Cybersecurity

""

Rackham Predoctoral Fellowship for design of robust, reliable and repairable software systems

Subarno Banerjee uses program analysis to improve software systems’ safety and security.|Short Read
Kurt Rohloff

Data security for a safer world

ECE alum Kurt Rohloff helped create one of the world’s best homomorphic encryption software libraries, and he reflects on how his time at Michigan helped shape his career. |Medium Read
Todd Austin

Todd Austin Named S. Jack Hu Collegiate Professor of Computer Science and Engineering

Prof. Austin is a creative, outside-the-box thinker who has produced a body of work that has had extraordinary impact in the area of computer architecture.|Short Read

Real-time monitor tracks the growing use of network filters for censorship

The team says their framework can scalably and semi-automatically monitor the use of filtering technologies for censorship at global scale.|Medium Read

Emotion recognition has a privacy problem – here’s how to fix it

Researchers have demonstrated the ability to “unlearn” sensitive identifying data from audio used to train machine learning models|Short Read

$1M grant to develop secure, high-capacity research network at U-M

The team will develop a secure, data-intensive network solution to effectively transport extremely high volumes of research network traffic.|Short Read
Voting machines at library

Not enough voters detecting ballot errors and potential hacks, study finds

Researchers carried out the first study on voter behavior with electronic assistive devices, found 93% missed incorrect ballots.|Short Read

New simulation laboratory and cybersecurity software installed at NERS

The software will be used to study methods of preventing cyberattacks on the instrumentation and control systems for nuclear power plants. |Medium Read

Researchers design new solution to widespread side-channel attacks

The proposal provides a chip-level safeguard against sensitive data being transmitted after it’s accessed.|Medium Read
Alex Halderman

How Let’s Encrypt doubled the percentage of secure websites in four years

A Q&A with J. Alex Halderman, who co-founded the nonprofit organization.|Medium Read
Laser on Google Home

A laser pointer could hack your voice-controlled virtual assistant

Researchers identified a vulnerability that allows a microphone to 'unwittingly listen to light as if it were sound'|Medium Read
Roya Ensafi, CSE Research Assistant Professor, uses her computing system, Censored Planet. Photo: Joseph Xu

How Russia’s online censorship could jeopardize internet freedom worldwide

The nation is using inexpensive commodity equipment to block 170K domains on more than 1K privately-owned ISPs.|Medium Read