Security

featured Security stories
Roya Ensafi, CSE Research Assistant Professor, uses her computing system, Censored Planet

‘Extremely aggressive’ internet censorship spreads in the world’s democracies

Censored Planet is releasing technical details for other researchers and for activists. |Medium Read
Bob and Betty Beyster Building

CSE researchers report over $11M in research grants last quarter

The awards were distributed to 18 different primary investigators.|Medium Read
people voting while wearing their masks.

5 ways Americans can keep their vote secure and accurate

Expert advice for voting in an unprecedented election.|Medium Read
an example of the erasing message

Burn after reading

A self-erasing chip for security and anti-counterfeit tech.|Medium Read
Ironpatch logo

$1.8M DARPA project aims to protect cars, trucks and spacecraft from hackers

Ironpatch could head off growing danger of security vulnerabilities in vehicle systems.|Medium Read
hand places ballot in box

New remote voting risks and solutions identified

The upcoming presidential election in the middle of a pandemic has many jurisdictions exploring new technologies. They're not secure. |Medium Read
sara pozzi points at Macbook

Catching nuclear smugglers: fast algorithm could enable cost-effective detectors at borders

The algorithm can pick out weak signals from nuclear weapons materials, hidden in ordinary radiation sources like fertilizer.|Medium Read
The summer sun rises on North Campus of the University of Michigan

Autonomous vehicles can be fooled to ‘see’ nonexistent obstacles

Vehicles that perceive obstacles that aren't really there could cause traffic accidents.|Short Read

Real-time monitor tracks the growing use of network filters for censorship

The team says their framework can scalably and semi-automatically monitor the use of filtering technologies for censorship at global scale.|Medium Read

$1M grant to develop secure, high-capacity research network at U-M

The team will develop a secure, data-intensive network solution to effectively transport extremely high volumes of research network traffic.|Short Read
Voting machines at library

Not enough voters detecting ballot errors and potential hacks, study finds

Researchers carried out the first study on voter behavior with electronic assistive devices, found 93% missed incorrect ballots.|Short Read

Researchers design new solution to widespread side-channel attacks

The proposal provides a chip-level safeguard against sensitive data being transmitted after it’s accessed.|Medium Read