Security

featured Security stories
an example of the erasing message

Burn after reading

A self-erasing chip for security and anti-counterfeit tech.|Medium Read
Ironpatch logo

$1.8M DARPA project aims to protect cars, trucks and spacecraft from hackers

Ironpatch could head off growing danger of security vulnerabilities in vehicle systems.|Medium Read
hand places ballot in box

New remote voting risks and solutions identified

The upcoming presidential election in the middle of a pandemic has many jurisdictions exploring new technologies. They're not secure. |Medium Read
sara pozzi points at Macbook

Catching nuclear smugglers: fast algorithm could enable cost-effective detectors at borders

The algorithm can pick out weak signals from nuclear weapons materials, hidden in ordinary radiation sources like fertilizer.|Medium Read
The summer sun rises on North Campus of the University of Michigan

Autonomous vehicles can be fooled to ‘see’ nonexistent obstacles

Vehicles that perceive obstacles that aren't really there could cause traffic accidents.|Short Read

Real-time monitor tracks the growing use of network filters for censorship

The team says their framework can scalably and semi-automatically monitor the use of filtering technologies for censorship at global scale.|Medium Read

$1M grant to develop secure, high-capacity research network at U-M

The team will develop a secure, data-intensive network solution to effectively transport extremely high volumes of research network traffic.|Short Read
Voting machines at library

Not enough voters detecting ballot errors and potential hacks, study finds

Researchers carried out the first study on voter behavior with electronic assistive devices, found 93% missed incorrect ballots.|Short Read

Researchers design new solution to widespread side-channel attacks

The proposal provides a chip-level safeguard against sensitive data being transmitted after it’s accessed.|Medium Read
Alex Halderman

How Let’s Encrypt doubled the percentage of secure websites in four years

A Q&A with J. Alex Halderman, who co-founded the nonprofit organization.|Medium Read
Laser on Google Home

A laser pointer could hack your voice-controlled virtual assistant

Researchers identified a vulnerability that allows a microphone to 'unwittingly listen to light as if it were sound'|Medium Read
Sara Pozzi runs a sample through a plutonium and uranium detector in the Nuclear Engineering Laboratory

Iran’s centrifuges and nuclear nonproliferation: A Q&A with Sara Pozzi

Understanding nuclear enrichment and what it means for the “Iran nuclear deal.”|Medium Read