Three faculty earn MIDAS grants to broaden the frontiers of data science
This round of funding strongly encourages pioneering work with the potential for major expansion.
Danai Koutra named Morris Wellman Professor
Koutra specializes in advancing network methods to speed up a variety of big data applications.
CSE faculty funded for three precision health projects
The CSE faculty include Prof. David Fouhey, Prof. Danai Koutra, Prof. Rada Mihalcea, and Research Scientist Veronica Perez-Rosas.
Best Student Paper Award for work on faster network classification for machine learning
Comparing graphs the team’s tool is up to an order of magnitude faster than competitive baselines.
New student tool gets chips from lab to fab faster than ever
The open-source system cuts a key step in chip testing down from days or weeks to a couple hours, on average.
Researchers design new solution to widespread side-channel attacks
The proposal provides a chip-level safeguard against sensitive data being transmitted after it’s accessed.
How Let’s Encrypt doubled the percentage of secure websites in four years
A Q&A with J. Alex Halderman, who co-founded the nonprofit organization.
2019 CSE Graduate Student Honors Competition highlights outstanding researchThe competition is the culmination of a process that narrows a field of entrants to a handful of finalists, each of whom gives a summary presentation on an area of their research.
How Russia’s online censorship could jeopardize internet freedom worldwide
The nation is using inexpensive commodity equipment to block 170K domains on more than 1K privately-owned ISPs.
Researchers take control of Siri, Alexa, and Google Home with lasers
The newly discovered microphone vulnerability allows attackers to remotely inject inaudible and invisible commands into voice assistants using light.
H.V. Jagadish recognized with Distinguished Faculty Achievement Award
Prof Jagadish is an internationally recognized expert in the field of very large databases.
Offensive vehicle security toolbox makes car hacking easier
The new system is designed to save security researchers time and effort spent reverse-engineering the message format of every vehicle they study.
New tool combats evolving internet censorship methods
Technology pioneered by Michigan researchers can circumvent many effective website blocking tools
Two CSE grad students selected for Rising Stars in EECS Workshop
The workshop brings together outstanding women interested in pursuing academic careers in electrical engineering and computer science.
Year of vulnerability hunting uncovers potential attacks on Intel Chips, RAMAll three of these attacks put users’ privacy at risk, exploiting new routes to sensitive data.
CSE faculty bring significant showing to major systems conference
Researchers designed three new systems to speed up code at several key bottlenecks.
$2M NSF grant to explore data equity systemsResearchers plan to establish a framework for a national institute that would enable research using sensitive data, while preventing misuse and misinterpretation.
$1M NSF grant supports new system for gathering, structuring data with ease
The team’s new tool will combine of software and data to make gathering structured data dramatically easier.
7 new faculty in CSE
The new additions to the department offer a breadth of research and educational experience, with projects spanning robotic interaction and the future of programming languages.
New attack on autonomous vehicle sensors creates fake obstacles
Up to this point, no attacks had been discovered targeting a car’s LiDAR system—but a major new finding from researchers at the University of Michigan has demonstrated what that might look like.
“Mind reading” study looks inside coders’ brains
Using real-time fMRI readings, researchers linked spatial reasoning with CS problem solving.
Automated tool optimizes complex programs better than humans
Erie provided database repairs that were previously performed exclusively by human programmers.
PET Award for making privacy policies easier to read
The research generated a chatbot to help users sift through important details in privacy policies.
Best paper award for analysis of a decade of malware reports
The research suggests that common blacklist-based prevention systems are ineffective.
Three papers chosen as IEEE Micro Top Picks
Top Picks is an annual special edition of IEEE Micro magazine that acknowledges the 10-12 most significant research papers.
Peter Chen voted 2019 HKN Professor of the Year in CSE
This is the fifth time that Prof. Chen has been named Professor of the Year by EECS students.
CSE alum Qi Alfred Chen selected for ProQuest Dissertation Award
Chen’s dissertation research was dedicated to developing proactive defense approaches to the new security challenges of a hyper-connected world.
Award for helping popular websites better direct their internet traffic
Edge Fabric offers providers real-time performance analysis and a way to incorporate this data into routing decisions.
Chowdhury receives VMWare Award to further research on cluster-wide memory efficiency
Chowdhury’s work has produced important results that can make memory in data centers both cheaper and more efficient.
Prof. J. Alex Halderman named a 2019 Andrew Carnegie Fellow
Halderman will work to further educate lawmakers, future cybersecurity experts, and the public about how to ensure that election results can relied upon and verified
Michigan’s new Election Security Commission holds inaugural meeting on U-M Campus
The meeting began the commission’s review and assessment of election security in Michigan.
Halderman co-chairs new commission to protect Michigan votes
The effort seeks to protect the integrity of every vote.
Chowdhury wins NSF CAREER award for making memory cheaper, more efficient in big data centers
Chowdhury connects all unused memory in a data cluster and treats it as a single unit.
Two solutions for GPU efficiency can boost AI performance
Chowdhury’s lab multiplied the number of jobs a GPU cluster can finish in a set amount of time
Election security: Halderman recommends actions to ensure integrity of US systems
In congressional testimony, professor urges $370M in federal funding to replace outdated machines.
Personalized knowledge graphs for faster search and digital assistants
Graphs that are customized, stored locally, and able to change over time can enable faster and more accurate searching and digital assistants
Speeding up code with clever data manipulation
Kasikci presents a method to improve a program’s ability to use data in a straightforward, efficient way
Automated software repair paper recognized for 10 years of influence
Ten years ago, Prof. Westley Weimer set out to shave off time and expenditure sunk into patch fixes.
Outstanding commitment to undergraduate mentorship
“Thanks to his tireless support and unparalleled patience, I am now equipped with a fundamental research skill set.”
Facebook Fellowship for research on web privacy, security, and censorship
McDonald works to develop better privacy and security tools for marginalized communities
Online censorship detector aims to make the internet a freer place
Censored Planet could provide new insight into the flow of online information
Jagadish appointed director of Michigan Institute for Data Science
Jagadish will help lead MIDAS into its next stage and further expand data science efforts across disciplines.
Using drones, a new software tool can bring LTE networks anywhere
SkyCore is a complete software solution to deploying mobile networks on unmanned drones
Study reveals new data on region-specific website blocking practices
A team of researchers unearthed new data on geographic denial of access to web content in a new paper.
A secure future for US elections starts in the classroom
A new special topics course on election cybersecurity gives students an examination of the past, present, and future of US elections.
Making software failures a little less catastrophic
Researchers have implemented a new way to diagnose software failures with a high degree of accuracy and efficiency.
Tyche: A new permission model to defend against smart home hacks
“The work is an important step towards understanding how to make tradeoffs between usability and security.”
Intel processor vulnerability could put millions of PCs at risk
Patches can provide protection.
CSE welcomes 9 new facultyGet to know the new arrivals.
Tool for structuring data creates efficiency for data scientists
Foofah is a tool that can help to minimize the effort and required background knowledge needed to clean up data.
Finding meaning in varied data
Jie Song devised a method to combine summarized datasets that group information by incompatible units.
Necmiye Ozay receives Henry Russel Award for extraordinary accomplishment
Ozay is one of four U-M faculty members selected to receive a Henry Russel Award for 2019. The Award is one of the university’s highest honors for junior faculty members.
Undocumented immigrants’ privacy at risk online, on phones
When it comes to their smartphones, immigrants struggle to apply instinctive caution, according to a study by a team of University of Michigan researchers.
Cafarella Receives VLDB Test of Time Award for Structured Web Data Search
This award is given to the VLDB paper published ten years earlier that has had the most influence since its publication.
Connected cars can lie, posing a new threat to smart cities
The day when cars can talk to each other – and to traffic lights, stop signs, guardrails and even pavement markings – is rapidly approaching.
Designing a flexible future for massive data centers
A new approach recreates the power of a large server by linking up and pooling the resources of smaller computers with fast networking technology.
Zuckerberg Capitol Hill testimony: Engineering experts offer comments
U-M profs weigh new business model, European-style regulation
Three CSE faculty selected for Google Faculty Research Awards
Profs. Jia Deng, Roya Ensafi, and Manos Kapritsos have been selected to receive Google Faculty Research Awards.
‘I hacked an election. So can the Russians.’
Professor Alex Halderman and the New York Times staged a mock election to demonstrate voting machine vulnerability.
Michigan researchers discover vulnerabilities in next-generation connected vehicle technology
The vulnerability allows an attacker to manipulate a new intelligent traffic control algorithm and cause severe traffic jams.
CSE PhD student Matt Bernhard on the Facebook data breach
In this video, CSE PhD Student Matt Bernhard weighs in on the matter Facebook data harvesting, such as that done by Cambridge Analytica.
Chat tool simplifies tricky online privacy policies
Automated chatbot uses artificial intelligence to weed through fine print
Michigan researchers awarded 2018 Applied Networking Research Prize for their work on speeding up the mobile web
The researchers, including Prof. Harsha Madhyastha and CSE graduate students Vaspol Ruamviboonsuk and Muhammed Uluyol, received prize for their paper, “Vroom: Accelerating the Mobile Web with Server-Aided Dependency Resolution.”
FCC repeals net neutrality: Engineering experts offer comments
A long-standing tenet of the internet was overturned today.
An armed robber’s Supreme Court case could affect all Americans’ digital privacy for decades to come
How much can your cellphone reveal about where you go?
Net neutrality repeal: Michigan Engineers weigh in
On Dec. 14, the FCC will vote on the rules that today ensure internet service providers treat all web content equally.
Manos Kapritsos and collaborators win USENIX security paper award
Their paper introduces a new programming language and tool called Vale that supports flexible, automated verification of high-performance assembly code.
“Learning database” speeds queries from hours to seconds
Verdict can make databases deliver answers more than 200 times faster while maintaining 99 percent accuracy.
Accelerating the mobile web
New Vroom software could double its speed.
Prof. J. Alex Halderman testifies in front of senate intelligence committee on secure elections
His remarks focused on vulnerabilities in the US voting system and a policy agenda for securing the system against the threat of hacking.
Lattice Data, Inc supports CSE students
The gift supplemented the Computer Science and Engineering Special Projects Fund.
A breakthrough for large scale computing
New software finally makes ‘memory disaggregation’ practical.
Brian Noble named chair of Computer Science and Engineering
On the faculty since 1998, Noble was most recently associate dean for undergraduate education.
Jack Kosaian selected for NSF Graduate Research Fellowship
Jack has enjoyed involvement in research across diverse domains within the College of Engineering.
Open ports act as security wormholes into mobile devices
Researchers have for the first time characterized a widespread vulnerability in the software that runs on mobile devices.
Qi Alfred Chen receives Rackham Predoctoral Fellowship for research into network and system security
Chen investigates how to develop defense approaches that can fundamentally address security challenges in existing and future smart systems.
Barzan Mozafari named Morris Wellman Faculty Development Professor
Prof. Mozafari is passionate about building large-scale data-intensive systems that are more scalable, more robust, and more predictable.
Harsha Madhyastha selected for Google Faculty Award
Prof. Madhyastha seeks to enable the cloud provider to monitor traffic on behalf of all the web services hosted on its platform.
Andrew Quinn selected for Microsoft research PhD fellowship
Andrew’s research creates cluster-scale systems that allow developers to quickly understand and debug programs.
Prof. Jason Flinn named ACM Fellow for contributions to mobile computing and distributed systems
Prof. Flinn has been an active researcher in the field of mobile computing for a number of years.
Harsha Madhyastha selected for Facebook Faculty Award
Prof. Madhyastha’s recent research has focused on enabling latency-sensitive web services to optimize user experience.
Peter Honeyman receives USENIX Test of Time Award
The USENIX Test of Time Awards recognizes papers presented at its respective conference from at least 10 years ago that have had a lasting impact on their fields.
Algorithms can be more fair than humans
Still, it’s not guaranteed, as seen in Amazon’s same-day delivery service. Algorithm designers may not even realize a problem has crept in.
Researchers David Adrian and Alex Halderman receive Pwnie Award for work on DROWN attack
DROWN allows attackers to break encryption used to protect HTTPS websites and read or steal sensitive communications.
With over 7 million certificates issued, Let’s Encrypt aims to secure the entire web
In order to bring HTTPS to everyone, Prof. Halderman joined forces in 2012 with colleagues at Mozilla and the Electronic Frontier Foundation to found Let’s Encrypt, a non-profit certificate authority with the mission of making the switch to HTTPS vastly easier.
Summer Bootcamp prepares undergraduates for work with big data
The Big Data Summer Bootcamp is a six-week interdisciplinary training and research program at the University of Michigan.
Danai Koutra receives 2016 SIGKDD Doctoral Dissertation Award
The annual SIGKDD doctoral dissertation award recognizes excellent research by doctoral candidates in the field of data mining and knowledge discovery.
Two Michigan papers win top awards at IEEE Security and Privacy Symposium
One of the paper describes and demonstrates a malicious hardware backdoor. The other demonstrated security failings in a commercial smart home platform.
Proxy optimizes webpage loading for better user experience
Klotski seeks to improve users’ perceptions of how quickly a page loads by maximizing the amount of important content on the page that is fetched and displayed within the user’s attention span.
Mosharaf Chowdhury receives ACM SIGCOMM Dissertation Award
Prof. Chowdhury bridges the gap between application-level performance and network-level optimizations through the coflow abstraction.
Michigan and Verisign researchers demonstrate new man-in-the-middle WPAD query attack
New security ramifications exist when laptops and smartphones configured for enterprise systems are used outside the enterprise in the realm of the wider web.
Thorny technical questions remain for net neutrality
Not all online traffic is the same; should we treat it the same anyway?
Pressure-sensing smartphones: Software lets mobile devices feel force
Sneak attack through smartphone shared memory
A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of Michigan has shown.
2014 Promotions of our faculty – congratulations!
Congratulations to Profs Bertacco, Flinn, Narayanasamy, Olson, Rais-Zadeh, and Zhong.