Cybersecurity

Researchers design new solution to widespread side-channel attacks

The proposal provides a chip-level safeguard against sensitive data being transmitted after it’s accessed.|Medium Read
Alex Halderman

How Let’s Encrypt doubled the percentage of secure websites in four years

A Q&A with J. Alex Halderman, who co-founded the nonprofit organization.|Medium Read
Laser on Google Home

A laser pointer could hack your voice-controlled virtual assistant

Researchers identified a vulnerability that allows a microphone to 'unwittingly listen to light as if it were sound'|Medium Read
Roya Ensafi, CSE Research Assistant Professor, uses her computing system, Censored Planet. Photo: Joseph Xu

How Russia’s online censorship could jeopardize internet freedom worldwide

The nation is using inexpensive commodity equipment to block 170K domains on more than 1K privately-owned ISPs.|Medium Read
Laser on Google Home

Researchers take control of Siri, Alexa, and Google Home with lasers

The newly discovered microphone vulnerability allows attackers to remotely inject inaudible and invisible commands into voice assistants using light.|Medium Read

Offensive vehicle security toolbox makes car hacking easier

The new system is designed to save security researchers time and effort spent reverse-engineering the message format of every vehicle they study.|Short Read
Conjure logo

New tool combats evolving internet censorship methods

Technology pioneered by Michigan researchers has made a promising advance toward widespread adoption|Short Read

Remote attack on temperature sensors threatens safety in incubators and industry

The researchers demonstrated that an adversary could remotely manipulate the temperature sensor measurements without tampering with the targeted system or triggering automatic temperature alarms.|Short Read

New attack on autonomous vehicle sensors creates fake obstacles

Up to this point, no attacks had been discovered targeting a car’s LiDAR system—but a major new finding from researchers at the University of Michigan has demonstrated what that might look like. |Medium Read

PET Award for making privacy policies easier to read

The research generated a chatbot to help users sift through important details in privacy policies.|Short Read

Best paper award for analysis of a decade of malware reports

The research suggests that common blacklist-based prevention systems are ineffective.|Short Read

Three CSE papers chosen as IEEE Micro Top Picks

Top Picks is an annual special edition of IEEE Micro magazine that acknowledges the 10-12 most significant research papers.|Short Read