Michigan Systems Laboratory
Faculty at the University of Michigan Computer Science & Engineering Division whose work spans distributed systems, operating systems, security, cyber physical systems, networking, databases, and software engineering.
Welcome to the Systems Laboratory
The Systems Laboratory at the University of Michigan comprises a multidisciplinary group of researchers conducting research in systems. The lab focuses on the experimental design, implementation, and evaluation of systems software technologies, which enable the development of a wide range of emerging applications.
Meet the people who make up the Systems Lab >
Prospective graduate students
Enabling technologies covered by the Systems Lab include biological databases, collaborative computing, compiler and language design, embedded and real-time computing, fault-tolerant computing, file systems, host and network security systems, mobile and distributed systems, network protocols and architectures, operating systems, peer-to-peer storage systems, power-aware adaptation, security policy management, virtual machines, web databases.
Visit our prospective student page on the CSE website >
Jason Flinn earns Test of Time award for 1999 invention of adaptable battery use in… mobile apps
The approaches to energy adaptation he proposed are now commonplace, and the applications he analyzed (web browsers, voice recognition, video players, and maps) are still ubiquitous.
Hunger and COVID: Fighting pandemic-related food insecurity in Detroit
Public policy and engineering team up to improve food access.
Students lead the way on State of Michigan web application to help curb the spread… of COVID-19
“I don’t think any of us expected a global pandemic at the end of our senior year, let alone being able to work on an application that helps address it.”
Protecting drones from hacking
Prof. Wes Weimer and his group have designed several defenses that allow drones to detect and repair threats in mid-flight, preventing missions from being interrupted.
Uncovering the Foreshadow attack
A team including Prof. Dan Genkin discovered a processor vulnerability that had the potential to put every Intel-based PC manufactured since 2008 at risk.