News
Z. Morley Mao named Farnam Jahanian Collegiate Professor of Computer Science and Engineering
This honor recognizes her outstanding achievements in systems and security research and education.We did the math on AI’s energy footprint. Here’s the story you haven’t heard.
This article explores the significant energy demands of the AI industry, with insights from Prof. Mosharaf Chowdhury and his team, who are working to quantify AI’s energy footprint and advocate for transparency and sustainability around its power consumption.CSE instructors win ENGR 100 Section of the Year
Prof. Peter Chen and team have been recognized for their excellence and innovation in teaching ENGR 100.250: Microprocessors and Toys.Trump order targets barcodes on ballots. They’ve long been a source of misinformation
This article highlights J. Alex Halderman’s role in scrutinizing voting systems using QR codes, testimony which has been referenced in recent debates over election integrity amidst President Trump’s executive order aiming to change U.S. election processes.U-M team’s genome sequencing breakthrough featured in CACM Research Highlights
Their work introduces a new computational framework that significantly increases the efficiency of genomic data processing.AI Consumes Lots of Energy. Can It Ever Be Sustainable?
This article discusses Prof. Mosharaf Chowdhury’s efforts, alongside PhD candidate Jae-Won Chung, to drive sustainable AI development by measuring and optimizing the energy consumption of machine learning workloads.A new tool to manage slow faults
A new library dynamically adjusts to runtime operating slowdowns, reducing performance degradation under varying slow-fault conditions by 65%.Five papers by CSE researchers at NSDI 2025
CSE researchers are presenting new research in the area of networked and distributed systems, including slow-fault tolerance, programmable traffic control, and cloud-based deep learning.Six papers by CSE researchers at ICSE 2025
CSE authors are presenting papers on topics related to software engineering, from dynamic debugging models to supportive programming environments.Perfect is the enemy of good for distributed deep learning in the cloud
Leveraging deep learning’s resilience, approximating data lost by allowing some servers to time out speeds up model training while preserving performance.Eleven papers by CSE researchers at ICLR 2025
CSE authors are presenting new research on topics related to deep learning, including spatial reasoning in vision-language models, data selection methods, and moral alignment in language models.Diwen Xue awarded Towner Prize for Distinguished Academic Achievement
The award recognizes his outstanding academic and research accomplishments.Streamlining cloud traffic with a Gigaflow Cache
Gigaflow improves virtual switches for programmable SmartNICs, delivering a 51% higher hit rate and 90% lower misses.Five papers by CSE researchers at ASPLOS 2025
CSE authors are presenting new research on topics related to computer architecture, programming languages, and operating systems.Can we make AI less power-hungry? These researchers are working on it.
Prof. Mosharaf Chowdhury and his team discuss their efforts to develop techniques that lessen the power consumption of AI training.Diwen Xue receives Rackham Predoctoral Fellowship
The award recognizes Diwen’s outstanding research accomplishments and will support his continued work on internet security and measurement.A bold experiment: Accelerating scientific progress with AI
CSE researchers have developed the first-ever AI framework targeting experimentation, making the research process less time- and cost-intensive.Countering a flaw in anti-censorship tools to improve global internet freedom
A time-based fingerprint can expose obfuscation proxies, prompting the need for new techniques to protect information accessGrad student Rishika Varma Kalidindi receives Moeller Award
The award recognizes Rishika’s exceptional scholarly achievement and will support her ongoing master’s studies in CSE.Out of the woods: Reshaping collaborative programming with Grove
Recent research by Cyrus Omar introduces a new paradigm for more efficient collaborative coding.Peter Honeyman honored with Edward Law Emeritus Outstanding Service Award
The award recognizes Honeyman’s continued contributions to teaching, mentorship, and research.Mosharaf Chowdhury receives David E. Liddle Research Excellence Award
He was honored for his groundbreaking research on AI infrastructure and energy-efficient AI systems.Cyrus Omar receives 1938E Award
He has been recognized for innovative teaching, mentorship, and dedication to undergraduate research.Danai Koutra receives Presidential Early Career Award for Scientists and Engineers
PECASE is the U.S. government’s highest honor for early-career scientists and engineers.Six CS students named CRA outstanding undergraduate researchers
They were recognized by the CRA for their research achievements and potential.Seventeen papers by CSE researchers at NeurIPS 2024
Papers by CSE authors cover a variety of topics related to machine learning and neural information processing.How to Make AI Less of a Power Guzzler
Research by Mosharaf Chowdhury is cited as a powerful tool for reducing energy waste during LLM training in this article discussing the environmental impact of AI.How Geoblocking Limits Digital Access in Sanctioned States
Geoblocking and internet censorship are problems in many regions around the world. In this piece on censorship in Cuba co-authored by Prof. Roya Ensafi, PhD student Anna Ablove, and Prof. Harry Oppenheimer from the Georgia Institute of Technology, the authors describe how digital equality is about not just differences in infrastructure and censorship but also whether websites themselves allow users to access their platforms.Brian Noble receives 2024 SIGMOBILE Test-of-Time award
The award recognizes the significant and lasting influence of Noble’s research on application adaptation for mobile environments.CSE Graduate Honors Competition showcases exceptional research by PhD students
The annual competition features research presentations by a selection of outstanding PhD students in CSE.Up to 30% of the power used to train AI is wasted. Here’s how to fix it.
Smarter use of processor speeds saves energy without compromising training speed and performance.The science behind election security
How one professor is working toward more secure voting technology.Despite reassurances, election security risks continue to mount
Prof. J. Alex Halderman is profiled in this piece on Philadephia-region PBS affiliate WHYY. The interview summarizes Halderman’s background as a security researcher and interviews him on the details of the vulnerabilities that exist in our election infrastructure.False claims about machines “switching” votes are going viral. Here’s what to know.
As viral claims about “switching” votes circulate, experts have said that there is no evidence of machines being hacked or programmed to alter ballots in an actual election. However, the “gold standard protection” for Americans are hand-marked paper ballots, according to Prof. J. Alex Halderman.Three papers and keynote by CSE researchers at SPLASH 2024
Prof. Cyrus Omar delivered a keynote lecture on programming experience design and new papers by CSE authors cover a range of topics related to programming languages.CSE researchers win Distinguished Paper Award at OOPSLA 2024
The award recognizes the significance of their research on SQL query equivalence checking.Validation and verification for elections
In this episode of the Michigan Minds podcast, J. Alex Halderman—Bredt Family Professor of Engineering and director of the Center for Computer Security and Society—discusses weak points in the U.S. electoral system and how to fix them, as well as the results of investigations following the 2020 election.Inside Georgia’s effort to secure voting machines as experts raise concerns
Prof. J. Alex Halderman is interviewed in the PBS News Hour segment on the security of battleground state Georgia’s ballot marking devices (BMD) voting machines. Halderman points to scenarios that include some of the most sophisticated adversaries in the world, backed by foreign governments such as Russia, China, or Iran.Roya Ensafi delivers keynote at PETS 2024
She spoke on the importance of internet freedom at one of the top international conferences on privacy-enhancing technologies.These CSE PhD alums have accepted faculty positions
Congrats to these new faculty!Russia to spend over half a billion dollars to bolster internet censorship system
Researchers at the Censored Planet Lab, led by Prof. Roya Ensafi, have characterized TSPU, a Russian government developed system for controlling and censoring internet content inside the country. Censored Planet has monitored Russian censorship activities for nine years.Hacked voting machine donated to Henry Ford museum
The machine was used by Prof. J. Alex Halderman for election cybersecurity research, and in a demonstration during which then-Senator Kamala Harris voted on it.Censored Planet researcher joins FTC
Hieu Le aims to leverage his experience in developing security and privacy technologies to help protect US consumers.Get to know: Lin Ma
Ma specializes in the application of the latest machine learning strategies to streamline database management systems.CSE authors receive Distinguished Paper Award at USENIX Security for research on geoblocking
The award recognizes the excellence of their work examining geoblocking in the context of the Cuba embargo.Eleven papers by CSE researchers at VLDB 2024
CSE authors are presenting new research on topics related to data management, analysis, mining, and more.CSE researchers win Distinguished Paper Award at USENIX Security for work on voter privacy
Their research shows that flaws in randomization put voters’ secret ballots at risk.Protecting connected, self-driving vehicles from hackers
New security system leverages data sharing between vehicles to quickly detect and counter falsified data, preventing hard brakes and crashesTen papers by CSE researchers at USENIX Security 2024
New research out of CSE spans the field of computer security, from protecting autonomous vehicles from data attacks to detecting and combating online censorship.Danai Koutra receives IBM Early Career Data Mining Research Award
The award recognizes Koutra’s outstanding contributions to the field of data science.Muhammad Shahbaz receives Google Research Scholar award for work on distributed training in the cloud
Shahbaz is working to develop a novel system to enhance the efficiency of distributed training of large-scale deep learning models in the cloud.Roya Ensafi honored with U-M Henry Russel Award
U-M’s highest honor for early- to mid-career faculty, the award recognizes Ensafi’s outstanding research and teaching contributions.Alexander Bandukwala awarded NSF CSGrad4US fellowship
The fellowship aims to increase the number and diversity of graduate students in computer science and will support Bandukwala’s pursuit of a PhD in CSE.Four papers by CSE researchers at OSDI 2024
New papers by CSE researchers cover topics related to the design and implementation of systems software.Atul Prakash named chair of Computer Science and Engineering
Prakash is an expert in the security and privacy of computer systems.Poster session showcases student-developed GenAI software systems
Prof. Mosharaf Chowdhury’s Systems for GenAI course closed with a poster session highlighting student projects.CSE researchers win Best Paper Award at ACM MMSys 2024
The authors were recognized for the excellence of their research on neural-enhanced video streaming.Roya Ensafi receives Willie Hobbs Moore Achievement Award
The award recognizes Ensafi’s outstanding achievements and contributions to promoting equity in STEM.Visiting researcher assesses Starlink as path to avoid government censorship
The study is the first to technically describe how and to what extent Starlink can be used to access the internet from inside Iran.Tianji Cong receives Rackham Predoctoral Fellowship
The award recognizes Cong’s outstanding research progress and will support his continued scholarship on realizing AI for data management.The hidden brain power behind programming
New research from U-M reveals how stimulation of certain brain regions affects programming performance.CSE researchers receive Mozilla funding for research on AI energy use
The researchers were selected as recipients of the 2024 Mozilla Technology Fund for Zeus, an effort to measure and optimize the energy consumption of machine learning.H.V. Jagadish receives Stephen S. Attwood Award
The highest faculty honor awarded by the College of Engineering, the award recognizes Jagadish’s outstanding record of achievement in research, teaching, and service.Satish Narayanasamy receives Trudy Huebner Service Excellence Award
Narayanasamy has been recognized for his extraordinary service in growing and diversifying the CSE faculty as head of the Faculty Search Committee.J. Alex Halderman receives H. Scott Fogler Award for Professional Leadership and Service
The award recognizes Halderman’s exceptional leadership and service in the area of computer security.CSE researchers win Distinguished Paper Award at POPL 2024
The authors were recognized for their development of a principled method for localizing and recovering from type and type inference errors in programs.Z. Morley Mao named Fellow of the ACM
Mao was selected for this honor based on her exceptional contributions to network systems and security.Expert shows how to tamper with Georgia voting machine in security trial
This article describes a courtroom demonstration given by Prof. J. Alex Halderman on how votes can be quickly changed on Georgia’s voting machines.Get to know: Gokul Ravi
His research takes on topics at the cutting edge of quantum computing, from quantum algorithms to quantum-classical systems.Five papers by CSE researchers to be presented at POPL 2024
New research by CSE authors covers a range of cutting-edge topics related to programming languages.Trump allies seek to co-opt coming election-security case to bolster 2020 lie
This article describes work done by Prof. J. Alex Halderman which describes how malware-infected voting machines could change votes without detection. Allies of former president Trump have wrongfully said that this work supports their claim that the 2020 election was stolen, whereas Halderman has repeatedly said he has found no evidence of wrongdoing – only vulnerabilities that could at some point be exploited.Is Georgia’s election system constitutional? A federal judge will decide in trial
Prof. J. Alex Halderman’s report on voting security vulnerabilities is referenced in this article discussing the integrity of Georgia’s election system.Open-source training framework increases the speed of large language model pre-training when failures arise
Pipeline templates strike a balance between speed and effectiveness in resilient distributed computing.Danai Koutra receives 2023 ICDM Tao Li Award
The award recognizes her outstanding achievements in the field of data mining and machine learning.CSE researchers win SIGSOFT Distinguished Paper Award at ESEC/FSE 2023
PhD student Madeline Endres and Prof. Westley Weimer have been recognized for the excellence of their paper on student contributions to open-source software projects in EECS 481.Z. Morley Mao receives NSF funding to build safe, resilient autonomous vehicles
The four-year grant will support research into improving the safety and reliability of tele-operated vehicles.Four papers by CSE researchers appearing at CCS 2023
CSE-authored papers at the conference cover cutting-edge topics related to computer security.2023 CSE Honors Competition highlights outstanding research by grad students
The competition recognizes PhD students in CSE for their excellent research contributions.Fan Lai awarded Kuck Dissertation Prize for thesis on minimalist systems for machine learning
The annual award recognizes the most impactful dissertations by PhD researchers in CSE.J. Alex Halderman installed as Bredt Family Professor of Engineering
The endowed professorship recognizes Prof. Halderman’s record of accomplishment and excellence in computer and network security.Gokul Ravi earns Innovation Award in ICCAD Quantum Computing for Drug Discovery Challenge
Prof. Ravi and his coauthors won the award for their development of CAFQA, which uses classical simulation to bootstrap variational quantum algorithms, enabling more accurate ground state energy estimation.CSE researchers receive Distinguished Paper Award at OOPSLA 2023
CSE authors were recognized for the excellence of their research on live pattern matching with typed holes in modern programming systems.Cloud and consequences: Internet censorship data enters the transformation age
A blog post discussing Prof. Roya Ensafi’s work with the Censored Planet Observatory to transform the way we analyze censorship data.Shining a light in the dark: Measuring global internet shutdowns
This blog post discusses Prof. Roya Ensafi’s work with the Censored Planet Observatory to measure and track government censorship on the internet and then make that data publicly accessible.CSE researchers present new findings at OOPSLA and SOSP
Several researchers in CSE are presenting papers at the two conferences on programming languages, operating systems, and more.U-M hosts 2023 Midwest Programming Languages Summit
The Summit brought together researchers interested in programming languages and compilers from across the region to exchange ideas and promote collaboration.Should I Get a Smart Lock for My House, or Stick With a Deadbolt?
In this article on the pluses and minuses of smart locks versus traditional locks, Prof. Atul Prakash advises smart-lock users to pair those types of locks with an additional sensor that alerts the resident when the door is opened or closed, and to be aware of software security updates.Democrats advance internet voting bill that worries security experts
Democratic lawmakers in Michigan have advanced legislation to expand internet voting overseas in a way that worries election security experts, including Prof. J. Halderman, who is quoted in this article.Congrats to CSE alums who have accepted faculty positions
Congrats to these new faculty!NSF backs U-M research to enhance reliability of distributed systems
Researchers in CSE have received a four-year NSF grant to support their development of semantic checkers for distributed systems.Voting online is very risky. But hundreds of thousands of people are already doing it.
This article covers Michigan’s bill that would expand internet voting to military members’ families. Prof. J. Alex Halderman, who opposes internet voting, is quoted.Making your phone screen blurry could stop people snooping on you
This article discusses Eye-Shield, a screen protection system designed by Prof. Kang G. Shin and PhD student Brian Tang that can prevent people from reading your phone from a distance while still remaining legible up close.Kang G. Shin receives IEEE TCCPS Technical Achievement Award
The award recognizes Prof. Shin’s substantial and lasting contributions to cyber-physical systems.CSE welcomes new faculty to campus for the 23/24 academic year
Meet the new arrivals.Power-hungry AI: Researchers evaluate energy consumption across models
A new tool designed by researchers at the University of Michigan allows users to compare the energy efficiency of AI-powered language models.Researchers tout Battery Sleuth technology as disruption in vehicle security
This article highlights Battery Sleuth, a technology developed by Kevin and Nancy O’Connor Professor of Computer Science Kang G. Shin and Prof. Liang He at University of Colorado Denver that could represent a new, more secure approach to vehicle security.University of Michigan researchers create screen protection system to fend off shoulder surfers
Eye-Shield uses an innovative pixelation scheme to obscure device screens when viewed from a distance, safeguarding against shoulder surfing attacks.Five papers by CSE researchers presented at USENIX Security 2023
Papers authored by CSE researchers at the conference cover a variety of topics related to computer security and privacy.U-M researchers studying ‘Battery Sleuth’ that could protect your car from being stolen
In the WXYZ-TV Detroit news segment, Kevin and Nancy O’Connor Professor of Computer Science Kang G. Shin is interviewed about Battery Sleuth, which provides a simple way to thwart hackers aiming to steal cars.Five papers by CSE researchers presented at ICML 2023
The papers authored by CSE researchers appearing at the conference cover a breadth of topics related to machine learning.From a lab in Ann Arbor, fighting internet censorship around the world
This in-depth profile spotlights Prof. Roya Ensafi, her motivations, and the work she is doing to defend and open internet.A Surprisingly Simple Way to Foil Car Thieves
The Communications of the ACM has highlighted news from U-M on Battery Sleuth, a technology developed by Kevin and Nancy O’Connor Professor of Computer Science Kang G. Shin and his collaborators that provides a simple way to thwart hackers aiming to steal cars.Old-tech solution may protect high-tech car in new ways from auto hacking, theft
The Detroit Free Press discusses Battery Sleuth, the vehicle security system developed by Prof. Kang G. Shin and his team that uses the auxiliary power outlet to help safeguard cars from hacking and other forms of mishap and theft.A surprisingly simple way to foil car thieves
Flicking lights or swiping wipers could one day add extra security to vehicles.CSE announces 2023 faculty promotions
The Division commends these individuals for their contributions to research, education, and the CSE community.The case against allowing internet voting in Michigan
This articles discusses continuing security concerns surrounding online voting, citing Prof. J. Alex Halderman’s research and his team’s ability to hack the District of Columbia’s internet voting pilot program in a matter of hours in 2010.Kang G. Shin receives 2023 SIGMOBILE Test-of-Time Award
The award recognizes the substantial and lasting impact of Shin’s research on real-time dynamic voltage scaling for embedded operating systems.Get to know: Ryan Huang
His research tackles the many tricky problems and failures that emerge in complex, distributed systems.Roya Ensafi joins World Economic Forum Global Future Council focused on complex risks
The Council brings together international thought leaders across government, industry, and academia to study complex, interconnected risk clusters.Critics blast Georgia’s plan to delay software updates on its voting machines
Experts, including Prof. J. Alex Halderman, respond to Georgia’s decision to wait until after the 2024 election to update its voting machine software.Court unseals long-awaited election security reports
A report by Prof. J. Alex Halderman on the cybersecurity vulnerabilities of election machines in Georgia has been released, citing significant security flaws in the state’s voting technology.Georgia won’t update vulnerable Dominion software until after 2024 election
State officials say election machines won’t be updated until after 2024, despite warnings about security flaws in a report by CSE Prof. J. Alex Halderman released this week.New technique for memory page placement integrated into Linux kernel
A novel mechanism designed by CSE researchers that automatically tiers memory pages has been deployed in the Linux operating system.Paul Grubbs and coauthors win IEEE S&P Distinguished Paper Award for research on security risks in modern zero-knowledge proof systems
Their paper explores the dangers of incorrectly applying security measures in modern zero-knowledge proof systems commonly used in cryptocurrencies.Eight CSE faculty earn NSF CAREER Awards
The NSF Faculty Early Career Development (CAREER) Program is the most prestigious award in support of early-career faculty who have the potential to serve as academic role models in research and education.Researchers at UMich find a way to reduce the energy consumed by AI
The Michigan Daily discusses Zeus, an open-source framework designed in the lab of Mosharaf Chowdhury to analyze and optimize the energy efficiency of training AIStudy explores drug use in programming jobs, tension between policy and reality
The first qualitative study on the use of psychoactive substances while on the job at software companies revealed a range of motivations, company policies, and workplace stigmas.Barzan Mozafari receives the EuroSys Test-of-Time award
Prof. Mozafari has been recognized for the sustained impact of BlinkDB, the first massively parallel approximate query engine.Security concerns raised over internet voting for Michigan military spouses
Prof. J. Alex Halderman is quoted regarding security concerns related to Michigan’s proposed new system for allowing electronic ballot return for deployed military members.Meet the brains behind the world’s first fully remote global censorship observatory
Sloan Research Fellow and Morris Wellman Faculty Development Professor Roya Ensafi has been profiled on the Sloan Foundation’s blog for her work in combatting internet censorship and surveillance.Optimization could cut the carbon footprint of AI training by up to 75%
Deep learning models that power giants like TikTok and Amazon, as well as tools like ChatGPT, could save energy without new hardware or infrastructure.Reethika Ramesh awarded Rackham Barbour Scholarship
The scholarship will support her work on studying the security and privacy of networks.I Got Investigated by the Secret Service. Here’s How to Not Be Me
Prof. Roya Ensafi is quoted in this piece on Wired about the role of ISPs in government surveillance, and how useful technologies like VPNs are in safeguarding privacy.Fan Lai earns Towner Prize for Outstanding PhD Research
The award recognizes creative and outstanding research achievements.Ram Sundara Raman earns Rackham Predoctoral Fellowship
The fellowship will help support his work to study global Internet censorship.Reethika Ramesh awarded Towner Prize for Distinguished Academic Achievement
The award recognizes active participation in research, leadership, and academic performance.Cyrus Omar earns NSF CAREER to design live program sketching environments
Omar aims to bridge the gap between a program sketch and a finished program for novices and experts alike.Xinyu Wang earns NSF CAREER Award to democratize web automation
The AI-based programming assistant will enable users to describe a repetitive task and generate a program to help them automate it.Paul Grubbs earns NSF CAREER Award to build more secure, private networks
His cryptographic techniques will help managed networks like those in schools and companies enforce network policies without the need to access user information.Roya Ensafi selected for Sloan Research Fellowship
Sloan Research Fellowships recognize distinguished performance and unique potential to make substantial research contributions.Roya Ensafi receives NSF CAREER Award for efforts to combat censorship worldwide
Her goal is to advance the scientific understanding of contemporary online censorship and develop principled and effective countermeasures.Are VPNs really the answer?
New research shows that a VPN can be one tool in an internet user’s toolbox but often is not sufficient as the only solution for all privacy needs.Learning How U.S. Consumers Perceive and Use VPNs
Prof. Roya Ensafi and Consumer Reports Security Planner Yael Grauer authored this piece on attitudes of U.S.-based users toward VPNs, and the widespread misconceptions of how they work.Roya Ensafi named Morris Wellman Professor
Ensafi’s research focuses on Internet security and privacy, with the goal of creating techniques and systems to better protect users online.Prof. Danai Koutra earns ICDM 10-Year Highest Impact Paper Award for bipartite graph alignment
Her 2013 paper examines the use of bipartite graph alignment and paved the way for continued research in graph matching.Advocates seek federal investigation of multistate effort to copy voting software
The Washington Post references Prof. J. Alex Halderman’s security assessment of Georgia’s ballot marking devices in an article about recent efforts to copy sensitive voting software in several states.Tool to analyze the security, privacy of VPNs wins first place for applied security research in 2022
VPNalyzer has revealed a number of shortcomings in the design and implementation of popular virtual private networks. The paper earned first prize at New York University’s CSAW ’22 Applied Research Competition.Researchers cut down on AI’s carbon footprint with new optimization framework
Zeus automatically adapts the power usage of deep learning models to chase clean electricity sources throughout the day‘Data-rich, resource-poor.’ Why Michigan schools can be a ‘soft target’ for ransomware attacks
Prof. Paul Grubbs discusses the ins and outs of ransomware attacks, which recently targeted South Redford School District in Michigan.Cyber vulnerability in networks used by spacecraft, aircraft and energy generation systems
A new attack discovered by the University of Michigan and NASA exploits a trusted network technology to create unexpected and potentially catastrophic behavior2022 CSE Graduate Student Honors Competition highlights outstanding research
The competition recognizes top research done by PhD students at CSE.Cutting down on database maintenance with automated tools
With the help of formal methods, Prof. Xinyu Wang is working to make the evolution of databases and its surrounding code less labor intensive and costly during schema changes.Nearly every election-denying secretary of state candidate lost
In this summary article, Prof. J. Alex Halderman is quoted regarding people’s expectations around voting machines.Will Election Deniers Again Try to Access Voting Systems?
There’s no evidence that votes have been tampered with, but a case in Georgia suggests a particular potential vulnerability. Prof. J. Alex Halderman discusses the issue with The New Yorker.Prof. Danai Koutra receives NSF grant for research in graph neural networks
The project aims to advance the theoretical underpinnings of the interplay between graph heterophily and overall performance of graph neural networks.Expert: 4 ways Americans can keep their vote secure and accurate
With election security experts waylaid by years debunking false claims of election fraud, little has improved since 2020.The Vulnerabilities of our Voting Machines, and How to Secure Them
The security of voting remains a huge topic of concern. Prof. J. Alex Halderman talks with The New Yorker Radio Hour about his experience analyzing American voting machines and where the risks stand today.Prof. Kang G. Shin receives DoD grant to investigate security of semi-autonomous systems
Prof. Shin plans to identify potential attack surfaces and security/safety issues while developing defense mechanisms against attacks on semi-autonomous systems.The same app can pose a bigger security and privacy threat depending on the country where you download it, study finds
Same app, same app store, different risks if you download it in, say, Tunisia rather than in Germany.Are virtual private networks actually private?
A joint project with Prof. Roya Ensafi and Arizona State University works to protect internet freedom and digital security by revealing vulnerabilities in VPN technology.CSE undergrads finish first, third in ACM MICRO research competition
The student researchers studied how to simulate massive datacenter application data and how to improve datacenter efficiency with payload awareness.System to avoid data center inefficiencies earns Best Paper
Called Whisper, the technique mitigates mispredictions in application control flow via efficient profiling.Apps can pose bigger security, privacy threat based on where you download them
According to a study led by PhD student Renuka Kumar, the same app can pose different different risks if you download it in, say, Tunisia rather than in Germany.‘Absolutely terrifying prospect’: How the midterms could weaken U.S. election security
Prof. J. Alex Halderman discusses the prospect of voting system audits opening key states open to attacks and hackers in Politico.Prof. Xinyu Wang collaborates with UiPath to democratize automation
The two will collaborate on building new programming techniques that are accessible to non-experts and non-programmers.Paul Grubbs earns Meta award to study interoperability in end-to-end encrypted messaging
Grubbs was one of ten awardees selected as part of the Privacy-Enhancing Technologies Award program.More secure networks with the power of zero knowledge
Paul Grubbs aims to resolve the tension between network policy enforcement and user privacy with a cryptographic technique that can prove something is true without explaining why.Democratizing Automation: UiPath and University of Michigan Join Efforts
Prof. Xinyu Wang has a goal of building fundamental intelligent programming techniques that are useful in practice, and is supported by UiPath as he works toward his vision of democratizing automation so that more and more people around the world can automate their tedious tasks.GOP operatives’ troubling trend of copying election systems
GOP operatives have made efforts to copy sensitive voting information in a number of states, including in Michigan. Computer security experts have noted that this creates new security risks. This data would often include “object code,” or the language that allows machines to understand the underlying source code, said Prof. J. Alex Halderman, which is mostly straightforward to reverse-engineer.Research on key VPN vulnerabilities recognized with USENIX Internet Defense Prize, Best Paper Award
The study authored by Prof. Roya Ensafi’s lab found that network administrators, like ISPs and governments, could easily detect and block the use of VPNs on a large scale.Researchers earn USENIX Test of Time for work in exposing network key vulnerabilities
The award recognizes “Mining Your Ps and Qs” for its lasting contributions to the field of security and encryption.Work on debunking 2020 election fraud claims in Antrim County incident recognized with USENIX Best Paper
The paper presents an independent investigation of the county’s election management system and identifies weaknesses, solutions.H.V. Jagadish named Edgar F. Codd Distinguished University Professor of EECS
Professor Jagadish is being recognized for his work as one of the nation’s most visible and influential researchers in the interdisciplinary field of data scienceHow ‘Stop the Steal’ Captured the American Right
Prof. J. Alex Halderman is quoted in the New York Times Magazine regarding the balance between credible election security threats and misinformation.Open source platform enables research on privacy-preserving machine learning
Virtual assortment of user devices provides a realistic training environment for distributed machine learning, protects privacy by learning where data lives.CSE researchers present five papers at ISCA 2022
17 U-M researchers proposed a variety of techniques to speed up complex graph algorithms, encrypted cloud computing, memory-intensive matrix operations, and more.No evidence of exploitation of Dominion voting machine flaws, CISA finds
The federal government has found no evidence that flaws in Dominion voting machines have ever been exploited, including in the 2020 election. The Cybersecurity and Infrastructure Security Agency’s five-page advisory is based in part on an analysis and report by Prof. J. Alex HaldermanThree CSE grad students recognized by NSF Graduate Research Fellowship Program
This program recognizes and supports outstanding graduate students.Kang G. Shin recognized with Distinguished Leadership Award by IEEE Computer Society Technical & Conference Activities Board
His work in the area of real-time computing has spanned decades and has had impact in a broad range of applications.Roya Ensafi selected as finalist for ACUM Outstanding Advisor Award
Ensafi received a number of student nominations for the award.System enables automated repair in hardware designs
The new framework lets developers cut down on time spent designing bug fixes for hardware specifications, adapting techniques now used widely in software development.Plot to Overturn the Election
A new PBS Frontline documentary on 2020 election misinformation features commentary by Prof. J. Alex Halderman, election security expert and author of a major report on purported 2020 election fraud in one Michigan county.Tanvir Ahmed Khan awarded Rackham Predoctoral Fellowship
The fellowship will advance his work to improve the efficiency of modern data center processors with optimizations that lie at the intersection of compilers, operating systems, and computer architecture.CSE alum Akshitha Sriraman receives ProQuest Distinguished Dissertation Award
Sriraman’s dissertation explores how to bridge computer architecture and software systems to tackle new challenges posed by massive web services.A first step toward more agile hardware design, debugging
A new suite of tools takes advantage of modern reconfigurable devices to enable developers to better address bugs in hardware after it’s been deployed.Ian Neal awarded Towner Prize for Distinguished Academic Achievement
The award recognizes active participation in research, leadership, and academic performance.New legislation could bring mobile voting to the District
Prof. J. Alex Halderman says that standards for voting should be higher – “it’s phenomenally retrograde to consider Internet voting in the present moment.”New legislation could bring mobile voting to the District
New proposed legislation could bring mobile voting to Washington DC. Prof. J. Alex Halderman comments on why we may not be ready for this.Manos Kapritsos earns CoE teaching excellence award
Students widely praise Kapritsos’ approach to teaching, and commitment to keeping classes engaging.Feds oppose immediate release of voting machine report
A federal cybersecurity agency is reviewing a report under seal by Prof. J. Alex Halderman that indicates security vulnerabilities exist in voting machines used by Georgia and other states. Halderman has advocated to make his findings public in a limited and responsible way so that problems could be addressed.Are voting machines too vulnerable to hacking? Georgia’s having that debate
Prof. J. Alex Halderman found multiple vulnerabilities that could allow hackers to install malicious software and undermine elections in a special report on Georgia’s voting machines.How worried should we be about the rise in hospital ransomware attacks? A Q&A with Kevin Fu
“We’ve reached an inflection point where the degree of connectivity between devices and services in all sectors has exploded.”Z. Morley Mao elected IEEE fellow for contributions to performance and security of internet routing and mobile systems
Prof. Mao and her students have played an important role in understanding the efficiency, security, and performance of a number of mobile systems.Study finds new opportunities, challenges to broadening CS education
While past research focuses on introductory CS courses, the researchers found another key point of potential bias in the CS curriculum.Multi-institute project “Treehouse” aims to enable sustainable cloud computing
“We are buying thousands of GPUs and running them at full speed, and no one really knows just how much energy is being spent in the process.”Undergraduate researcher wins first place at the ACM Student Research Competition
Song devised a new type of Branch Target Buffer replacement mechanism to tackle the gap between ideal and practical performance.The Catch-22 of Addressing Election Security
Prof. J. Alex Halderman comments on election security vulnerabilities versus current threats to the democratic process in this article that asks the question: How do politicians contend with the weaknesses in the voting system without fueling baseless claims of election fraud?Keeping hackers out of our medical devices
As the FDA’s resident expert in medical device security, Prof. Kevin Fu oversees efforts to fortify devices that can be compromised or exploited during a security breach. He spoke with Politico about his efforts.Baris Kasikci named Morris Wellman Professor
Kasikci’s research is centered around developing techniques, tools, and environments that help developers build more reliable, secure, and efficient software.A New Report on VPNs Shows They’re Often a Mixed Bag for Privacy
Consumer Reports recently reviewed a variety of virtual private networks with the help of VPNalyzer, a tool developed in Prof. Roya Ensafi’s lab.Tool to analyze VPN security, privacy aids in Consumer Reports review
VPNalyzer was used by Consumer Reports to measure the effectiveness of popular consumer VPN providers.Enabling efficient, globally distributed machine learning
A group of researchers at U-M is working on the full big data stack for training machine learning models on millions of devices worldwide.Tools for “more humane coding”
The Future Programming Lab envisions a more seamless coding experience.Exploring faster ways to think like a software developer
Beginner and expert programmers think about code very differently while they program, an insight that can inform more tailored training.Outstanding research recognized at Graduate Honors Competition
Five finalists from each CSE lab presented their work at the event’s final round.Could Ordinary Household Objects Be Used To Spy On You?
How the physics of sound helped test the possibilities of indirect surveillance. Prof. Kevin Fu explores the risks & opportunities of side-channel surveillance tech in Science Friday.Governments are finding new ways to squash free expression online
Work by Prof. Roya Ensafi and the Censored Planet Lab has helped to identify the use of new censorship technology in Russia.Russia Is Censoring the Internet, With Coercion and Black Boxes
Work by Prof. Roya Ensafi and the Censored Planet Lab was cited in a New York Times report on the growing use of new censorship technology in RussiaFamous Paxos distributed protocol automatically determined safe and secure
Two researchers have debunked the common assumption that the famous Paxos consensus protocol is too complex to be proven safe without hours of manual labor.CSE authors present six papers at MICRO 2021
12 co-authors had work accepted at the conference, including one Best Paper nominee.Westley Weimer earns U-M Faculty Recognition Award
Weimer is renowned for his work on automatic bug detection and repair, his lively and clear lectures, and his commitment to building a better culture in CSE.Yuval Moskovitch named 2021 EECS Rising Star
Moskovitch’s research focuses on data management for fairness and responsible data science.New tool to analyze, improve live streaming services earns best paper
The study produced a new tool to analyze and correct performance issues in major streaming software and services.Election Security Problems Still Must Be Addressed | Opinion
Prof. J. Alex Halderman co-authored an op-ed for Newsweek on how disinformation is inhibiting legitimate and necessary election security reforms.Google Award for preventing Spectre, Rowhammer in the cloud
Kevin Loughlin’s project tackles an issue called context isolation on shared computing resources.Experts call for rigorous audit to protect California recall
Work by Prof. J. Alex Halderman was cited by a group of election security experts calling on California’s top election official to take an additional step to protect the upcoming gubernatorial recall.G.O.P. Election Reviews Create a New Kind of Security Threat
Election security experts, such as Prof. J. Alex Halderman, are concerned about the security risks that are being introduced as non-election officials are granted broad access to voting equipment.Experts: False claims on voting machines obscure real flaws
In an interview with the Washington Post, Prof. J. Alex Halderman reminds readers that real security flaws in voting systems do exist – even if they’ve been obscured by false claims.Google Award to make widely used software testing technique more effective
Baris Kasikci plans to improve software fuzzers by learning how deployed software is most commonly run by users.Best paper award for simplifying data transformation
The researchers proposed a set of formal tools to make statistical data transformation easier to document and understand.Four papers with Michigan authors at SIGCOMM 2021
ACM SIGCOMM’s annual conference is the leading conference in data communications and networking in the world.Computer security personnel need tools, training to assist survivors of intimate partner violence
Customer support personnel at computer security companies are not sufficiently prepared to handle cases involving intimate partner violence. U-M PhD students Yixin Zou and Allison McDonald and Prof. Florian Schaub examined where training falls short in helping IPV survivors and what can be done to address the deficits.Get to know: Paul Grubbs
His research at the intersection of cryptography and systems has already had broad impacts across the IT industry.Hacker lexicon: what is a side channel attack?
Computers constantly give off more information than you might realize—which hackers can use to pry out their secrets. Prof. Dan Genkin gives perspective to Wired.Yatin Manerkar recognized with dissertation award honorable mention
Manerkar’s dissertation is recognized for demonstrating the potential for progressive correctness verification across all stages of architecture design.Four CSE co-authored papers presented at PLDI 2021
The papers define new ways to reconstruct program failures, program with live graphical elements, and extract information from webpages.Her fight for your rights
U-M researchers present three papers at ISCA 2021
Baris Kasikci awarded Microsoft Research Faculty Fellowship
Trump Says More Countries Should Ban Twitter: ‘Perhaps I Should Have Done It While I Was President’
In this article, Prof. Roya Ensafi comments on how the June 2018 repeal of net neutrality in the U.S. has set the stage for potentially blocking websites nationwide.Baris Kasikci earns VMWare Early Career Grant
Putin Finds Ally in China’s TikTok in Crackdown on Critics
Russia is now pioneering a “landmark” approach to censorship that relies on both pressuring platforms to police their own content and an innovative use of technology to ensure they comply, according to Roya Ensafi, the founder of the Censored Planet lab.Marina Minkin chosen for Facebook Fellowship
Human resilience study to benefit from new data privacy technique
Election lessons from Michigan
Academics: Russia deployed new technology to throttle Twitter’s traffic
The Censored Planet project, from the lab of Prof. Roya Ensafi, published a study explaining some of the details about the slowdown of Twitter in Russia.Michigan expert debunks infamous report on Antrim County election as ‘meaningless’
A report released by Prof. J. Alex Halderman says the much-discussed December 2020 report by supporters of Donald Trump on election results in Antrim County “contains an extraordinary number of false, inaccurate or unsubstantiated statements.”U of Mich. computer science prof: no fraud in Antrim Co. 2020 election
A 54-page report authored by Prof. J. Alex Halderman who analyzed Antrim County’s 2020 election results, found initial mistakes were the result of human error and that certified results of the presidential contest were accurate.Harsha Madhyastha awarded for innovative, outstanding teaching
Manos Kapritsos earns CAREER Award to apply formal reasoning to software performance
U-Michigan professor appointed to FDA medical device security post
Kevin Fu fills new leadership position at FDA’s Center for Devices and Radiological Health, overseeing medical device security
Hacking reality
Building a testing-free future
Mosharaf Chowdhury named Morris Wellman Professor
After five years, Let’s Encrypt, a non-profit based on tech developed at Michigan, has helped to secure the internet
Major side-channel discovery wins NSA contest
Winner of NSA’s 8th Annual Best Scientific Cybersecurity Research Paper Competition
The National Security Agency’s Research Directorate selected “Spectre Attacks: Exploiting Speculative Execution” as the winner of its 8th Annual Best Cybersecurity Research Paper competition. Prof. Daniel Genkin is one of the authors.2020 CSE Graduate Student Honors Competition highlights outstanding research
Tool to automate popular security technique earns distinguished paper
Censored Planet: Tracking internet censorship without on-the-ground participation
Jason Flinn honored with 2020 Mark Weiser Award
Human error, Dominion voting equipment fuel false fraud claims in Michigan
“It was ultimately a human error.” J. Alex Halderman discusses claims of voting irregularities in the state of Michigan.Leading Cybersecurity Expert Applauds Michigan Election Security Measures
“Good election results take time,” says Alex Halderman, co-chair of the Michigan Election Security Advisory Commission.How Election Tech Could Create a Recount Nightmare
Most election-tech equipment is the intellectual property of the companies that make it — meaning a contested election could get even more complicated according to experts including J. Alex Halderman.Michigan elections vulnerable to hacks but not as much as others, report says
Michigan’s Election Security Advisory Commission, co-chaired by J. Alex Halderman, released a report on Thursday detailing a host of potential problems on Election Day, including cyberattacks from foreign states, software problems and power outages.How secure are Michigan elections? Quietly released report shines light
While exerts tout the security of Michigan’s elections, multiple reforms crafted by an advisory commission have not yet been fully implemented.Will Georgia’s new voting machines solve election problems — or make them worse?
Prof. J. Alex Halderman participates in a conversion about whether the latest voting technology being used in Georgia provides a stronger defense against meddling than the traditional paper ballot.CSE researchers report over $11M in research grants last quarter
US blocks Hong Kong users from some government websites
Sites hosting economic data have been inaccessible to users in the Asian financial centre for months, according to work by Prof. Roya Ensafi and her Censored Planet team.5 ways Americans can keep their vote secure and accurate
Prof. Baris Kasikci recognized as rising star by Intel
With time short, judge mulls Georgia voting system changes
After a glitch in Georgia’s voting machines, voting integrity activists including J. Alex Halderman made a request to sideline the state’s new touchscreen voting machines in favor of hand-marked paper ballots for the November general election.Lawyers spar over Georgia voting machine glitch, planned fix
Georgia election officials say they’re implementing a software change to fix a glitch in the state’s new voting machines. But election integrity activists, including Prof. J. Alex Halderman, say the state is downplaying the problem and putting the security of the upcoming election at risk.Roya Ensafi named inaugural Consumer Reports Digital Lab Fellow
COVID-19 app built at U-M helps businesses stay open
A COVID-19 symptom checklist web app developed by students in classes taught by Profs. Sugih Jamin and Elliot Soloway is helping more than 2,500 Michigan employers meet state requirements to screen employees before they enter the workplace each day.How a COVID-19 app built at U-Michigan is helping businesses stay open
Is Your Vote Secure in Michigan? Cybersecurity Expert Alex Halderman is Cautiously Optimistic
The notoriously pessimistic University of Michigan computer security expert says there’s a lot of positive things happening in the stateCSE researchers help organize 10th anniversary workshop on internet freedom
Who Gets to Vote in Florida?
“If the Russians had pulled the trigger, there would have been utter chaos on Election Day.” Prof. J. Alex Halderman talks election security in The New Yorker.Relying on electronic voting machines puts us at risk, security expert says
How do we make elections secure? Try paper. Professor J. Alex Halderman, a security expert at the University of Michigan, explains why.$1.8M DARPA project aims to protect cars, trucks and spacecraft from hackers
Prof. Danai Koutra recognized as rising star with ACM SIGKDD Award
Censys, a search engine for internet devices, raises $15.5M Series A
Censys, co-founded by Prof. J. Alex Halderman, completed a round of Series A funding for $15.5M. The company will use the funding to fuel their growth in revolutionizing Attack Surface Management.“Hiding” network latency for fast memory in data centers
Baris Kasikci earns CAREER Award to automatically improve software quality with data from everyday program use
New collaboration promises greater innovation in medical device security
Enabling fairer data clusters for machine learning
The Cybersecurity 202: DNC’s email voting plan limits hacking risk but can’t eliminate it
“What’s at stake here is the legitimacy of the [voting] process and for that reason security is still very important.” Prof. J. Alex Halderman talks to the Washington Post.Voting amidst a pandemic
J. Alex Halderman, professor of computer science at the University of Michigan explains why e-voting systems are so risky when it comes to election security.Delayed Election Results Could Test Social Media Companies as Never Before
The immediate gratification American voters have enjoyed for decades will likely come to an end in 2020. That’s the diagnosis of experts and academics like Prof. J. Alex Halderman.Jason Flinn earns Test of Time award for 1999 invention of adaptable battery use in mobile apps
Hunger and COVID: Fighting pandemic-related food insecurity in Detroit
Students lead the way on State of Michigan web application to help curb the spread of COVID-19
Hacker Lexicon: What Is a Side Channel Attack?
Prof. Daniel Genkin helps to explain why side channel attacks continue to happen in this article. Genkin has been involved in identifying a number of flaws that have been vulnerable to side channel attacks, enabling attacks such as the Meltdown, Spectre, RAMBleed, and Foreshadow attacks.Delaware Quietly Fielded An Online Voting System, But Now Is Backing Away
Delaware briefly deployed a controversial internet voting system recently but scrapped it amid concerns about security and public confidence, comments from Prof. J. Alex Halderman.New method ensures complex programs are bug-free without testing
The Cybersecurity 202: Georgia’s primary debacle should sound alarm bells for November
“The wide-scale problems in Georgia are exactly what experts have been fearing.” Prof. J. Alex Halderman raises alarm about November elections based on the experience in Georgia’s primary.New remote voting risks and solutions identified
Online Voting System Used in Florida and Elsewhere Has Severe Security Flaws, Researchers Find
Significant problems with Democracy Live’s OmniBallot internet voting program could result in doctored ballots as voters gear up for election season in the era of Covid-19The Cybersecurity 202: DARPA wants hackers to try to crack its new generation of super-secure hardware
Prof. J. Alex Halderman offered recommendations for how election officials can use online voting platform OmniBallot’s technology while mitigating risk.Amid Pandemic and Upheaval, New Cyberthreats to the Presidential Election
Fear of the coronavirus is speeding up efforts to allow voting from home, but some of them pose security risks. A new study by Prof. J. Alex Halderman identifies risks to election integrity and voter privacy on the OmniBallot platform, currently in use for the Delaware primaries and in other parts of the country.Web app, dashboard from U-M to inform Michiganders’ return to work
IEEE security conference features six accepted papers from CSE researchers
Get to know: Xinyu Wang
Westley Weimer voted 2020 HKN Professor of the Year in CSE
HBO Documentary Shows The Value Of Cybersecurity In Election Security
J. Alex Halderman examines the threats associated with electronic voting machines.Research team takes on food insecurity in Detroit in the face of coronavirus limitations
Building better coronavirus databases with automatic quality checks
Nine CSE graduate students recognized by NSF Graduate Research Fellowship Program
Undergraduate research on speeding up data centers earns ACM first prize
Analytical model predicts exactly how much a piece of hardware will speed up data centers
Cybersecurity Experts Say Hacking Risk Is High for Mobile Voting
J. Alex Halderman talks with Bloomberg about mobile voting systems, saying they’re still prone to tampering and manipulation.Rackham Predoctoral Fellowship for design of robust, reliable and repairable software systems
Predoctoral Fellowship for mathematically provable hardware design
Researchers to use brain scans to understand gender bias in software development
Programming around Moore’s Law with automatic code translation
Big data, small footprint
Autonomous vehicles can be fooled to ‘see’ nonexistent obstacles
Five papers by CSE researchers presented at NSDI
The teams designed systems for faster and more efficient distributed and large-scale computing.Real-time monitor tracks the growing use of network filters for censorship
Buggy Iowa Caucus App Is Buggy, Security Experts Say
Here’s why NSA rushed to expose a dangerous computer bug
How Multiple System Failures Produced Debacle in Iowa Caucus
Halderman honored for public engagement efforts
The U-M presidential award honors individuals who provide sustained, dedicated, and influential leadership and service in major national or state capacities.App Used to Tabulate Votes Is Said to Have Been Inadequately Tested
Puerto Rico’s Internet Voting Plan Threatens Election Security: ACLU
$1M grant to develop U-M high-capacity research network
Facebook Fellowship for improving high-demand web services
Intel Is Patching the Patch for the Patch for Its ‘Zombieload’ Flaw
A research team from Michigan and University of Adelaide has identified a new microarchitectural attack that is capable of bypassing the buffer overwrite countermeasures in INtel’s flagship processors.‘Chaos Is the Point’: Russian Hackers and Trolls Grow Stealthier in 2020
Research undercuts arguments from ballot-marking device advocates
Voting machines touted as secure option are actually vulnerable to hacking
EECS-CSE professor Alex Halderman’s latest study shows that hybrid voting machines are still vulnerable to hacks.Voters fail mock election, exposing vulnerability to hackers
The latest study from EECS-CSE professor Alex Halderman shows vulnerabilities in ballot-marking devices.Not enough voters detecting ballot errors and potential hacks, study finds
Breaking Into a Smart Home With A Laser – Smarter Every Day 229
CRA recognizes three outstanding undergraduate researchers
Three faculty earn MIDAS grants to broaden the frontiers of data science
Danai Koutra named Morris Wellman Professor
CSE faculty funded for three precision health projects
Best Student Paper Award for work on faster network classification for machine learning
‘U’ researchers find way to hack into virtual assistants with lasers
Researchers including Profs. Kevin Fu and Daniel Genkin were able to take control of virtual assistants using only light.New student tool gets chips from lab to fab faster than ever
Expensive, Glitchy Voting Machines Expose 2020 Hacking Risks
Researchers design new solution to widespread side-channel attacks
How Let’s Encrypt doubled the percentage of secure websites in four years
2019 CSE Graduate Student Honors Competition highlights outstanding research
The competition is the culmination of a process that narrows a field of entrants to a handful of finalists, each of whom gives a summary presentation on an area of their research.Study: Russia’s web-censoring tool sets pace for imitators
New research by Prof. Roya Ensafi sheds light on the implications of this technology.How Russia’s online censorship could jeopardize internet freedom worldwide
Siri, Alexa, and Google Home can be controlled with lasers, new research shows
MEMS mics respond to light as if it were sound, discovered by a team including Profs. Kevin Fu and Dan GenkinResearchers take control of Siri, Alexa, and Google Home with lasers
H.V. Jagadish recognized with Distinguished Faculty Achievement Award
Offensive vehicle security toolbox makes car hacking easier
New tool combats evolving internet censorship methods
The Market for Voting Machines Is Broken. This Company Has Thrived in It.
This article highlights concerns about voting machines made by ES&S, the nation’s largest supplier of voting technology, and the tactics used by the company to continue its dominance. Prof. J. Alex Halderman is quoted on how the company’s tactics haver slowed progress toward secure elections.Two CSE grad students selected for Rising Stars in EECS Workshop
Year of vulnerability hunting uncovers potential attacks on Intel Chips, RAM
All three of these attacks put users’ privacy at risk, exploiting new routes to sensitive data.CSE faculty bring significant showing to major systems conference
$2M NSF grant to explore data equity systems
Researchers plan to establish a framework for a national institute that would enable research using sensitive data, while preventing misuse and misinterpretation.$1M NSF grant supports new system for gathering, structuring data with ease
7 new faculty in CSE
New attack on autonomous vehicle sensors creates fake obstacles
“Mind reading” study looks inside coders’ brains
Automated tool optimizes complex programs better than humans
PET Award for making privacy policies easier to read
Best paper award for analysis of a decade of malware reports
Three papers chosen as IEEE Micro Top Picks
Researchers use Rowhammer bit flips to steal 2048-bit crypto key
RAMBleed side-channel attack, discovered in part by Michigan researchers, works even when DRAM is protected by error-correcting code.New speculative execution bug leaks data from Intel chips’ internal buffers
Intel-specific vulnerability was found by researchers including Prof. Daniel Genkin’s group, calling their discovery of the attack Fallout.Peter Chen voted 2019 HKN Professor of the Year in CSE
CSE alum Qi Alfred Chen selected for ProQuest Dissertation Award
Award for helping popular websites better direct their internet traffic
Chowdhury receives VMWare Award to further research on cluster-wide memory efficiency
Prof. J. Alex Halderman named a 2019 Andrew Carnegie Fellow
Michigan’s new Election Security Commission holds inaugural meeting on U-M Campus
Halderman co-chairs new commission to protect Michigan votes
Chowdhury wins NSF CAREER award for making memory cheaper, more efficient in big data centers
Two solutions for GPU efficiency can boost AI performance
Election security: Halderman recommends actions to ensure integrity of US systems
Personalized knowledge graphs for faster search and digital assistants
Speeding up code with clever data manipulation
Automated software repair paper recognized for 10 years of influence
Outstanding commitment to undergraduate mentorship
Facebook Fellowship for research on web privacy, security, and censorship
Online censorship detector aims to make the internet a freer place
Jagadish appointed director of Michigan Institute for Data Science
Bridging the “last centimeter barrier” in electronic communications
Using drones, a new software tool can bring LTE networks anywhere
Study reveals new data on region-specific website blocking practices
A secure future for US elections starts in the classroom
Making software failures a little less catastrophic
Tyche: A new permission model to defend against smart home hacks
Intel processor vulnerability could put millions of PCs at risk
CSE welcomes 9 new faculty
Get to know the new arrivals.Tool for structuring data creates efficiency for data scientists
Finding meaning in varied data
Necmiye Ozay receives Henry Russel Award for extraordinary accomplishment
Undocumented immigrants’ privacy at risk online, on phones
Cafarella Receives VLDB Test of Time Award for Structured Web Data Search
Connected cars can lie, posing a new threat to smart cities
Designing a flexible future for massive data centers
Zuckerberg Capitol Hill testimony: Engineering experts offer comments
Three CSE faculty selected for Google Faculty Research Awards
‘I hacked an election. So can the Russians.’
Michigan researchers discover vulnerabilities in next-generation connected vehicle technology
CSE PhD student Matt Bernhard on the Facebook data breach
Chat tool simplifies tricky online privacy policies
Michigan researchers awarded 2018 Applied Networking Research Prize for their work on speeding up the mobile web
Internet-scanning U-M startup offers new approach to cybersecurity
FCC repeals net neutrality: Engineering experts offer comments
An armed robber’s Supreme Court case could affect all Americans’ digital privacy for decades to come
Net neutrality repeal: Michigan Engineers weigh in
Two faculty named AAAS fellows
Manos Kapritsos and collaborators win USENIX security paper award
“Learning database” speeds queries from hours to seconds
Accelerating the mobile web
Prof. J. Alex Halderman testifies in front of senate intelligence committee on secure elections
Lattice Data, Inc supports CSE students
A breakthrough for large scale computing
Brian Noble named chair of Computer Science and Engineering
Smartphone security hole
Jack Kosaian selected for NSF Graduate Research Fellowship
Open ports act as security wormholes into mobile devices
Qi Alfred Chen receives Rackham Predoctoral Fellowship for research into network and system security
Barzan Mozafari named Morris Wellman Faculty Development Professor
Harsha Madhyastha selected for Google Faculty Award
Andrew Quinn selected for NSF Graduate Research Fellowship
Andrew Quinn selected for Microsoft research PhD fellowship
Prof. Z. Morley Mao selected to receive CoE George J. Huebner, Jr. Research Excellence award
Prof. Jason Flinn named ACM Fellow for contributions to mobile computing and distributed systems
Alumnus Tim Howes chosen for Arbor Networks PhD Research Impact Lecture and Award
Harsha Madhyastha selected for Facebook Faculty Award
Shadows in the Dark Web
Secrets lurk in the dark web, the 95 percent of the internet that most of us can’t see. One U-M professor is bringing some of those secrets to light, making the digital and the real world a little safer.Peter Honeyman receives USENIX Test of Time Award
Several Michigan Papers Presented at 2016 USENIX Security Symposium
A total of five papers authored by CSE researchers were presented.Algorithms can be more fair than humans
‘The most interesting tech IPO of the year’ was founded by alums
Researchers David Adrian and Alex Halderman receive Pwnie Award for work on DROWN attack
With over 7 million certificates issued, Let’s Encrypt aims to secure the entire web
Summer Bootcamp prepares undergraduates for work with big data
CSE alumna Adriane Chapman recognized with Test of Time Award from ACM SIGMOD
Danai Koutra receives 2016 SIGKDD Doctoral Dissertation Award
Two Michigan papers win top awards at IEEE Security and Privacy Symposium
Proxy optimizes webpage loading for better user experience
Mosharaf Chowdhury receives ACM SIGCOMM Dissertation Award
Michigan and Verisign researchers demonstrate new man-in-the-middle WPAD query attack
Thorny technical questions remain for net neutrality
Pressure-sensing smartphones: Software lets mobile devices feel force
Hacking into homes: Security flaws found in SmartThings connected home system
Michael J. Cafarella selected for Sloan Research Fellowship
Passwords, privacy and protection: Can Apple meet FBI’s demand without creating a ‘backdoor’?
Mosharaf Chowdhury receives Google Faculty Research Award
Barzan Mozafari receives NSF CAREER Award to improve predictability of database systems
Secure your website now: Let’s Encrypt enters Public Beta
Cafarella and Lee named Morris Wellman Faculty Development Professors
Censys enables fast searching of actionable internet data
Michigan Researchers Win the 2016 Applied Networking Research Prize
The Promise and Perils of Predictive Policing Based on Big Data
Computer Scientists Win Best Paper Award at ACM Conference on CCS for Exposing the Vulnerabilities of the Diffie-Hellman Key Exchange
J. Alex Halderman Named One of Popular Science’s Brilliant Ten
Peter M. Chen Recognized for Influential Work in Operating Systems with ACM SIGOPS Hall of Fame Award
J. Alex Halderman and Collaborators Receive NSF Cybersecurity Award to Develop Rapid-Response Architecture
Prof. Jason Flinn Receives U-M’s Faculty Recognition Award
$3.46M to Combine Machine Learning on Big Data with Physical Simulations
Michigan Researchers Win Best Poster Award at MobiSys 2015
Two Michigan Papers Share the Best Paper Award at MobiSys 2015
Security Flaw in New South Wales Puts Thousands of Online Votes at Risk
Z. Morley Mao Receives Google Faculty Research Award
J. Alex Halderman Selected for Sloan Research Fellowship
Four CSE Faculty Selected for 2014-15 College of Engineering Awards
Computer science researchers aim to securely encrypt every website
Computer Scientists Win Best Paper Award at 2014 ACM Internet Measurement Conference
Sneak attack through smartphone shared memory
Utah is correct to both be at the front of online voting, and cautiously study security
Prof. J. Alex Halderman is the kind of friend to internet voting Utah needs – one who has the savvy to think and act like someone dedicated to hijacking an election.2014 Promotions of our faculty – congratulations!
Jason Flinn Authors Book on Mobile and Pervasive Computing
CSE grad students win best student paper at OSDI 12 symposium
Their paper addresses the challenge of troubleshooting the performance of production software.J. Alex Halderman to Teach Course on Electronic and Internet Voting through Coursera
The 5-week course will provide the technical background and public policy foundation that today’s citizens need to understand the electronic voting debate.Prof. J. Alex Halderman featured in PBS story on the security of internet voting
Michael Cafarella receives NSF CAREER Award for work in building and searching a structured web database
Farnam Jahanian Named NEF Entrepreneur of the Year
Farnam Jahanian named AAAS Fellow