Security

More Security News
Nuclear Engineering & Radiological Sciences logo

U-M and other CVT scientists study explosion in North Korea

Members of the Consortium for Verification Technology weigh in on magnitude of January 6, 2016 North Korean tests.|Short Read
Students demonstrate use of their device

A showcase of student innovation

The most ambitious and intense class projects of students’ undergraduate careers are showcased each semester at Design Expo. More than 100 teams display the prototypes they’ve spent months designing and refining. |Short Read
Facial expressions and hand gesture of liars in court

Lie-detecting software uses real court case data

U-M researchers are building a unique lie-detecting software that works from studying real world data from real, high-stakes court cases.|Medium Read
men in suits breaking symbolic wall with sledgehammers

New laboratories continue research legacy at former Ford Nuclear Reactor site

Michigan Engineering begins construction of a new Nuclear Engineering Laboratory to advance research on nuclear measurements, thermal-hydraulics, detection and nonproliferation.|Short Read
A map of New Orleans showing optimized evacuation plan

Faster evacuation: Studying New Orleans to improve disaster planning

As the tenth U.S. hurricane season since Katrina rolls on, a University of Michigan professor is using advanced data analytics and optimization techniques to find better ways to evacuate regions before disaster strikes.|Medium Read
Electrical Engineering & Computer Science logo

Secure, free encryption of all websites is goal of new project

In an effort to reinvent and dramatically improve Internet security, researchers at the University of Michigan have joined with Mozilla and other industry and non-profit partners to soon offer free, automated, and open website HTTPS encryption.|Short Read

Sneak attack through smartphone shared memory

A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of Michigan has shown.|Medium Read
naghizadeh

Parinaz Naghizadeh, Researcher in economic network security, is named a Barbour Scholar

Parinaz's research is in combining communications with economics to assess the security of a network and then apply that to cyber-insurance contracts.|Short Read
Electrical Engineering & Computer Science logo

Security risks found in Estonia online voting system

Ahead of European Parliamentary elections on May 25, an international team has found major risks in the security of Estonia’s Internet voting system.|Short Read
Electrical and Computer Engineering

New laser shows what substances are made of; could be new eyes for military

By shining the laser on a target and analyzing the reflected light, researchers can tell the chemical composition of the target.|Short Read
Radar image

After Newtown: A new use for a weapons-detecting radar?

The technology could potentially identify a hidden weapon from a distance in less than a second.|Medium Read
Sample tracking image

Bourne Pursuit: Improving computer tracking of human activity

Researchers have found a way to improve a computer's human-tracking accuracy by looking at where the targets are going, but also at what they're doing.|Short Read