CSE
CSE
CSE CSE

CSE News

What does Duo Security's sale mean for the Ann Arbor area and its tech industry?

This article summarizes the viewpoints of a number of people in Ann Arbor's tech scene -- including Prof. Jason Mars -- on the ramifications of the recent purchase of Ann Arbor unicorn Duo Security by Cisco. Duo was founded by CSE alumni Dug Song and Jon Oberheide; Mars is the co-founder of Ann Arbor AI startup Clinc. [Full Story]

Related Topics:  Alumni  

Introductory EECS course designed for women, those without prior experience embarks on first semester

This article provides an early glimpse of student experiences in EECS 198: Discover Computer Science. Taught by Prof. Rada Mihalcea and doctoral student Laura Wendlandt, the course provides a supportive atmosphere for students with more curiosity than experience in CS. [Full Story]

Hackers can spy on your computer screen just by listening to your webcam's microphone, experts warn

Prof. Daniel Genkin and a team of researchers discovered how hackers can spy on remote computers. LCD displays emit high-frequency sounds that can be recorded by a microphone, including from webcam, smartphone or smart speaker up to 30 ft away. These recordings are then fed into a machine learning algorithm and analyzed to generate an estimation of what's onscreen. [Full Story]

Related Topics:  Cybersecurity  Genkin, Daniel  Lab-Software Systems  Machine Learning  

Researchers find way to spy on remote screensthrough the webcam mic

Prof. Daniel Genkin and collaborators have investigated a potential new avenue of remote surveillance that they have dubbed "Synesthesia": a side-channel attack that can reveal the contents of a remote screen, providing access to potentially sensitive information based solely on "content-dependent acoustic leakage from LCD screens." All that is needed is audio picked up by webcam microphones. [Full Story]

Related Topics:  Cybersecurity  Genkin, Daniel  Lab-Software Systems  Machine Learning  

To cripple AI, hackers are turning data against itself

Data has powered the artificial intelligence revolution. Now security experts are uncovering worrying ways in which AIs can be hacked to go rogue. PhD student Kevin Eykholt talks to Wired. [Full Story]

Related Topics:  Artificial Intelligence  Graduate Students  Lab-Software Systems  Machine Learning  Prakash, Atul  

Art, Economics, and Engineering in Finland

Kamal Sarabandi, Rufus S. Teesdale Professor and Director of the Radiation Laboratory, took a week out of his packed schedule to accept an invitation to evaluate the progress of Aalto University in Finland. "It's important to see what other institutions around the world are doing, especially those that are daring to break with tradition," said Sarabandi. [Full Story]

Related Topics:  Sarabandi, Kamal  

Kickstarting the first year for women in computer science

The third annual CS KickStart gave 22 incoming women in CS a hands-on look at the skills and careers on offer in the world of computing. CS KickStart is a free week-long summer program for incoming first-year students that aims to improve the enrollment and persistence of women in CS and give women a voice in shaping the future through technology. [Full Story]

Related Topics:  Brehob, Mark  Das, Reetuparna  Diversity and Outreach  Ensafi, Roya  Laird, John  Undergraduate Students  

Cuba's "Sonic Attack" on the U.S. Embassy Could Have Been Merely Sounds Emitted by a Listening Device

A Penn bioengineer disputes a recent New York Times report suggesting microwaves accounted for what occurred at the U.S. embassy in Havana, agrees with hypothesis by Prof. Kevin Fu that the cause could have been ultrasound spy tech.

[Full Story]

Related Topics:  Fu, Kevin  Lab-Computer Engineering (CE Lab)  

Detecting Huntington's disease with an algorithm that analyzes speech

In an advance that could one day provide new insight into the progression of neurological diseases like Huntington's disease, Alzheimers and Parkinson's, researchers including Prof. Emily Mower Provost have demonstrated the first automated system that uses speech analysis to detect Huntington's disease. [Full Story]

Related Topics:  Big Data  Health and Safety  Lab-Artificial Intelligence  Machine Learning  Mower Provost, Emily  

Detecting Fake News With The Help Of An Algorithm

Prof. Rada Mihalcea recently developed an algorithm that can identify fake news stories better than humans. The algorithm uses linguistic clues to differentiate between factual and inaccurate stories. [Full Story]

Related Topics:  Big Data  Lab-Artificial Intelligence  Mihalcea, Rada  

Faster, cheaper gene sequencing to make healthcare more precise

Arun Subramaniyan, CSE PhD student, received a U-M 2018 Precision Health Scholars Award for his project, Hardware-accelerated systems for next-generation sequencing analysis. Subramaniyan is working with his advisor Prof. Reetuparna Das to make genome sequencing as affordable as a routine medical test with highly efficient computing. [Full Story]

Related Topics:  Das, Reetuparna  Graduate Students  Health and Safety  Lab-Computer Engineering (CE Lab)  

Fall 2018: Artificial Intelligence Application in Electrical Engineering

Course No.: EECS 598-014
Credit Hours: 3 credits
Instructor: Jared Chaar
Prerequisites: See instructor

Course Description:
The core concepts of AI and their applicability in Electrical Engineering are covered. Topics include search techniques and heuristics, logic and reasoning, knowledge representation, advanced planning, decisionmaking under uncertainty, andmachine learning. Using a number of these techniques and open source (Python) AI APIs, students will work in teams to implement the control components of an electric system.
[More Info]

Outstanding Postdoctoral Fellow Award for smart conversation tools

Jonathan Kummerfeld, postdoctoral fellow in CSE, has been recognized by U-M for his excellence in research, teaching, mentoring, service, and leadership. The Outstanding Postdoctoral Fellowship Award is given to 10 fellows each year. [Full Story]

Related Topics:  Lab-Artificial Intelligence  Lab-Interactive Systems  Language and Text Processing  

Algorithm outperforms humans at spotting fake news

An artificial intelligence system that can tell the difference between real and fake news often with better success rates than its human counterparts has been developed by Prof. Rada Mihalcea. Such a system may hep social media platforms, search engines, and news aggregators filter out articles meant to misinform. [Full Story]

Related Topics:  Artificial Intelligence  Big Data  Lab-Artificial Intelligence  Mihalcea, Rada  

Alumnus Rick Mario Riolo: In Memoriam

Rick Riolo, Research Professor Emeritus of the University of Michigan Center for the Study of Complex Systems, has been one of the most visible and influential researchers, mentors, and instructors in the interdisciplinary field of complex adaptive systems for four decades. The author of more than 80 papers, Riolo made substantial methodological and applied contributions. [Full Story]

Related Topics:  Alumni  

Alumnus Garlin Gilchrist named as running mate for Michigan Governor race

Garlin Gilchrist (BSE CE CS 2005) was named as running mate by Gretchen Whitmer in her bid for the Michigan Governorship. [Full Story]

Related Topics:  Alumni  

CSE welcomes 9 new faculty

Models of human behavior, scene understanding, cryptography, convolutional neural networks, IoT sensors and systems, and a commitment to innovating in the practice of education. With nine new faculty hires in 2018, Michigan is expanding and strengthening the scope of its research activities in computer science and engineering while simultaneously broadening participation in the field through a focus on innovation and inclusiveness in education. [Full Story]

Related Topics:  Lab-Artificial Intelligence  Lab-Computer Engineering (CE Lab)  Lab-Interactive Systems  Lab-Software Systems  Lab-Theory of Computation  

Google award to introduce women to computer science research

Prof. Rada Mihalcea and PhD student Laura Wendlandt have been awarded a Google grant to develop a workshop that will give undergraduate women in computer science valuable hands-on research experience. The workshop theyve proposed, spread over an entire semester, would engage around 70 undergraduate women in computing research through a series of hands-on activities and mentorship from research faculty. [Full Story]

Related Topics:  Diversity and Outreach  Graduate Students  Lab-Artificial Intelligence  Mihalcea, Rada  Women in Computing  

Kids at hacking conference show how easily US elections could be sabotaged

In this article, Prof. J. Alex Halderman is quoted on the problems that continue to exist with electronic voting, and why paper ballots should be used. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

Fall 2018: Topics in Hardware Security

Course No.: EECS 598-012
Credit Hours: 3 credits
Instructor: Daniel Genkin
Prerequisites: Prior experience in low level programming

Course Description:
The security of a system is only as good as its weakest link. Even if a system's software is perfectly secure, the complex interactions between the system's hardware and the physical world have not been properly understood. Side-channel attacks exploit unintentional, abstraction-defying leakage from physical devices (such as the device's power consumption, electromagnetic radiation or execution timing variations) to recover otherwise-unavailable secret information. In this class, we shall review recent papers in the area of side channel attacks and their mitigations.

Specific topics include (but not limited to):1. Physical side channel attacks such as power and electromagnetic analysis2. Microarchitectural attacks such as cache attacks, and Rowhammer3. Speculative execution attacks: Spectre, Meltdown and Foreshadow4. Side channel mitigations and countermeasures
[More Info]

Fall 2018: Engineering Interactive Systems for HCI

Course No.: EECS 598-013
Credit Hours: 3 credits
Instructor: Alanson Sample
Prerequisites:

Course Description:
Recent advances in the fields of Human-Computer Interaction and Ubiquitous Computing have focused on creating innovative devices and methods for user interaction, new ways of displaying information, and novel methods of sensing and understanding the state of users and their environment. This course will focus on both, reviewing the state-of-the-art of interactive systems and the technologies that enable them, as well as teaching the skills necessary to actually build these research prototypes.

Classroom instruction will focus on a review of current research topics and literature in technical HCI areas including interactive technologies, augmented reality, haptics, wearables, shape-changing interfaces, and more. Homework assignments will take the form of mini-projects designed to build hands-on skills in the use of laser cutters, 3D printers, sensing and signal acquisition circuits, embedded systems, PCB design, and machine learning for event and activity recognition. The class will culminate in a final project where teams of students will pitch, build, and demo a self-defined project using the skills developed in this course. In lieu of purchasing a course textbook, students will be expected to buy a lab kit.
[More Info]

Fall 2018: Election Cybersecurity

Course No.: EECS 498-009
Credit Hours: 4 credits
Instructor: J. Alex Halderman
Prerequisites: See instructor

Course Description:
Elections, the foundation of democracy, are increasingly subject to electronic attacks. Manipulation of social media, hacks against campaigns, and vulnerabilities in voting equipment create unprecedented risks.

This new course will examine the past, present, and future of election security, informed by perspectives at the intersection of computer science, law and public policy, politics, and international affairs.

We will study how elections can be attached and work to help defend them, using a broad range of technical and public policy tools.
[More Info]

Fake news detector algorithm works better than a human

An algorithm-based system that identifies telltale linguistic cues in fake news stories could provide news aggregator and social media sites like Google News with a new weapon in the fight against misinformation. Led by Prof. Rada Mihalcea, the researchers have demonstrated that its comparable to and sometimes better than humans at correctly identifying fake news stories. [Full Story]

Related Topics:  Artificial Intelligence  Big Data  Communications  Lab-Artificial Intelligence  Mihalcea, Rada  

Making online communication smarter with Trove Video

Trove is an Ann-Arbor based artificial intelligence startup built on the vision of improving communication using artificial intelligence. Profs. Danai Koutra and Walter Lasecki are collaborating with the company to develop novel methods and tools that will help make intelligent online communication smarter. [Full Story]

Related Topics:  Big Data  Communications  Koutra, Danai  Lab-Artificial Intelligence  Lasecki, Walter  

Two-wheeled teacher

Levi Weintraub (BSE CS 06) has lived on two wheels for close to two years now, putting his incredibly accomplished tech career on hold for an epic trans-African journey thats stoking his passion for travel and educating a cohort of aspiring African tech professionals. [Full Story]

Related Topics:  Alumni  Education  

Intel's SGX blown wide open by, you guessed it, a speculative execution attack

ARS Technica reports on the security work done by Michigan CSE researchers and their collaborators on a flaw in what was supposed to be a secure enclave in Intel chips. [Full Story]

Related Topics:  Cybersecurity  Genkin, Daniel  Graduate Students  Kasikci, Baris  Lab-Software Systems  Wenisch, Thomas  

Spectre-Like Flaw Undermines Intel Processors' Most Secure Element

Wired reports on the security work done by Michigan CSE researchers and their collaborators on a flaw in what was supposed to be a secure enclave in Intel chips. [Full Story]

Related Topics:  Cybersecurity  Genkin, Daniel  Graduate Students  Kasikci, Baris  Lab-Software Systems  Wenisch, Thomas  

Intel processor vulnerability could put millions of PCs at risk

A newly discovered processor vulnerability could potentially put secure information at risk in any Intel-based PC manufactured since 2008. It could affect users who rely on a digital lockbox feature known as Intel Software Guard Extensions, or SGX, as well as those who utilize common cloud-based services. CSE researchers contributed to the discovery of the security hole, called Foreshadow. [Full Story]

Related Topics:  Cybersecurity  Genkin, Daniel  Graduate Students  Kasikci, Baris  Lab-Software Systems  Wenisch, Thomas  

Hackers are out to jeopardize your vote

Cyberattacks on the 2016 US election caused states to bolster the defenses of their voting systems. Prof. J Alex Halderman explains why this hasn't been enough in this Q&A piece. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

Is Blockchain Technology the Future of Voting?

West Virginia is experimenting with voting via a blockchain network using smartphones. Prof. J. Alex Halderman cautions that such an approach is not yet truly viable, and that mobile voting using blockchain doesn't address core security problems that are unique to mobile voting. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

Heartland Tech Weekly: How Duo Security built a $2.35 billion company in Ann Arbor

Venture Beat reports on Ann Arbor unicorn Duo Security's sale to Cisco. It quotes company cofounder Dug Son (CS BS 1997) on why he and cofounder Jon Oberheide (CSE PhD 2011) made the sale, the future for Duo, and the impact expected for the Ann Arbor tech scene. [Full Story]

Related Topics:  Alumni  

Sounding the Alarm on the Dangers of Electronic Voting

Prof. J. Alex Halderman explains the dangers inherent with electronic voting machines, especially those without paperbackup, in the BloombergTV interview with Emily Chang. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

Michigan Data Science Team wrangles big data

The Michigan Data Science Team brings together students from many fields to get their hands dirty with real data science problems and tools. The team gives members a place to learn from experts, form groups to tackle data science challenges, and do research that matches their interests. In the 2018-19 school year, Computer Science and Data Science undergrad Wesley Tian will be leading the organization as president, with plans to focus the groups activities and provide a better learning experience for new members. [Full Story]

Related Topics:  Big Data  Graduate Students  Student Teams and Organizations  Undergraduate Students  

Cisco is buying Duo Security for $2.35B in cash

Cisco today announced its intention to buy Ann Arbor, MI-based security firm, Duo Security. Under the terms of the agreement, Cisco is paying $2.35 billion in cash and assumed equity awards for Duo. Duo Security was founded in 2010 by Dug Song (BS CS ) and Jonathan Oberheide (BS, MS, PhD CSE , , ) and went on to raise $121.M through several rounds of funding. The company has 700 employees with offices throughout the United States and in London, though the company has remained headquartered in Ann Arbor. [Full Story]

Related Topics:  Alumni  Cybersecurity  Entrepreneurship and Tech Transfer  

Voting systems in Wisconsin, a key swing state, can be hacked, security experts warn

This article at WisconsinWatch.org reports in detail on potential vulnerabilities in Wisconsin's voting system, including risks from Russian hacking. It reviews the response of Wisconsin politicians to this prospect as well as the viewpoints of computer scientists. Prof. J. Alex Halderman, an expert in computer, network, and election security, is highlighted in the story. [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

People are bad at spotting fake news. Can computer programs do better?

This article is a survey of the many projects dedicated to using computing power to identify fake news. It includes a description of work being done at Michigan by Veronica Perez-Rosas and her colleagues on the use of language in the posts regarding fake news. [Full Story]

Related Topics:  Artificial Intelligence  Lab-Artificial Intelligence  Perez-Rosas, Veronica  

Using software to beat Moore's Law: $9.5M to design the reconfigurable computer

In search of a new way to overcome the limitations of silicon, Prof. Ron Dreslinski is leading a project with a $9.5million DARPA grant to develop a hardware architecture and software ecosystem that together can approach the power of ASICs with the flexibility of a CPU. Called Transmuter, this software-defined hardware can change how programs use the hardware available to them in real time, effectively acting as a reconfigurable computer. [Full Story]

Related Topics:  Computer Architecture  Dreslinski, Ron  Integrated Circuits and VLSI  

Enabling anyone to design hardware with a new open-source tool

In a $6.5 million U-M-led project that could revolutionize and democratize designing hardware devices, Professors Wentzloff, Blaauw, Dreslinski, and Sylvester will work to create an open-source hardware compiler that aims to reduce the six month process of hand-designing analog circuits to a dramatically faster and automated 24-hour routine. [Full Story]

Related Topics:  Blaauw, David  Computer-Aided Design & VLSI  Dreslinski, Ron  Integrated Circuits and VLSI  Lab-Michigan Integrated Circuits (MICL)  Sylvester, Dennis  Wentzloff, David  

Michigan chips will be first to test next-generation hardware design tools

Professors Sylvester, Blaauw, and Dreslinski will test tools and provide feedback in a national program that aims to build free, open-source electronic design automation tools. [Full Story]

Related Topics:  Blaauw, David  Computer-Aided Design & VLSI  Dreslinski, Ron  Integrated Circuits and VLSI  Lab-Michigan Integrated Circuits (MICL)  Sylvester, Dennis  

Fall 2018: Computational Modeling in Human-Computer Interaction

Course No.: EECS 598-011
Credit Hours: 3 credits
Instructor: Nikola Banovic
Prerequisites: Programming experience in Java, Python, MATLAB or R

Course Description:
This seminar course will review current computational approaches to describe, simulate, and predict human behavior from empirical behavior traces data. It will contrast computational modeling with other methodologies to understand human behavior and compare computational modeling with existing behavior modeling methodologies in HumanFComputer Interaction (HCI). Short assignments will give students exposure to some of the cuttingFedge methods, while the final project will give them an opportunity to push the boundaries of computational modeling in HCI by modeling behaviors of their choice from an existing data set.
[More Info]

Making education accessible in rural India

CS student Divyansh Sharma is working to help combat the disadvantages of poverty in rural India with his non-profit startup EduTech Academy. Through EduTech, he and his team of ten developers are working to deliver free video courses directly to people in need of basic education. [Full Story]

Related Topics:  Education  Entrepreneurship and Tech Transfer  Undergraduate Students  

Student org brings investors to Michigan

A new student org at the University of Michigan wants to build new connections for the startups in southeast Michigan and give undergrads a look into the world of venture capital along the way. Called UpRound VC and co-founded by CS undergrad Jonah Erlich, the group works with national and local firms to accelerate the entrepreneurial ecosystem of the region. [Full Story]

Related Topics:  Alumni  Entrepreneurship and Tech Transfer  Student Teams and Organizations  Undergraduate Students  

The 5 States Most Vulnerable to a 2018 Election Hack

13 states are still using some electronic voting systems without paper backup. Five states rely upon them exclusively. According to Prof. J. Alex Halderman, "If a sophisticated nation state wants to cause chaos on Election Day, theyre probably already in our systems." [Full Story]

Related Topics:  Cybersecurity  Halderman, J. Alex  Lab-Software Systems  

University of Michigan to launch new website to help people navigate social media

EECS alumnus Garlin Gilchrist, executive director of the UM Center for Social Media Responsibility, says "it's time to reclaim your space." This is the message behind the center's new Social Integrity website, which is intended to help people to better navigate social media platforms. The site launched June 30. [Full Story]

Related Topics:  Alumni  

Michigan's first Science Olympiad invitational for students, by students

This year, the University of Michigan offered the state's first Science Olympiad invitational competition run by Olympiad alumni. Conceived of and organized in part by CS freshman Omar Al-Ejel, the inaugural U-M Science Olympiad gave 45 high school student teams a place to hone their craft and prep for the core competition. [Full Story]

Related Topics:  Student Teams and Organizations  Undergraduate Students  

Rick Bergman sees that Synaptics stays in touch

ECE alumnus Rick Bergman, CEO of Synaptics, talked to The Mercury News about Synaptics and its evolution into other areas beyond physical touchpads. "At the end of the day, what we like to do is make devices easier to use," said Bergman. Synaptics products are used by Apple, HP, Lenovo, and Samsung, among others. [Full Story]

Related Topics:  Alumni  

Tool for structuring data creates efficiency for data scientists

Transforming messy data into a usable state turns out to be labor-intensive and tedious. Traditionally, domain experts handwrite task-specific scripts to transform unstructured data. Enter Foofah, a project developed by CSE graduate students Zhongjun Jin and Michael Anderson, Prof. Michael Cafarella, and Bernard A. Galler Collegiate Professor of Electrical Engineering and Computer Science H.V. Jagadish that can help to minimize the effort and required background knowledge needed to clean up data. [Full Story]

Related Topics:  Big Data  Cafarella, Michael  Data and Computing  Graduate Students  Jagadish, HV  

Exploring the source of social stereotypes

Incoming CSE PhD student Wilka Carvalho has been selected for the GEM Fellowship under the sponsorship of Adobe. Carvalho plans to work with Profs. Satinder Singh Baveja, Honglak Lee, and Richard Lewis (Psychology) to pursue research at the intersection of reinforcement learning, machine learning, and computational cognitive science. [Full Story]

Related Topics:  Baveja, Satinder Singh  Brain  Graduate Students  Lee, Honglak  Machine Learning  

Mars Rover Team tackles major redesign, places in top 10 at competition

The U-M Mars Rover Team brought a new remote astronaut assistant to the University Rover Challenge in the desert of southern Utah, pulling off a 9th place finish out of 36 competing international teams and 3rd out of the US teams. [Full Story]

Related Topics:  Student Teams and Organizations  Undergraduate Students  

M-Fly's season ends with top-10 finishes, new autonomous plane

The M-Fly student aircraft design team provides undergraduates the opportunity to design, build, present, and test real-world aerospace projects. This year was extremely productive, with the team building more planes than ever, including its first autonomous craft. [Full Story]

Related Topics:  Student Teams and Organizations  Undergraduate Students  

All CSE News for 2018