Security

featured Security stories
hand places ballot in box

New remote voting risks and solutions identified

The upcoming presidential election in the middle of a pandemic has many jurisdictions exploring new technologies. They're not secure. |Medium Read
sara pozzi points at Macbook

Catching nuclear smugglers: fast algorithm could enable cost-effective detectors at borders

The algorithm can pick out weak signals from nuclear weapons materials, hidden in ordinary radiation sources like fertilizer.|Medium Read
The summer sun rises on North Campus of the University of Michigan

Autonomous vehicles can be fooled to ‘see’ nonexistent obstacles

Vehicles that perceive obstacles that aren't really there could cause traffic accidents.|Short Read

Real-time monitor tracks the growing use of network filters for censorship

The team says their framework can scalably and semi-automatically monitor the use of filtering technologies for censorship at global scale.|Medium Read

$1M grant to develop secure, high-capacity research network at U-M

The team will develop a secure, data-intensive network solution to effectively transport extremely high volumes of research network traffic.|Short Read
Voting machines at library

Not enough voters detecting ballot errors and potential hacks, study finds

Researchers carried out the first study on voter behavior with electronic assistive devices, found 93% missed incorrect ballots.|Short Read

Researchers design new solution to widespread side-channel attacks

The proposal provides a chip-level safeguard against sensitive data being transmitted after it’s accessed.|Medium Read
Alex Halderman

How Let’s Encrypt doubled the percentage of secure websites in four years

A Q&A with J. Alex Halderman, who co-founded the nonprofit organization.|Medium Read
Laser on Google Home

A laser pointer could hack your voice-controlled virtual assistant

Researchers identified a vulnerability that allows a microphone to 'unwittingly listen to light as if it were sound'|Medium Read
Sara Pozzi runs a sample through a plutonium and uranium detector in the Nuclear Engineering Laboratory

Iran’s centrifuges and nuclear nonproliferation: A Q&A with Sara Pozzi

Understanding nuclear enrichment and what it means for the “Iran nuclear deal.”|Medium Read
Laser on Google Home

Researchers take control of Siri, Alexa, and Google Home with lasers

The newly discovered microphone vulnerability allows attackers to remotely inject inaudible and invisible commands into voice assistants using light.|Medium Read

Offensive vehicle security toolbox makes car hacking easier

The new system is designed to save security researchers time and effort spent reverse-engineering the message format of every vehicle they study.|Short Read