Michigan Systems Laboratory
Faculty at the University of Michigan Computer Science & Engineering Division whose work spans distributed systems, operating systems, security, cyber physical systems, networking, databases, and software engineering.
Welcome to the Systems Laboratory
The Systems Laboratory at the University of Michigan comprises a multidisciplinary group of researchers conducting research in systems. The lab focuses on the experimental design, implementation, and evaluation of systems software technologies, which enable the development of a wide range of emerging applications.
Meet the people who make up the Systems Lab >
Prospective graduate students
Enabling technologies covered by the Systems Lab include biological databases, collaborative computing, compiler and language design, embedded and real-time computing, fault-tolerant computing, file systems, host and network security systems, mobile and distributed systems, network protocols and architectures, operating systems, peer-to-peer storage systems, power-aware adaptation, security policy management, virtual machines, web databases.
Visit our prospective student page on the CSE website >
CSE researchers help organize 10th anniversary workshop on internet freedom
Prof. Roya Ensafi and PhD candidate Reethika Ramesh led organizing efforts for USENIX’s Tenth Workshop on Free and Open Communications on the Internet.
$1.8M DARPA project aims to protect cars, trucks and spacecraft from hackers
Ironpatch could head off growing danger of security vulnerabilities in vehicle systems.
“Hiding” network latency for fast memory in data centers
A new system called Leap earned a Best Paper award at USENIX ATC ‘20 for producing remote memory access speed on par with local machines over data center networks.
Protecting drones from hacking
Prof. Wes Weimer and his group have designed several defenses that allow drones to detect and repair threats in mid-flight, preventing missions from being interrupted.
Uncovering the Foreshadow attack
A team including Prof. Dan Genkin discovered a processor vulnerability that had the potential to put every Intel-based PC manufactured since 2008 at risk.