Software Systems Lab
Software Systems Lab
Software Systems Lab Software Systems Lab

News

A Case Against Net Neutrality

In this opinion piece, Prof. Harsha Madhyastha makes that point that an entirely neutral net is not necessarily an efficient net. In order for us to operate optimally, he says we need to answer the question: How can we legally define the permissible ways an ISP could throttle or prioritize traffic in a manner that does not place undue burden on ISPs, yet is verifiable by third parties? [Full Story]

Related Topics:  Lab-Software Systems  Madhyastha, Harsha  Networking, Operating Systems, and Distributed Systems  

An armed robber's Supreme Court case could affect all Americans digital privacy for decades to come

Prof. HV Jagadish writes in this article for The Conversation about the data privacy challenges presented by a world in which our devices continuously record and track our activities. [Full Story]

Related Topics:  Big Data  Jagadish, HV  Lab-Software Systems  Mobile and Networked Computing  Security and Privacy (Computing)  

HV Jagadish Elected as Fellow of the American Association for the Advancement of Science

HV Jagadish, the Bernard A. Galler Collegiate Professor of Electrical Engineering and Computer Science and a distinguished scientist at the Michigan Institute for Data Science, has been elected as a fellow of the AAAS for distinguished contributions to database systems and many aspects of Big Data and data science, specifically for new ways to share data. [Full Story]

Related Topics:  Big Data  Data and Computing  Jagadish, HV  Lab-Software Systems  

Securing the vote: How 'paper' can protect US elections from foreign invaders

This story on security problems with voting quotes Prof. J. Alex Halderman, who says that "Although there is no evidence that any past election in the United States has been changed by hacking, it is in my opinion only a matter of time until one is." [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

VAuth tech feels your voice in your skin

This article describes VAuth, the new thechnology that supplements voice authorization developed in the lab of Prof. Kang G. Shin. [Full Story]

Related Topics:  Lab-Software Systems  Networking, Operating Systems, and Distributed Systems  Security and Privacy (Computing)  Shin, Kang G.  

Why the Krack Wi-Fi Mess Will Take Decades to Clean Up

This article quotes Prof. Kevin Fu, who says "For the general sphere of IoT devices, like security cameras, we're not just underwater. We're under quicksand under water." [Full Story]

Related Topics:  Fu, Kevin  Lab-Software Systems  Security and Privacy (Computing)  

Wearables to boost security of voice-based log-in

Voice authentication is easy to spoof. New technology could help close this open channel. [Full Story]

Related Topics:  Lab-Software Systems  Networking, Operating Systems, and Distributed Systems  Security and Privacy (Computing)  Shin, Kang G.  

Manos Kapritsos and Collaborators Win USENIX Security Paper Award

A team of researchers including Prof. Manos Kapritsos has won a Distinguished Paper Award at the 2017 USENIX Security Symposium for Vale, a new programming language and tool that supports flexible, automated verification of high-performance cryptographic assembly code. [Full Story]

Related Topics:  Kapritsos, Manos  Lab-Software Systems  Security and Privacy (Computing)  

'Learning Database' Speeds Queries from Hours to Seconds

University of Michigan researchers developed software called Verdict that enables existing databases to learn from each query a user submits, finding accurate answers without trawling through the same data again and again. Verdict allows databases to deliver answers more than 200 times faster while maintaining 99 percent accuracy. In a research environment, that could mean getting answers in seconds instead of hours or days. [Full Story]

Related Topics:  Big Data  Lab-Software Systems  Mozafari, Barzan  

Phone Browsing Could Become Faster, May Use Less Data With Smart Code

This article reports on Vroom, software developed by computer scientists including Prof. Harsha Madhyastha and CSE graduate student Vaspol Ruamviboonsuk. Vroom improves mobile browsing speed by optimizing the end-to-end interaction between smart devices and web servers. [Full Story]

Related Topics:  Lab-Software Systems  Madhyastha, Harsha  Mobile and Networked Computing  

Codeon is the Intelligent Assistant for Software Developers

Researchers, including Profs. Walter S. Lasecki and Steve Oney, and graduate students Yan Chen and Yin Xie have created Codeon, a system that enables more effective task hand-off between end-user developers and remote helpers by allowing asynchronous responses to on-demand requests. With Codeon, developers can request help by speaking their requests aloud within the context of their Integrated Development Environment. [Full Story]

Related Topics:  Lab-Artificial Intelligence  Lab-Software Systems  Lasecki, Walter  

Accelerating the Mobile Web: Vroom Software Could Double its Speed

Vroom software, developed by computer scientists including Prof. Harsha Madhyastha and CSE graduate student Vaspol Ruamviboonsuk, can dramatically speed the loading of webpages on mobile devices. [Full Story]

Related Topics:  Lab-Software Systems  Madhyastha, Harsha  Mobile and Networked Computing  

Kurator Will Help You Curate Your Personal Digital Content

People capture photos, audio recordings, video, and more on a daily basis, but organizing all these digital artifacts quickly becomes a daunting task. Automated solutions struggle to help us manage this data because they cannot understand its meaning. Profs. Walter Lasecki and Mark Ackerman have helped create Kurator, a hybrid intelligence system leveraging mixed-expertise crowds to help families curate their personal digital content. [Full Story]

Related Topics:  Ackerman, Mark  Lab-Artificial Intelligence  Lab-Software Systems  Lasecki, Walter  

Movie Design for Specific Target Audiences

Creating products that satisfy the market is critical to companies as it determines their success and revenue. Currently, experts use their judgment to estimate solutions to designing a new product that will satisfy customers, but this does not scale or allow leveraging massive datasets. Prof. Danai Koutra and her colleagues sought to identify how they can design new movies with features tailored to a specific user population. [Full Story]

Related Topics:  Koutra, Danai  Lab-Artificial Intelligence  Lab-Software Systems  

CRA Board Member Highlight: H. V. Jagadish

HV Jagadish, Bernard A. Galler Collegiate Professor of Electrical Engineering and Computer Science, has been profiled in the August issue of CRA's Computing Research News. [Full Story]

Related Topics:  Big Data  Jagadish, HV  Lab-Software Systems  

In fight for free speech, researchers test anti-censorship tool built into the internet's core

This article describes an implementation of TapDance, a method of anticensorship deployment that is built into the very core of the internet itself. By building TapDance into the servers and routers that underpin the Internet, censorship would become impractical. TapDance's development has been led by Prof. J. Alex Halderman. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

CHORUS: The Crowd-Powered Conversational Assistant

Prof. Walter Lasecki and his colleagues have developed a crowd-powered conversational assistant, Chorus, and deployed it to see how users and workers would interact together when mediated by the system. Chorus is capable of providing users with relevant responses instead of merely search results by recruiting workers on demand, who in turn decide what the best response is for each user sentence. [Full Story]

Related Topics:  Lab-Artificial Intelligence  Lab-Software Systems  Lasecki, Walter  

Social Interaction Patterns Provide Clues to Real Life Changes

Researchers including Prof. Danai Koutra have explored the dynamics of individual user interactions in social networks by creating iNET, a comprehensive analytic and visualization framework that provides personalized insights into user behavior. The researchers view their work as a first step towards fully exploring the amount and type of information that can be extracted from the online social footprint of a person. [Full Story]

Related Topics:  Koutra, Danai  Lab-Artificial Intelligence  Lab-Software Systems  

U.S. elections are an easier target for Russian hackers than once thought

This article on voting system security quotes Prof. J. Alex Halderman, who says of the prospect of election tampering that "the technical ability is there and we wouldn't be able to catch it. The state of technical defense is very primitive in our election system now." [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Heres exactly how Russia can hack the 2018 elections

Vulnerabilities in our voting system need to be addressed swiftly, according to experts in the field, including Prof. J. Alex Halderman. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Apps available for your smartphone could steal your personal information

WXYZ Detroit reports on work by UM researchers that has exposed dangerous open ports in mobile platforms that can be taken advantage of by hackers. [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Mao, Zhuoqing Morley  Mobile and Networked Computing  Security and Privacy (Computing)  

Let's Encrypt Issues 100 Millionth Security Certificate

The Internet is more secure thanks to Let's Encrypt, the certificate authority founded by Prof. J. Alex Halderman and his collaborators. Since launching in Jan. 2016, Let's Encrypt has issued 100 million certificates. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Prof. J. Alex Halderman Testifies in Front of Senate Intelligence Committee on Secure Elections

Prof. J. Alex Halderman testified in front of the Senate Intelligence Committee as a part of the broader Russian hacking investigation. His remarks focused vulnerabilities in the US voting system and a policy agenda for securing the system against the threat of hacking. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

How to prevent Russian hackers from attacking the 2018 election

In this commentary piece in the Chicago Tribune, Prof. J. Alex Halderman and Justin Talbot-Zorn make the case for a straightforward policy agenda to secure America's voting systems against the threat of hackers. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

If Voting Machines Were Hacked, Would Anyone Know?

In the article, Prof. J. Alex Halderman points out how electronic voting systems even those not connected to the Internet can be compromised. One path for hackers is to attack the computers that are used to program the ballots, which are later transferred to voting machines via memory cards. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Breakthrough for Large Scale Computing: Memory Disaggregation Made Practical

CSE researchers have introduced Infiniswap, the first system to scalably implement cluster-wide memory disaggregation, whereby the memory of all the servers in a computing cluster is transparently exposed as a single memory pool to all the applications in the cluster. [Full Story]

Related Topics:  Chowdhury, Mosharaf  Lab-Software Systems  Networking, Operating Systems, and Distributed Systems  Shin, Kang G.  Software Systems  

Brian Noble Named Chair of Computer Science and Engineering

Influential educator and computer scientist Brian Noble has been selected as the new chair of the Computer Science and Engineering division of the Department of Electrical Engineering and Computer Science at the University of Michigan. [Full Story]

Related Topics:  Lab-Software Systems  Noble, Brian  

Apple acquires AI company Lattice Data, a specialist in unstructured dark data, for $200M

CSE Prof. Michael Cafarella is a co-founder of the startup Lattice Data, which builds on statistical inference and machine learning to solve problems using dark data. Apple has acquired Lattice, which recently emerged from stealth mode, for $200M. [Full Story]

Related Topics:  Cafarella, Michael  Data and Computing  Lab-Software Systems  

Apple Just Acquired This Little-Known Artificial Intelligence Startup

CSE Prof. Michael Cafarella is a co-founder of the startup Lattice Data, which builds on statistical inference and machine learning to solve problems using dark data. Apple has acquired Lattice, which recently emerged from stealth mode, for $200M. [Full Story]

Related Topics:  Cafarella, Michael  Data and Computing  Lab-Software Systems  

Smartphone security hole: "Open port" backdoors are common

The College of Engineering reports on work by computer science security researchers which has revealed that so-called "open ports" are much more vulnerable to security breaches than previously thought. [Full Story]

Related Topics:  Lab-Software Systems  Mao, Zhuoqing Morley  Mobile and Networked Computing  Networking, Operating Systems, and Distributed Systems  Security and Privacy (Computing)  

Hundreds of popular Android apps have open ports, making them prime targets for hacking

This article reports on the work done by CSE researchers Yunhan Jack Jia, Qi Alfred Chen, Yikai Lin, Chao Kong, and Prof. Z. Morley Mao in characterizing a widespread vulnerability in popular Android apps. [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Mao, Zhuoqing Morley  Mobile and Networked Computing  Networking, Operating Systems, and Distributed Systems  Security and Privacy (Computing)  

Open Ports Create Backdoors in Millions of Smartphones

This article reports on work by CSE researchers who have characterized a widespread vulnerability in the software that runs on mobile devices which could allow attackers to steal contact information, security credentials, photos, and other sensitive data by using open ports to create backdoors. [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Mao, Zhuoqing Morley  Mobile and Networked Computing  Networking, Operating Systems, and Distributed Systems  Security and Privacy (Computing)  

An Obscure Flaw Creates Backdoors in Millions of Smartphones

CSE researchers have characterized a widespread vulnerability in the software that runs on mobile devices which could allow attackers to steal contact information, security credentials, photos, and other sensitive data, and also to install malware and to perform malicious code execution which could be used in large-scale attacks. [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Mao, Zhuoqing Morley  Mobile and Networked Computing  Networking, Operating Systems, and Distributed Systems  Security and Privacy (Computing)  

Hacking with Sound Waves

CSE researchers have demonstrated a new way of using sound to interfere with devices containing accelerometers, such as smartphones and self-driving cars. This presents a new avenue for hackers to use in compromising devices to steal information or disrupt communication. [Full Story]

Related Topics:  Embedded Computing and Systems  Fu, Kevin  Internet of Things  Lab-Computer Engineering (CE Lab)  Lab-Software Systems  Security and Privacy (Computing)  

Why India Needs A Paper Trail For Free And Fair Elections

This article in the Indian edition of the Huffington Post, references the work that Prof. J. Alex Halderman and his collaborators did in 2010 to demonstrate vulnerabilities in India's "tamper-proof" electronic voting machines. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Courage to Resist: The High-Stakes Adventures of J. Alex Halderman

This story by Randy Milgrom at the UM College of Engineering profiles Prof. J. Alex Halderman and his work in the area of Digital Democracy. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Open Ports Act As Security Wormholes Into Mobile Devices

Computer science and engineering researchers at the University of Michigan have for the first time characterized a widespread vulnerability in the software that runs on mobile devices which could allow attackers to steal contact information, security credentials, photos, and other sensitive data, and also to install malware and to perform malicious code execution which could be used in large-scale attacks. [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Mao, Zhuoqing Morley  Mobile and Networked Computing  Networking, Operating Systems, and Distributed Systems  Security and Privacy (Computing)  

The next cyberattack could render your anti-virus and encryption software useless

Researchers including Prof. Kevin Fu and CSE graduate student Timothy Trippel have demonstrated a new way of using sound to interfere with devices containing accelerometers, such as smartphones. This presents a new avenue for hackers to use in compromising devices to steal information or disrupt communication. [Full Story]

Related Topics:  Fu, Kevin  Lab-Computer Engineering (CE Lab)  Lab-Software Systems  Security and Privacy (Computing)  

Smartphone Accelerometers Can Be Fooled by Sound Waves

This article features work done by Prof. Kevin Fu and his collaborators in which they demonstrate a way to take control of or influence devices such as smartphones through the use of sound waves. [Full Story]

Related Topics:  Embedded Computing and Systems  Fu, Kevin  Internet of Things  Lab-Computer Engineering (CE Lab)  Lab-Software Systems  Security and Privacy (Computing)  

It's Possible to Hack a Phone With Sound Waves, Researchers Show

This article features work done by Prof. Kevin Fu and his collaborators in which they demonstrate a way to take control of or influence devices such as smartphones through the use of sound waves. The Department of Homeland Security is expected to issue a security advisory alert for affected chips. [Full Story]

Related Topics:  Embedded Computing and Systems  Fu, Kevin  Lab-Computer Engineering (CE Lab)  Lab-Software Systems  Security and Privacy (Computing)  

Sonic Cyber Attacks Show Security Holes in Ubiquitous Sensors

Sound waves can be used to hack into critical sensors used in a broad array of technologies including smartphones, automobiles, medical devices, and the Internet of Things, according to research performed by Prof. Kevin Fu, Prof. Peter Honeyman, CSE graduate student Timothy Trippel, and their collaborators at the University of South Carolina. [Full Story]

Related Topics:  Embedded Computing and Systems  Fu, Kevin  Graduate Students  Internet of Things  Lab-Computer Engineering (CE Lab)  Lab-Software Systems  Security and Privacy (Computing)  

Barzan Mozafari Named Morris Wellman Faculty Development Professor

Barzan Mozafari, assistant professor in Computer Science and Engineering, has been named a Morris Wellman Faculty Development Professor. The professorship is awarded to junior faculty members in recognition of outstanding contributions to teaching and research. [Full Story]

Related Topics:  Big Data  Data and Computing  Lab-Software Systems  Mozafari, Barzan  

Professor Who Urged an Election Recount Thinks Trump Won, but Voting Integrity Still Concerns Him

This article in the Chronicle of Higher Education includes a Q and A with Prof. J. Alex Halderman on the 2016 presidential election recount and on the challenges ahead for election integrity. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Harsha Madhyastha Selected for Google Faculty Award

Prof. Harsha V. Madhyastha has been awarded a 2017 Google Faculty Research Award for his work in enabling the deployment of low-latency web services in the cloud. It is his third research award from Google. [Full Story]

Related Topics:  Lab-Software Systems  Madhyastha, Harsha  Networking, Operating Systems, and Distributed Systems  Software Systems  Warehouse-Scale and Parallel Systems  

Inside the Recount

This story provides an in-depth, inside view of how the recount effort for the 2016 presidential election - of which Prof. J. Alex Halderman was a primary participant - was sparked, how it came to focus on three states, what the results showed, and what we can learn from it all. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Our Voting System Is Hackable by Foreign Powers

This article reviews the vulnerabilities that currently exist in our voting system. It references Prof. J. Alex Halderman, who has stated that he and his students could have changed the results of the November election. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

CSE and Local Community Turn Out For Science on Screen Movie and Lecture

On Wednesday, January 25, the U-M CSE and local Ann Arbor communities turned out for a special Science on Screen event at downtown Ann Arbor's Michigan Theater. The program included a screening of I Voted? and a lecture by Prof. J. Alex Halderman on security risks in America's election system and his analysis of the results from the 2016 presidential election recounts, which he helped to organize. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  

Z. Morley Mao Receives CoE George J. Huebner, Jr. Research Excellence Award

Prof. Z. Morley Mao has been selected to receive the George J. Huebner, Jr. Research Excellence Award from the College of Engineering for her work in the areas of mobile computing, security, networking, distributed systems, SDN, and cloud computing. [Full Story]

Related Topics:  Lab-Software Systems  Mao, Zhuoqing Morley  

The 2016 US Election Wasnt Hacked, but the 2020 Election Could Be

Prof. Alex Halderman is quoted in this article which reports on the recent Chaos Communication Congress. "Developing an attack for one of these machines is not terribly difficult," says Prof. Halderman. "I and others have done it again and again in the laboratory. All you need to do is buy one government surplus on eBay to test it out." [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Five things that got broken at the oldest hacking event in the world

Chaos Communications Congress is the world's oldest hacker conference, and Europe's largest. Every year, thousands of hackers gather in Hamburg to share stories, trade tips and discuss the political, social and cultural ramifications of technology. This story quotes Prof. J. Alex Halderman, who with his student Matt Bernhard, has studied the security of the past US presidential election. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Peter M. Chen to Serve as Interim Chair of Computer Science and Engineering

Prof. Peter M. Chen, Arthur F. Thurnau Professor of Electrical Engineering and Computer Science, will assume the role of Interim Chair of Computer Science and Engineering effective January 1, 2017. [Full Story]

Related Topics:  Chen, Peter M.  Lab-Software Systems  

Prof. Jason Flinn Named ACM Fellow for Contributions to Mobile Computing and Distributed Systems

Prof. Jason Flinn has been elected a Fellow of the Association for Computing Machinery (ACM) for contributions to mobile computing and reliable distributed systems. His research is in the area of operating systems, mobile computing, storage, and distributed systems. He is currently interested in creating software systems that allow concurrent programs to execute more reliably on multicore computers, as well as in enabling demanding applications to run on small, mobile computers and smartphones. [Full Story]

Related Topics:  Flinn, Jason  Lab-Software Systems  

Trump Allowed to Join Fight Against Pennsylvania Recount

A battle over whether or not a recount of ballots cast in Pennsylvania during the recent presidential campaign is taking place. In the case made for a recount, hackers could have easily infected Pennsylvanias voting machines with malware designed to lay dormant for weeks, pop up on Election Day and then erase itself without a trace, according to Prof. J. Alex Halderman. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Vote Recount Push Advances, but Reversing Trumps Win Is Unlikely

This article in the New York Times reports on the uneven progress toward recounts in three key states for the recent presidential election. Led by Green Party candidate Jill Stein, the recounts were inspired by a call from leading security experts, including Prof. J. Alex Halderman. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Computer scientists urge Clinton campaign to challenge election results

CNN reports that a group of top computer scientists, including Prof. J. Alex Halderman, have urged Hillary Clinton's campaign to call for a recount of vote totals in Wisconsin, Michigan and Pennsylvania. The computer scientists believe they have found evidence that vote totals in the three states could have been manipulated or hacked and presented their findings to top Clinton aides on a call last Thursday. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Trump election: Activists call for recount in battleground states

The BBC reports on the call by leading computer scientists, including Prof. J. Alex Halderman, for a recount of votes in the presidential election in three swing states. Their analysis shows that Clinton performed worse in counties that relied on electronic voting machines compared to paper ballots and optical scanners. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Want to Know if the Election was Hacked? Look at the Ballots

In this post, Prof. J. Alex Halderman sets the record straight regarding what he and other leading election security experts have actually been saying to the Clinton campaign and everyone else whos willing to listen. He describes a situation where malware could be a factor in the vote totals during the presidential election. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Experts Urge Clinton Campaign to Challenge Election Results in 3 Swing States

Leading computer security experts with an interest in election integrity, including Prof. J. Alex Halerman, have called for a recount of the votes cast in the presidential election in three key swing states. They believe they have found evidence that results in Wisconsin, Michigan, and Pennsylvania may have been manipulated. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

The Network Standard Used in Cars Is Wide Open to Attack

As automobiles grow increasingly computerized, the security of the network for in-vehicle communication is a growing security concern. New research by Prof. Kang G. Shin and graduate student Kyong-Tak Cho demonstrates that the controller area network (CAN) protocol implemented by in-vehicle networks has a new and potentially quite dangerous vulnerability. [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Networking, Operating Systems, and Distributed Systems  Security and Privacy (Computing)  Shin, Kang G.  

How Safe is Your Smart Home?

The Smart Home sounds like a great idea. But is it an unsafe home? "I would be cautious, overall," says Prof. Atul Prakash. "The technology is relatively new. Hardware is probably a little bit ahead of the software at this point, and a lot of vulnerabilities we are seeing are primarily on the software side of things." Read more and listen to the full interview here. [Full Story]

Related Topics:  Lab-Software Systems  Prakash, Atul  Security and Privacy (Computing)  

A Lot Of Voting Machines Are Broken Across America (But It's Totally Normal)

Forbes reports on numerous reports of broken machines causing epic queues and peeving voters. Matt Bernhard, CSE graduate student and an expert on the security of electoral systems, says that "This year isn't that different, other than I'm expecting higher turnout which may stress the infrastructure more." [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Security and Privacy (Computing)  

US election: Experts keep watch over 'hack states'

"Unless the election is extraordinarily close, it is unlikely that an attack will result in the wrong candidate getting elected," suggest CSE graduate student Matt Bernhard and Prof. J. Alex Halderman. But they say the risk the election process could be disrupted by hackers should be taken extremely seriously. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Harsha Madhyastha Selected for Facebook Faculty Award

Prof. Harsha V. Madhyastha has been selected as the recipient of a Facebook Faculty Award for his work in distributed systems and computer networking. His recent research has focused on enabling latency-sensitive web services to optimize user experience. [Full Story]

Related Topics:  Lab-Software Systems  Madhyastha, Harsha  Networking, Operating Systems, and Distributed Systems  

US Election Systems Seen 'Painfully Vulnerable' to Cyberattack

This article sheds light on potential cyberattacks during the U.S election. Some cybersecurity analysts warned that hackers of even moderate talent could possibly throw the results of the 2016 presidential election into chaos. Prof. Halderman hopes all the attention on voting-system vulnerabilities will motivate state governments to invest in cybersecurity for the 2020 elections. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Next Weeks Anticipated U.S. Election

This article discusses the vulnerabilities of direct recording electronic voting systems. It quotes Prof. J. Alex Halderman and his colleagues on the security of DREs. Twenty-nine states still use DREs and five states: Delaware, Georgia, Louisiana, New Jersey and South Carolina, use the easily compromised machines without a paper trail. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Forget rigged polls: Internet voting is the real election threat

Prof. J. Alex Halderman and his contemporaries have been tireless in warning us of the security risks associated with internet voting. Will we listen? [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

The Security Challenges of Online Voting Have Not Gone Away

This guest post on IEEE Spectrum by CSE graduate student Matthew Bernhard, Prof. J. Alex Halderman, and Robert Cunningham, Chair of the IEEE Cybersecurity Initiative, lays out the details for the case against Internet voting. [Full Story]

Related Topics:  Graduate Students  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

How the 2016 Election Could Be Hacked (story+video)

Is our voting system really vulnerable to hackers? Professor of computer science, J. Alex Halderman, explains the situation to VICE News in this segment that originally aired on October 24. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

$800K in Research Awards Aim to Address Data Science

Four research teams from the University of Michigan and Shanghai Jiao Tong University in China are sharing $800,000 in awards to use data science techniques to address big challenges. Prof. Atul Prakash is co-PI for a project that aims to develop algorithms and mechanism design to incentivize users to charge electric vehicles at appropriate times and locations, leading to better load management, a more reliable grid, and cost savings. [Full Story]

Related Topics:  Big Data  Electric Vehicles and HEVs  Lab-Software Systems  Prakash, Atul  Security and Privacy (Computing)  

Using cyber security to keep your ballot safe ahead of the presidential election

This TV news segment features an interview with CSE graduate student Matthew Bernhard. He is interviewed about the possibility for stolen votes in the upcoming election. His answer: Michigan has a paper ballot/optical scan system, which is considered best practice. Touchscreen, paperless systems like those in Ohio, Virginia, and some other states are not secure enough yet. [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Security and Privacy (Computing)  

How to (Really) Steal an Election (audio)

Prof. J. Alex Halderman is interviewed on the dangers posed by electronic voting in this story. The story covers all types of concerns regarding elections, from Donald Trump's warning of a rigged election through the Bush v. Gore contest and the use of electronic voting systems. Halderman appears at about 20:15. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Matthew Bernhard on the Steve Gruber Show (audio)

Matthew Bernhard, a CSE graduate student working with Prof. J. Alex Halderman, speaks on the Steve Gruber Show about the possibility for voting fraud in Michigan during the upcoming election. He is introduced just over one minute into the show. [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Security and Privacy (Computing)  

Rigging the Election

Jason Smith, writer and director of the documentary "I Voted?", references work done by Prof. J. Alex Halderman in demonstrating the vulnerabilities of electronic voting systems in this opinion piece. Mr. Smith's mission has been to reinforce the message that "Nothing is more important to the future of our democracy than ensuring the integrity of all elections." [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

This Is Why We Still Cant Vote Online

This article highlights the work done by security researchers to demonstrate the dangers inherent in the use of paperless electronic voting systems. It spotlights work done by Prof. J. Alex Halderman and his students in 2010, when they accepted a challenge to hack Washington DC's proposed new Internet system. The research team was able to hack the system, steal records, and modify it to play the Michigan fight song -- all in less than two days. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Experts: State Should Audit Election Results

Since hackers have targeted the election systems of more than 20 states, cyber-security experts including Prof. J. Alex Halderman say Michigan should change its policy and routinely audit a sample of its paper ballots to protect against election fraud. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Why Can't We Vote Online?

This article on the security concerns associated with Internet voting points to the 2010 hack of the District of Columbia's internet voting system by researchers led by Prof. J. Alex Halderman as a prime example of what could go wrong. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Technology Will Destroy Democracy Unless This Man Stops It

This article provides an in-depth profile of Prof. J. Alex Halderman and his research in the area of security, in particular his work in exposing the security vulnerabilities of electronic voting systems and his additional work in the area of internet anticensorship. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Cybersecurity and Voting Machine Security (video)

Prof. J. Alex Halderman appeared on C-SPAN to discuss vulnerabilities associated with electronic voting and to answer viewer questions. It's worth viewing this 40-minute video segment of the C-SPAN airing. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Shadows in the Dark Web

Secrets lurk in the dark web, the 95 percent of the internet that most of us can't see. Prof. Michael Cafarella is bringing some of those secrets to light, and in the process making the digital and the real world a little safer. [Full Story]

Related Topics:  Big Data  Cafarella, Michael  Lab-Software Systems  

Sang Won Lee Receives Award for Best Student Composition at the International Computer Music Conference

CSE PhD candidate Sang Won Lee has received the 2016 Student Music Award for best student composition at the International Computer Music Conference in Utrecht, the Netherlands for his composition "Live Writing: Gloomy Streets." This performance is an outcome coming from his interdisciplinary research work, Live Writing, which transforms asynchronous written communication into a real-time experience in the context of programming, writing and performing arts. [Full Story]

Related Topics:  Graduate Students  Lab-Software Systems  Lasecki, Walter  

A Brief Chronology of Medical Device Security

This article in the Communications of the ACM, co-written by Prof. Peter Honeyman, reviews the current era of cyber threat to medical device security. The article concludes with a look forward at steps necessary to secure medical devices. [Full Story]

Related Topics:  Honeyman, Peter  Lab-Software Systems  Medical Device Security  

Despite Flaws, Paperless Voting Machines Remain Widespread in the U.S.

This article surveys problems associated with aging and insecure electronic voting systems. It quotes Prof. J. Alex Halderman, a leading researcher in this area, as saying, "Clearly we still have a long way to go to ensure that all Americans have access to a form of voting technology they can trust." [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Meet the New Director of Michigan Robotics

Jessy Grizzle, the Elmer G. Gilbert Distinguished University Professor and Jerry W. and Carol L. Levin Professor of Engineering, has been written about in Wired, his work featured on CNN and The Discovery Channel, and his robot videos viewed around the world even in Michigan Stadium during the football games. He's now the new director of Michigan Robotics. [Full Story]

Related Topics:  Grizzle, Jessy  Lab-Software Systems  Robotics and Autonomous Systems  

Paperless voting could fuel 'rigged' election claims

This article describes the concern that talk of a potentially "rigged" election could undermine confidence in results. Amongst the issues associated with electronic voting is that many systems do not produce paper backups that could be used for verification, according to Prof. J. Alex Halderman, who is quoted in the article. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Expert Questions Claim That St. Jude Pacemaker Was Hacked

This article reports on the work done by Prof. Kevin Fu and his collaborators, which has called into question the allegations of security flaws in St. Jude Medical's pacemakers and other life-saving medical devices. The claim of security holes was made by short-selling investment research firm Muddy Waters Capital LLC and medical device security firm MedSec Ltd [Full Story]

Related Topics:  Fu, Kevin  Lab-Software Systems  Security (national and personal safety)  

An experimental policing tool is gaining traction across the country and there are major civil-liberties concerns

This article on the use of data for predictive policing points to the possibility that those practices could lead to racial profiling and aggressive policing. It quotes HV Jagadish, Bernard A. Galler Professor of Electrical Engineering and Computer Science, on the subject. He suggests that police departments haven't struck the right balance between more efficiently targeting crime and avoiding civil-liberties conflicts. [Full Story]

Related Topics:  Big Data  Jagadish, HV  Lab-Software Systems  

Guarding Presidential Election Vote Integrity Presents a Daunting Task

Prof. J. Alex Halderman is quoted in this article regarding election integrity. He points out that any election system must be able to prove that results are accurate in order to dispel concerns about vote rigging. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

New Concerns About Hacks Into State Voting Systems

Prof. J. Alex Halderman was a guest on the Diane Rehm show on August 31, where the conversation included discussion of the security of elections. Click the "Listen" button under the headline to hear the interview; the discussion with Prof. Halderman begins at 20:30. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

How Electronic Voting Could Undermine the Election

Foreign hackers, domestic hackers, those with physical access to voting machines, and those who attack from afar: this article describes the multiple risks associated with electronic voting and highlights the work of Prof. J. Alex Halderman in making this clear to us. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Meet DDoSCoin, the Cryptocurrency that Pays When You P0wn

This article in the Register reports on the research conducted by CSE alum Eric Wustrow and CSE student Benjamin VanderSloot. They created a proof-of-work project built on cryptocurrency that offers a means to prove participation in distributed denial of service (DDoS) attacks. DDoSCoin allows miners to prove that they have contributed to a distributed denial of service attack against specific target servers. [Full Story]

Related Topics:  Alumni  Graduate Students  Lab-Software Systems  

Online voting could be really convenient. But its still probably a terrible idea.

This article reports on Internet voting availability in the US. It then examines Estonia's electronic voting system, which has been been hailed by some as a model system for secure electronic voting. Prof. J. Alex Halderman, who was part of a security team that documented failings in the Estonian system, disagrees and is quoted in the article. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

New Cryptocurrency DDoSCoin Incentivizes Users for Participating in DDoS Attacks

The article reports on the new research paper by CSE alum Eric Wustrow and CSE student Benjamin VanderSloot. The researchers have put forward the concept of DDoSCoin a cryptocurrency with a malicious proof-of-work. Presented at the Usenix 2016 security conference, the researchers explain the DDoSCoin system which enables miners to select the victim servers by consensus using a proof-of-stake protocol. [Full Story]

Related Topics:  Alumni  Graduate Students  Lab-Software Systems  

Peter Honeyman Receives USENIX Test of Time Award

Prof. Peter Honeyman and CSE alumnus Niels Provos have received the USENIX Test of Time Award for their paper on privilege separation, a generic approach that lets parts of an application run with different levels of privilege. They share this award with co-author Markus Friedl. The USENIX Test of Time Awards recognizes papers presented at its respective conference from at least 10 years ago that have had a lasting impact on their fields. [Full Story]

Related Topics:  Honeyman, Peter  Lab-Software Systems  

Several Michigan Papers Presented at 2016 USENIX Security Symposium

Five papers authored by CSE researchers were presented at the 2016 USENIX Security Symposium, which took place August 10-12 in Austin, TX, and two papers were presented at WOOT 2016. USENIX Security brings together researchers from both academia and industry interested in the latest advances in the security of computer systems and networks. The symposium is a premier venue for security and privacy research. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Prakash, Atul  Shin, Kang G.  

Researchers David Adrian and Prof. J. Alex Halderman Receive Pwnie Award for Work on DROWN Attack

A research team that includes CSE PhD student David Adrian and Prof. J. Alex Halderman has been awarded the Pwnie Award for Best Cryptographic Attack at the Black Hat conference for their work on the DROWN attack. DROWN allows attackers to break encryption used to protect HTTPS websites and read or steal sensitive communications, including passwords, credit card numbers, trade secrets, or financial data. [Full Story]

Related Topics:  Graduate Students  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

How to Hack an Election in 7 Minutes

This in-depth article in Politico traces the history of "the Princeton group" -- a cadre of security experts, including Michigan's Prof. J. Alex Halderman, who grew out of Andrew Appel and Ed Felton's groups at Princeton and have influenced the conversation on the security of electronic voting. The article concludes with this remark from Halderman regarding the danger posed by state-sponsored cyber attackers: "We sit around all day and write research papers. But these people are full time exploiters. They're the professionals. We're the amateurs." [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

CSE Researchers Win Pwnie Award for Work on DROWN Attack

A research team that includes CSE PhD student David Adrian and Prof. J. Alex Halderman has been awarded the Pwnie Award for Best Cryptographic Attack at the BlackHat conference for their work on the DROWN attack. DROWN is a serious vulnerability that affects HTTPS and other services that rely on SSL and TLS, some of the essential cryptographic protocols for Internet security. [Full Story]

Related Topics:  Graduate Students  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)  

Summer Bootcamp Prepares Undergraduates for Work with Big Data

The Big Data Summer Bootcamp, a six-week interdisciplinary training and research program co-designed by Prof. Barzan Mozafari and his collaborators from other departments, has given students from around the country a comprehensive overview of the field of big data. [Full Story]

Related Topics:  Lab-Software Systems  Mozafari, Barzan  

With Over 7 Million Certificates Issued, Let's Encrypt Aims to Secure the Entire Web

Let's Encrypt, the non-profit certificate authority founded by Prof. J. Alex Halderman with colleagues at Mozilla and Electronic Frontier Foundation, is well on its way to securing the web. By making the switch to HTTPS free and easy, Let's Encrypt has issued over 7 million certificates since December 2015. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Networking, Operating Systems, and Distributed Systems  Security (national and personal safety)  

The DNC Leak Shows How Vulnerable This Election Is To Hacking

Security experts including Prof. J. Alex Halderman are quoted in this article about the security risks associated with electronic voting. Many studies conducted by Prof. Halderman and his contemporaries have demonstrated that elections based on electronic voting are at risk of manipulation - often without detection. [Full Story]

Related Topics:  Halderman, J. Alex  Lab-Software Systems  Security and Privacy (Computing)