in different ways, there are clues in the data that can indicate trends and identify a unique profile.
The researchers identified movement between industry, academia, and government work, tracked the growth of important organizations, and built predictive models for career transitions and employer retention.
Jie Song devised a method to combine summarized datasets that group information by incompatible units.
Foofah is a tool that can help to minimize the effort and required background knowledge needed to clean up data.
Researchers have implemented a new way to diagnose software failures with a high degree of accuracy and efficiency.
Researchers used hierarchical trees to provide a better idea of how concepts are represented and related in a collection of text.
This conversational in-vehicle digital assistant can respond to drivers’ questions and commands in natural language
Kasikci presents a method to improve a program’s ability to use data in a straightforward, efficient way
Graphs that are customized, stored locally, and able to change over time can enable faster and more accurate searching and digital assistants
Chowdhury’s lab multiplied the number of jobs a GPU cluster can finish in a set amount of time
The goal of the work was to identify seven things about who the subject was talking to just by analyzing text messages.
Perez’s research focuses on analyzing speech patterns of patients with Huntington Disease.
Danai Koutra earned the award for her proposal to innovate the way we use networks to understand the world and speed up our technology.
Erie provided database repairs that were previously performed exclusively by human programmers.
Using real-time fMRI readings, researchers linked spatial reasoning with CS problem solving.
As a fungal infection ravages bat populations, the new game hopes to promote public awareness of ongoing research to combat the issue.
Tang’s project will redesign data center systems to support large-scale use of hardware accelerators to meet future computational demand.
The team’s new tool will combine of software and data to make gathering structured data dramatically easier.
Researchers plan to establish a framework for a national institute that would enable research using sensitive data, while preventing misuse and misinterpretation.
Researchers designed three new systems to speed up code at several key bottlenecks.
Comparing graphs the team’s tool is up to an order of magnitude faster than competitive baselines.
This round of funding strongly encourages pioneering work with the potential for major expansion.
A team at Michigan proposed an approach to generating realistic and high-fidelity stock market data to enable broader study of financial markets.
Researchers have demonstrated the ability to “unlearn” sensitive identifying data from audio used to train machine learning models.
Most programs in use today have to be completely rewritten at a very low level to reap the benefits of hardware acceleration. This system demonstrates how to make that translation automatic.
Goel designs algorithms that can automatically demonstrate the correctness of hardware systems.
Subarno Banerjee uses program analysis to improve software systems’ safety and security.
The student’s project targets critical moments where the next instruction in a program is only available in a slower type of memory.
The team will build high-quality datasets to enable automatic quality checking and fraud detection of the new coronavirus data.
Researchers are working with the city on two key initiatives to address food availability for elderly and low-income populations.
“My research has the potential to democratize programming and make it possible for millions of people around the globe to automate otherwise tedious tasks using programming.”
The system targets software that runs using concurrent execution, a widespread method for boosting performance, and proves whether a program will output what it’s supposed to.
A new secure code is needed to protect private information from the power of quantum computing.
His work is in complexity theory of distributed computing.
The award recognizes early career faculty who show great promise in developing future computing technologies.
The new technique automatically constructs policies for applications that keep them from compromising other programs.
How automated guarantees that our most complex programs are secure and trustworthy can save us time, money, and anxiety.
The Michigan Game Studios database, developed by lecturer Austin Yarger, helps organize the state’s rapidly growing scene.
Through his work, Tim hopes to dramatically accelerate genomic sequencing analysis, enabling the use of handheld genomic sequencers to produce actionable diagnostic data within minutes.
The thesis completely solves a longstanding open problem in the theory of distributed computing.
Prof. Greg Bodwin has devised a solution to an important open question in graph theory that offers promising new options for repairing and constructing resilient networks.
Baris Kasikci plans to improve software fuzzers by learning how deployed software is most commonly run by users.
Probabilities with a negative sign have been of great use in quantum physics.
The software enables users to ask questions about the hosts and networks that compose the Internet and get an immediate reply.
Prof. Mozafari is passionate about building large-scale data-intensive systems that are more scalable, more robust, and more predictable.
He has built software systems for information extraction, database integration, and feature engineering and applied these to problems in the social sciences.
Secrets lurk in the dark web, the 95 percent of the internet that most of us can’t see. One U-M professor is bringing some of those secrets to light, making the digital and the real world a little safer.
His work in the area of real-time computing has spanned decades and has had impact in a broad range of applications.
The Rising Star Award is based on an individual’s whole body of work in the first five years after the PhD.
Parinaz’s research is in combining communications with economics to assess the security of a network and then apply that to cyber-insurance contracts.
His paper detailed his use of big data analysis to solve a major problem of cyber security.
QuadMetrics offers a pair of services to help companies both assess the effectiveness of their security and decide the best way to allocate (or increase) their security budget.
Analytic software company FICO of San Jose, Calif., bought QuadMetrics to help in its development of a FICO Enterprise Security Score.
Porche shares the global state of cyber warfare, and how his time at Michigan led him to the front lines.
Porche discussed the changing definition of war and how information is playing a greater role than ever.
ECE alum Kurt Rohloff helped create one of the world’s best homomorphic encryption software libraries, and he reflects on how his time at Michigan helped shape his career.
Karl (BSE MSE PhD EE) talks about how his time at Michigan helped prepare him for his dream job at Intel and a career advancing embedded memory technology and circuits.
Ozay presented on her research that is relevant to cybersecurity and the future of space exploration.
Mingyan Liu, renowned for her research specializing in communication networks and cybersecurity, has served as Chair of ECE since 2018. (video of the talk now available)
The carbon nanotube carpet is about half the thickness of a sheet of paper and absorbs 99.9 percent of the light that hits it.
McCullagh is working to develop energy harvesting devices and circuits to power wireless sensor nodes which can monitor bridge health.
The technology could potentially identify a hidden weapon from a distance in less than a second.
By shining the laser on a target and analyzing the reflected light, researchers can tell the chemical composition of the target.
The research group developed special fabrication processes that allows them to stack and bond seven different devices in layers.
The researchers believe that metasurfaces could one day be used to completely control the phase, amplitude, and polarization of light.
Since coming to the University in 1984, Bhattacharya has pioneered several important technological advances.
Peterson’s findings could be used in wireless sensing and actuation systems, including those that deal with monitoring of the environment and medical conditions.
The IEEE Geoscience and Remote Sensing Society is a remote sensing organization with more than 3700 members around the globe.
She computationally measures, represents, and analyzes human behavior data to illuminate fundamental human behavior and emotion perception, and develop natural human-machine interfaces.
Her dissertation focused on “opacity,” which captures whether a given secret of the system can be inferred by intruders who observe the behavior of the system.
Thomas and his group are working to improve upon artificial neural network design through a process called sparse coding.
One of the paper describes and demonstrates a malicious hardware backdoor. The other demonstrated security failings in a commercial smart home platform.
Yektakhah’s system improves on the speed, portability, and accuracy of many commercial models
With $7.5M MURI grant, Professor Anthony Grbic is developing metamaterials for a new generation of integrated electromagnetic and photonic systems.
Zhang is working to improve data security and address important ethical issues related to AI and discriminatory data sets.
The workshop, co-organized by a team including two EECS faculty, focused on ensuring the safety of Level 3 autonomous vehicles, where humans must be ready to take over control.
This new book by Mingyan Liu offers an engineering and strategic approach to improving cybersecurity through cyber insurance
Liu’s most recent research involves online learning, modeling of large-scale internet measurement data, and incentive mechanisms for security games.
Mingyan Liu, recipient of the 2018 Distinguished Innovator of the Year award, gave a talk about her startup company and participated on a panel discussing data science commercialiation.
The ECE startup builds neuromorphic computer chips uniquely suitable for AI applications
The post Michigan startup MemryX, Inc. promises faster, cheaper AI processing appeared first on Michigan Engineering News.
Prof. Jay Guo and his team discovered a scalable way to settle down and precisely arrange micro- and nano-sized particles according to size
The post Egg-carton-style patterning keeps charged nanoparticles in place and suitable for a wide range of applications appeared first on Michigan Engineering News.
“I would say it’s okay to use as a hobby right now, but I wouldn’t use it where security is paramount.”
The post Hacking into homes: Security flaws found in SmartThings connected home system appeared first on Michigan Engineering News.
In this video, CSE PhD Student Matt Bernhard weighs in on the matter Facebook data harvesting, such as that done by Cambridge Analytica.
The post CSE PhD student Matt Bernhard on the Facebook data breach appeared first on Michigan Engineering News.
Researchers carried out the first study on voter behavior with electronic assistive devices, found 93% missed incorrect ballots.
The post Not enough voters detecting ballot errors and potential hacks, study finds appeared first on Michigan Engineering News.
The latest from IBM and now the University of Michigan is redefining what counts as a computer at the microscale.
The post An even smaller world’s smallest ‘computer’ appeared first on Michigan Engineering News.
DARPA’s initiative to reinvigorate the microelectronics industry draws deeply on Michigan Engineering expertise.
The post Beyond Moore’s law: $16.7M for advanced computing projects appeared first on Michigan Engineering News.
A self-erasing chip for security and anti-counterfeit tech.
The post Burn after reading appeared first on Michigan Engineering News.
Could censorship end the internet as we know it? Not if Roya Ensafi can help it.
The post Her fight for your rights appeared first on Michigan Engineering News.
Highlights include Wired and CNN.
The post In the news: Michigan Engineering experts August 2-6 appeared first on Michigan Engineering News.
Room-size charging system powers lights, phones, laptops without wires
The post Will power cords go the way of land lines? appeared first on Michigan Engineering News.
How the safety of a wireless charging room stacks up to that of a cell phone.
The post Wireless electricity and safety: A Q&A with Alanson Sample appeared first on Michigan Engineering News.
PhD student Trevor Odelberg is looking to enable long range, highly reliable, and low-power cellular IoT devices that one day can run entirely on harvested energy, reducing battery waste and empowering devices to last for decades.
The post Batteryless next-generation cellular devices could empower a more sustainable future appeared first on Michigan Engineering News.
The frame in which a human marks out the boundaries of an object makes a huge difference in how well AI software can identify that object through the rest of the video.
Powered by a broadband infrared laser, the device can zero in on the ‘spectral fingerprint region’.
The post A shoe-box-sized chemical detector appeared first on Michigan Engineering News.
Graphical online simulation could spur more targeted COVID-19 protection measures.
Highlights include Popular Science, CNet and Science Alert
The post In the news: Michigan Engineering experts June 14-18 appeared first on Michigan Engineering News.
Highlights include the CBC and MLive.
The post In the news: Michigan Engineering experts July 19-23 appeared first on Michigan Engineering News.
Highlights include the Los Angeles Times.
The post In the news: Michigan Engineering experts August 9-13 appeared first on Michigan Engineering News.
Highlights include Nature and Newsweek.
The post In the news: Michigan Engineering experts September 27 – October 1 appeared first on Michigan Engineering News.
The algorithm can pick out weak signals from nuclear weapons materials, hidden in ordinary radiation sources like fertilizer.
Highlights include Bloomberg, New York Times and the Detroit News.
The post In the news: Michigan Engineering experts May 24-28 appeared first on Michigan Engineering News.
Public policy and engineering team up to improve food access.
The post Hunger and COVID: Fighting pandemic-related food insecurity in Detroit appeared first on Michigan Engineering News.
Two researchers have debunked the common assumption that the famous Paxos consensus protocol is too complex to be proven safe without hours of manual labor.
The post Distributed protocol underpinning cloud computing automatically determined safe and secure appeared first on Michigan Engineering News.
A medical security expert outlines the risks and how hospitals can protect themselves.
The post 5 ways to keep vaccine cold storage equipment safe from hackers appeared first on Michigan Engineering News.
The adaptive immune system serves as a template for defending neural nets from confusion-sowing attacks.
The post Immune to hacks: Inoculating deep neural networks to thwart attacks appeared first on Michigan Engineering News.
Virtual assortment of user devices provides a realistic training environment for distributed machine learning, protects privacy by learning where data lives.
The post Open source platform enables research on privacy-preserving machine learning appeared first on Michigan Engineering News.
The hectoSTAR probe, with 128 stimulating micro-LEDs and 256 recording electrodes integrated in the same neural probe, was designed for some stellar brain mapping projects
The post Next generation neural probe leads to expanded understanding of the brain appeared first on Michigan Engineering News.
Prof. Zetian Mi’s team are the first to achieve high-performance, highly stable green micro-LEDs with dimensions less than 1 micrometer on silicon, which can support ultrahigh-resolution full-color displays and other applications.
The post Breakthrough in green micro-LEDs for augmented/mixed reality devices appeared first on Michigan Engineering News.