Electrical Engineering and Computer Science

EECS in the News

Medical Devices Should Withstand Rigor, Expert Says

When it comes to managing medical device security risk, hospital administrators should focus on weathering the storm and not necessarily prevention, Prof. Kevin Fu, a noted medical device security expert, encouraged this week. [Full Story]

Related Topics:  Fu, Kevin  Lab-Computer Engineering (CE Lab)  Medical Device Security  

A Brief Chronology of Medical Device Security

This article in the Communications of the ACM, co-written by Prof. Peter Honeyman, reviews the current era of cyber threat to medical device security. The article concludes with a look forward at steps necessary to secure medical devices. [Full Story]

Related Topics:  Honeyman, Peter  Lab-Software Systems  Medical Device Security  

Progress in AI, through collaborative research

Guru Banavar, Chief Science Officer and VP for Cognitive Computing at IBM Research, has blogged about IBM's university partnerships to advance cognitive computing, including work at CSE led by Prof. Satinder Singh Baveja to develop the next generation of conversational interface technologies. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Cognitive Science & Architectures  Lab-Artificial Intelligence  

Despite Flaws, Paperless Voting Machines Remain Widespread in the U.S.

This article surveys problems associated with aging and insecure electronic voting systems. It quotes Prof. J. Alex Halderman, a leading researcher in this area, as saying, "Clearly we still have a long way to go to ensure that all Americans have access to a form of voting technology they can trust." [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Prof. Emerita Lynn Conway to Receive Honorary Degree from University of Victoria

Prof. Emerita Lynn Conway will receive an honorary degree from the University of Victoria - the university's highest academic honor - during fall the convocation ceremony on Nov. 9 in the University Centre Farquhar Auditorium. Prof. Conway will be recognized for her pioneering work in VLSI and as a leading activist for transgender rights. [Full Story]

Related Topics:  Conway, Lynn  

A hot new app is hoping to change the way you manage your money

This article reports on Clinc, the intelligent personal assistant startup headed by Profs. Jason Mars and Lingjia Tang. At the Finovate conference, Clinc introduced Finie, the planet's most intelligent personal financial assistant that helps everyone talk to their bank accounts in a natural and conversational way to get real-time and instant financial insights. [Full Story]

Related Topics:  Artificial Intelligence  Lab-Artificial Intelligence  Mars, Jason  Tang, Lingjia  Technology Transfer  

U-M, Yottabyte partner to accelerate data-intensive research

A strategic partnership between the University of Michigan and software company Yottabyte promises to unleash a new wave of data-intensive research by providing a flexible computing cloud for complex computational analyses of sensitive and restricted data. Prof. Eric Michielssen says it will “improve research productivity by reducing the cost and time required to create the individualized, secure computing platforms that are increasingly necessary to support scientific discovery in the age of Big Data.” [Full Story]

Related Topics:  Big Data  Lab-Optics and Photonics  Michielssen, Eric  

Paperless voting could fuel 'rigged' election claims

This article describes the concern that talk of a potentially "rigged" election could undermine confidence in results. Amongst the issues associated with electronic voting is that many systems do not produce paper backups that could be used for verification, according to Prof. J. Alex Halderman, who is quoted in the article. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

An experimental policing tool is gaining traction across the country and there are major civil-liberties concerns

This article on the use of data for predictive policing points to the possibility that those practices could lead to racial profiling and aggressive policing. It quotes HV Jagadish, Bernard A. Galler Professor of Electrical Engineering and Computer Science, on the subject. He suggests that police departments haven't struck the right balance between more efficiently targeting crime and avoiding civil-liberties conflicts. [Full Story]

Related Topics:  Big Data  Jagadish, HV  Lab-Software Systems  

Expert Questions Claim That St. Jude Pacemaker Was Hacked

This article reports on the work done by Prof. Kevin Fu and his collaborators, which has called into question the allegations of security flaws in St. Jude Medical's pacemakers and other life-saving medical devices. The claim of security holes was made by short-selling investment research firm Muddy Waters Capital LLC and medical device security firm MedSec Ltd [Full Story]

Related Topics:  Fu, Kevin  Lab-Software Systems  Security (national and personal safety)  

Guarding Presidential Election Vote Integrity Presents a Daunting Task

Prof. J. Alex Halderman is quoted in this article regarding election integrity. He points out that any election system must be able to prove that results are accurate in order to dispel concerns about vote rigging. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

New Concerns About Hacks Into State Voting Systems

Prof. J. Alex Halderman was a guest on the Diane Rehm show on August 31, where the conversation included discussion of the security of elections. Click the "Listen" button under the headline to hear the interview; the discussion with Prof. Halderman begins at 20:30. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Hacking Report on St. Jude Pacemakers Was Flawed, Researchers Say

This article details how a report on cybersecurity vulnerabilities in St. Jude Medicals implantable heart devices released last week by short sellers was flawed and didnt prove the flaws existed, according to a review by University of Michigan researchers including Prof. Kevin Fu. [Full Story]

Related Topics:  Fu, Kevin  Lab-Computer Engineering (CE Lab)  Security (Computing)  

University study finds flaws in criticism of St. Jude cyber security

This article reports on the work done by Prof. Kevin Fu and his collaborators, which has called into question the allegations of security flaws in St. Jude Medical's pacemakers and other life-saving medical devices. The claim of security holes was released last week by short-selling investment research firm Muddy Waters Capital LLC and medical device security firm MedSec Ltd. [Full Story]

Related Topics:  Fu, Kevin  Lab-Computer Engineering (CE Lab)  Security (Computing)  

Real holograms are on bank cards, not starships

Holograms are more than science fiction, but the real-life technology isnt what people think it is. Most of the technologies calling themselves holographic do not produce actual holograms including the specters of Vargas Llosa, Kimmel, Modi, Tupac, and MJ, which are created via computer-generated images and high-definition video projection. A real hologram is an image that records the diffraction of laser light directed at an object, and was invented in part by EECS professor Emmett Leith in the 1960s. [Full Story]

Related Topics:  Holography  Lab-Optics and Photonics  Lasers  

Meet DDoSCoin, the Cryptocurrency that Pays When You P0wn

This article in the Register reports on the research conducted by CSE alum Eric Wustrow and CSE student Benjamin VanderSloot. They created a proof-of-work project built on cryptocurrency that offers a means to prove participation in distributed denial of service (DDoS) attacks. DDoSCoin allows miners to prove that they have contributed to a distributed denial of service attack against specific target servers. [Full Story]

Related Topics:  Alumni  Graduate Students  Lab-Software Systems  

New Cryptocurrency DDoSCoin Incentivizes Users for Participating in DDoS Attacks

The article reports on the new research paper by CSE alum Eric Wustrow and CSE student Benjamin VanderSloot. The researchers have put forward the concept of DDoSCoin a cryptocurrency with a malicious proof-of-work. Presented at the Usenix 2016 security conference, the researchers explain the DDoSCoin system which enables miners to select the victim servers by consensus using a proof-of-stake protocol. [Full Story]

Related Topics:  Alumni  Graduate Students  Lab-Software Systems  

Online voting could be really convenient. But its still probably a terrible idea.

This article reports on Internet voting availability in the US. It then examines Estonia's electronic voting system, which has been been hailed by some as a model system for secure electronic voting. Prof. J. Alex Halderman, who was part of a security team that documented failings in the Estonian system, disagrees and is quoted in the article. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Algorithms Can be More Fair than Humans

In this article in The Conversation, Prof. H. V. Jagadish talks about how algorithms can discriminate, even when their designers don't intend that to happen, but they also can make detecting bias easier. He states, While it is tempting to believe data-driven decisions are unbiased, research and scholarly discussion are beginning to demonstrate that unfairness and discrimination remain. [Full Story]

Related Topics:  Jagadish, HV  

Screen Savers: The World's Smallest Computer

The new episode of Screen Savers features Prof. David Blaauw, whose team has developed the world's smallest computer. The Michigan Micro Mote (M3) works as a fully functioning computer on the millimeter scale. [Full Story]

Related Topics:  Blaauw, David  Lab-Michigan Integrated Circuits (MICL)  Millimeter-scale Computing  Sylvester, Dennis  Wentzloff, David  

Hackers Fool Tesla Autopilot Into Making Obstacles 'Disappear' -- But Don't Panic About Crashes Yet

Wenyuan Xu, a visiting professor at CSE from the University of South Carolina, is part of a research team that has developed techniques for sabotaging the sensors for the autopilot in a Tesla. This article in Forbes describes how the research team used three forms of attack to tick the Tesla. [Full Story]

Hackers Fool Tesla S's Autopilot to Hide and Spoof Obstacles

Wenyuan Xu, a visiting professor at CSE from the University of South Carolina, is part of a research team that has developed techniques for sabotaging the sensors for the autopilot in a Tesla. This article in Wired describes how they simulated an attack from an adjacent car equipped with sensor jamming equipment. [Full Story]

CSE Researchers Win Pwnie Award for Work on DROWN Attack

A research team that includes CSE PhD student David Adrian and Prof. J. Alex Halderman has been awarded the Pwnie Award for Best Cryptographic Attack at the BlackHat conference for their work on the DROWN attack. DROWN is a serious vulnerability that affects HTTPS and other services that rely on SSL and TLS, some of the essential cryptographic protocols for Internet security. [Full Story]

Related Topics:  Graduate Students  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

How to Hack an Election in 7 Minutes

This in-depth article in Politico traces the history of "the Princeton group" -- a cadre of security experts, including Michigan's Prof. J. Alex Halderman, who grew out of Andrew Appel and Ed Felton's groups at Princeton and have influenced the conversation on the security of electronic voting. The article concludes with this remark from Halderman regarding the danger posed by state-sponsored cyber attackers: "We sit around all day and write research papers. But these people are full time exploiters. They're the professionals. We're the amateurs." [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

The Adventures of a Blissfully Unaware Bipedal Robot at the Grassy Wave Field

Evan Ackerman writes: "Grizzle says that when it comes to MARLO trying to conquer the 'devious undulations' of the Wave Field, 'we have gotten farther than I thought we would, to be honest.' This is the sort of thing we like to hear from researchers and dont, usually: pleasant surprise about how well their robot is performing. For more details on how MARLO managed to get this far, we asked him a few specific questions." [Full Story]

Related Topics:  Grizzle, Jessy  Lab-Systems  Robotics  

Tiny Computer Has Enormous Potential

"The Computer History Museum in Mountain View, Calif., has a new addition - one that is at the cutting edge of new computer technology. It isnt a breakthrough new powerhouse in computing, but instead a computer so small that one of the devices can sit on the edge of a coin." It's the Michigan Micro Mote! [Full Story]

Related Topics:  Lab-Michigan Integrated Circuits (MICL)  Millimeter-scale Computing  

Students from the United States visiting various work groups of BrainLinks-BrainTools this summer

Four undergrad students participating in the International Program for the Advancement of Neurotechnology (IPAN)'s summer bootcamp visited the cluster of excellence at Freiburg University in Germany. The students received training in modern neuroscience research and tools. IPAN and the study abroad program are directed by Prof. Euisik Yoon. [Full Story]

Related Topics:  Brain  International Prog. for the Adv. of Neurotechnology  Undergraduate Students  Yoon, Euisik  

The DNC Leak Shows How Vulnerable This Election Is To Hacking

Security experts including Prof. J. Alex Halderman are quoted in this article about the security risks associated with electronic voting. Many studies conducted by Prof. Halderman and his contemporaries have demonstrated that elections based on electronic voting are at risk of manipulation - often without detection. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

Reinforcement Renaissance

This article in Communications of the ACM reviews reinforcement learning and how it is complemented by deep learning in systems that aim to learn the way that humans do. Prof Satinder Singh Baveja is quoted in the article. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  Machine Learning  

National Robotics Initiative: Celebrating Five Years, Looking Ahead

Move over, C-3PO and R2-D2! You may have been robot celebrities during the glory years of Star Wars, but next-generation robotics are the new, 21st century superstars. A recent event on Capitol Hill celebrated the five-year anniversary of the National Robotics Initiative. It also provided an opportunity for NRI-funded research groups to both display their accomplishments, and also encourage Congress to maintain this critical funding mechanism for robotics in the United States. Prof. Jessy Grizzle attended with a display on his work. [Full Story]

Related Topics:  Grizzle, Jessy  Lab-Software Systems  Robotics  

R&D's Scientist of the Year - Starting 50 Years Ago with the Pioneer

50 years ago R&D Magazine chose its very first recipient of the prestigious Scientist of the Year Award Emmett Leith. The professor of electrical engineering at the University of Michigan was presented with the honor for co-inventing the three-dimensional holography, better known as the technology of laser to help create 3D photography. [Full Story]

Related Topics:  Holography  Lab-Optics and Photonics  

The Mr. Robot Hack Report: Ransomware and Owning the Smart Home

This article references work done by UM CSE researchers, led by Prof. Atul Prakash, who recently exposed vulnerabilities in the Samsung SmartThings platform that let them set off smoke alarms or even unlock doors. [Full Story]

Related Topics:  Lab-Software Systems  Prakash, Atul  Security (Computing)  

Clever Tool Shields Your Car From Hacks by Watching its Internal Clocks

In a paper they plan to present at the Usenix security conference next month, researchers led by Kang G. Shin, the Kevin and Nancy O'Connor Professor of Computer Science, describe an easy-to-assemble tool they call the Clock-based Intrusion Detection System, or CIDS. CIDS characterizes the clock inaccuracies of all of the processors in a car in order to spot the malicious messages that hackers use to take control of vehicle components like brakes and transmission. [Full Story]

Related Topics:  Automotive industry  Graduate Students  Lab-Software Systems  Security (Computing)  Shin, Kang G.  

Experimenting with Post-Quantum Cryptography

This Google blog post announces the company's decision to test post-quantum cryptography in Chrome, in which a small fraction of connections between desktop Chrome and Google's servers will use a post-quantum key-exchange algorithm in addition to the elliptic-curve key-exchange algorithm that would typically be used. The algorithm used in the test builds on work by Prof. Chris Peikert and his collaborators. [Full Story]

Related Topics:  Lab-Theory of Computation  Peikert, Chris  Quantum Computing  Security (Computing)  

Online voting would be disastrous because hackers could hijack the democratic process

This article frames the very real dangers of online voting and underscores them with examples from Prof. J. Alex Halderman's work in demonstrating weaknesses in the Estonian online voting system and Washington DC's 2010 attempt at an Internet voting system. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  Security (Computing)  

A Women's History of Silicon Valley

Too often, in Silicon Valley as in other places, women are involved in significant events, but their stories go untold. They are the cofounders who are not named in press articles. Check out this list of seven women who were key figures in the technologies that made Silicon Valley what it is today. Included on the list is Professor Emeritus Lynn Conway, who helped make large-scale chip production and innovation possible with her pivotal work on VLSI. [Full Story]

Related Topics:  Conway, Lynn  Women in Computing  

Google snaps up startup in push to master computer vision

The future of computer vision looks bright following a string of tech acquisitions in the field, most recently by Google. Jason Corso offers his perspective on the future of computer vision and the challenges researchers have yet to overcome. [Full Story]

Related Topics:  Computer Vision  Corso, Jason  Lab-Systems  

Tesla crash raises concerns about autonomous vehicle regulation

The fatal crash of a Tesla Motors Inc Model S in Autopilot mode has turned up pressure on auto industry executives and regulators to ensure that automated driving technology is deployed safely. Jason Corso says the product is meant to be a beta test, and that the crash is a wake-up call to a need for significant further study. [Full Story]

Related Topics:  Autonomous Vehicles   Computer Vision  Corso, Jason  Lab-Systems  

Why experts worry about the Tesla crash

Jason Corso told the Detroit Free Press that Tesla's recent autopilot crash is "not a major setback, but an indication of the work still to do." The crash, which resulted in one fatality, occured when neither the automated system nor the driver recognized the white side of the semi-truck against a brightly lit sky. [Full Story]

Related Topics:  Autonomous Vehicles   Computer Vision  Corso, Jason  Lab-Systems  

Thorny Technical Questions Remain for Net Neutrality

In this article in The Conversation, Prof. Harsha Madhyastha examines the principle of network neutrality and makes the case for scenarios in which ISPs should be able to treat some differing types of traffic unequally. [Full Story]

Related Topics:  Lab-Software Systems  Madhyastha, Harsha  Networks and Networking  

The Most Interesting Tech IPO of the Year

Twilio, founded by CS alumni Jeff Lawson, Evan Cooke, and John Wolthuis in 2007, went public on June 23 with shares closing up nearly 90 percent in the first day of trading. Quartz calls it "the most interesting tech IPO of the year." [Full Story]

Related Topics:  Alumni  Entrepreneurship  

James Freudenberg Takes Embedded Control Systems to Zurich

Prof. James Freudenberg taught his course, Embedded Control Systems, as a guest at the Swiss Federal Institute of Technology in Zurich, Switzerland. The school prepared a video highlighting the course, which provides a comprehensive overview of embedded control systems. [Full Story]

Related Topics:  Control Systems  Freudenberg, James S.  Lab-Systems  

Video of the week: Injectable radio broadcasts through flesh in real-time

The Engineer highlighted research by Prof. David Wentzloff and David Blaauw on an injectable radio that can broadcast from inside the human body. This latest advance will enable the relay of information in real-time to devices monitoring heart fibrillation as well as glucose monitoring for diabetics. [Full Story]

Related Topics:  Blaauw, David  Health  Lab-Michigan Integrated Circuits (MICL)  Medical diagnosis  Millimeter-scale Computing  Wentzloff, David  

U-M professors know wonders, risks of self-driving cars

This article in the Free Press examines the work of Profs. Edwin Olson and Ryan Eustice as they take on their new roles heading up key research areas at Toyota's new Ann Arbor Toyota Research Institute location. Prof. Olson will lead Toyota's the perception thrust and Prof. Eustice will lead the mapping/localization effort. [Full Story]

Related Topics:  Autonomous Vehicles   Lab-Artificial Intelligence  Olson, Edwin  

Sony Wants to Push AIs to Learn From Their Own Experiences

Sony has invested in AI startup Cogitai to build intelligent systems that will learn from their own experiences in the world. Prof. Satinder Singh, the co-founder of Cogitai, discusses continual learning and the future of intelligent systems. [Full Story]

Related Topics:  Artificial Intelligence  Baveja, Satinder Singh  Lab-Artificial Intelligence  

Malware Attacks Putting Patients' Medical Records at Risk

Prof. Kevin Fu talks to Michigan Radio about the recent news stories regarding some U.S. hospitals being hit by malware attacks. When hospitals are hit, patient records can be in danger. [Full Story]

Related Topics:  Fu, Kevin  Lab-Software Systems  Medical Device Security  

More Than 30 States Offer Online Voting, but Experts Warn it isnt Secure

This article revisits the question of online voting. Prof. Halderman cites a pilot project from six years ago in DC where the public was invited to attack a proposed Internet voting system. Halderman led a team that within 48 hours was able to gain nearly complete control of the server and change every vote. [Full Story]

Related Topics:  Digital Democracy  Halderman, J. Alex  Lab-Software Systems  

MARLO the bipedal robot makes worldwide news coverage with her new steps

Jessy Grizzle and his students have their latest two-legged robot, MARLO, walking well over difficult terrain. The story started out on popular tech blogs and magazines like Engadget, Popular Science, VICE Motherboard, Gizmag and CNET. It was also covered by international English language publications such as the Daily Mail, International Business Times, the BBC, and the Canadian Discovery Channel (Daily Planet show). Other international coverage included French, Danish and Czech sites. [Full Story]

Related Topics:  Grizzle, Jessy  Lab-Software Systems  Robotics  

Your Devices' Latest Feature? They Can Spy on Your Every Move

In The Converstation, Prof. HV Jagadish sheds light on how smart devices are a gateway for hackers to spy on you. Since devices are networked, they can communicate in ways we dont want them to and people can take control of these technologies to learn private information about you. [Full Story]

Related Topics:  Jagadish, HV  Lab-Software Systems  Security (Computing)  Security (national and personal safety)  

For Michigan Professor, Computer Science is Much More Than a Job

This article reports on Prof. Jason Mars and his work in developing technologies for intelligent personal assistants, from the software for the assistants themselves to the servers that are required to run such software. [Full Story]

Related Topics:  Lab-Artificial Intelligence  Lab-Computer Engineering (CE Lab)  Mars, Jason  

Show All