Security

featured Security stories
Alex Halderman

How Let’s Encrypt doubled the percentage of secure websites in four years

A Q&A with J. Alex Halderman, who co-founded the nonprofit organization.|Medium Read
Laser on Google Home

A laser pointer could hack your voice-controlled virtual assistant

Researchers identified a vulnerability that allows a microphone to 'unwittingly listen to light as if it were sound'|Medium Read
Sara Pozzi runs a sample through a plutonium and uranium detector in the Nuclear Engineering Laboratory

Iran’s centrifuges and nuclear nonproliferation: A Q&A with Sara Pozzi

Understanding nuclear enrichment and what it means for the “Iran nuclear deal.”|Medium Read
Laser on Google Home

Researchers take control of Siri, Alexa, and Google Home with lasers

The newly discovered microphone vulnerability allows attackers to remotely inject inaudible and invisible commands into voice assistants using light.|Medium Read

Offensive vehicle security toolbox makes car hacking easier

The new system is designed to save security researchers time and effort spent reverse-engineering the message format of every vehicle they study.|Short Read
Conjure logo

New tool combats evolving internet censorship methods

Technology pioneered by Michigan researchers has made a promising advance toward widespread adoption|Short Read

Remote attack on temperature sensors threatens safety in incubators and industry

The researchers demonstrated that an adversary could remotely manipulate the temperature sensor measurements without tampering with the targeted system or triggering automatic temperature alarms.|Short Read
HERCULES laser

Most powerful laser in the US to be built at Michigan

Using extreme light to explore quantum dynamics, advance medicine and more.|Medium Read

New attack on autonomous vehicle sensors creates fake obstacles

Up to this point, no attacks had been discovered targeting a car’s LiDAR system—but a major new finding from researchers at the University of Michigan has demonstrated what that might look like. |Medium Read

Prof. Winick retires, leaving a legacy that empowers students to seek life and learning outside of the lab

For the past 31 years, Prof. Winick has helped define undergraduate courses and curriculum both at U-M and abroad while inspiring all to engineer their future by understanding the past.|Medium Read
future defense system

Advancing microelectronics and systems for the security of the future

As an ECE Distinguished Lecturer, Dr. Jeremy Muldavin (BSE EP; MSE PhD EE) spoke about a DoD initiative to improve the competitiveness of the U.S. in microelectronics.|Medium Read
MORPHEUS blocks potential attacks by encrypting and randomly reshuffling key bits of its own code and data twenty times per second. Getty Images.

New chip stops hacks before they start

MORPHEUS can encrypt and reshuffle code thousands of times faster than human and electronic hackers.|Medium Read