Hacking

Laser hitting Alexa

Hacking reality

Microphones that “hear” light; microprocessors that “tell” us secrets; self-driving cars that “see” fake objects; sensors that “feel” the wrong temperature. Our devices are under attack in new, increasingly sophisticated ways. Security researchers at CSE are exploring the limits of hardware and finding new, sobering vulnerabilities in our computers and homes. |Long Read
Makeathon participants, creators, and judges

Hacking the perfect melody

Project Music brought together students from all backgrounds across the university to originate musically-inspired creations for the first Music Makeathon.|Medium Read
exoskeleton dragging dummy

Exoskeletons compete to boost strength of rescue workers

Five college teams test robotic suits that could enhance humans’ abilities.|Medium Read
programming team

UM student programming team advances to ACM-ICPC World Finals in Beijing

The team, coached by Prof. Kevin Compton, will compete in the prestigious 2018 ACM International Collegiate Programming Contest World Finals in April.|Medium Read
Industrial & Operations Engineering logo

IOE PhDs and alumnus mentor Seattle hackathon

IOE PhD students Tom Logan and Tim Williams were invited to Seattle to mentor a project in the "City4All Hackathon".|Short Read
Electrical Engineering & Computer Science logo

Claude Shannon: Juggling ones and zeros

His inventions spanned the spectrum from playful to paramount.|Long Read
Electrical and Computer Engineering

Student’s digital art makes the Cube even more interactive

Keenan Rebara hopes to add to the fun of spinning the Cube using his a bit of physics and sensors.|Short Read

MHacks gains focus, maturity as MHacks X approaches

If there's one event at Michigan that reflects students' raw enthusiasm for hacking and building, it's MHacks, the infamous student-run hackathon.|Medium Read
Portrait of J. Alex Halderman

Election security: We must start preparing now for 2018

Alex Halderman testifies before Congress.|Short Read

Prof. J. Alex Halderman testifies in front of senate intelligence committee on secure elections

His remarks focused on vulnerabilities in the US voting system and a policy agenda for securing the system against the threat of hacking.|Short Read
Key locks into a phone

Smartphone security hole

‘Open port’ backdoors are common.|Short Read

Open ports act as security wormholes into mobile devices

Researchers have for the first time characterized a widespread vulnerability in the software that runs on mobile devices.|Medium Read