Welcome to the Center for Computer Security and Society (C2S2)
The Center for Computer Security and Society (C2S2) is an interdisciplinary center based at the University of Michigan. The center is dedicated to the investigation of emerging threats to critical embedded systems and networks, and on the impact of cyber security attacks on critical infrastructure, governments, and sensitive data.
The science behind election security
How one professor is working toward more secure voting technology.Hacked voting machine donated to Henry Ford museum
The machine was used by Prof. J. Alex Halderman for election cybersecurity research, and in a demonstration during which then-Senator Kamala Harris voted on it.Andrew Wintenberg awarded Predoctoral Fellowship to support research impacting the safety of smart systems
Wintenberg is developing computer algorithms and tools to improve the security of cyber and cyber-physical systems.Six ECE faculty will help shape the future of semiconductors as part of the JUMP 2.0 program
Elaheh Ahmadi, David Blaauw, Michael Flynn, Hun-Seok Kim, Hessam Mahdavifar, and Zhengya Zhang bring their expertise and creativity to this nationwide undertaking in the area of semiconductors and information & communication technologies.U-M spin-off Agita Labs releases always encrypted computing product
TrustForge, based on U-M research spearheaded by Austin and Bertacco, provides users with the ability to protect data using a process called sequestered encryptionZ. Morley Mao elected IEEE fellow for contributions to performance and security of internet routing and mobile systems
Prof. Mao and her students have played an important role in understanding the efficiency, security, and performance of a number of mobile systems.Five ways to keep vaccine cold storage equipment safe from hackers
A medical security expert outlines the risks and how hospitals can protect themselves.Embracing Risk: Cyber insurance as an incentive mechanism for cybersecurity
This new book by Mingyan Liu offers an engineering and strategic approach to improving cybersecurity through cyber insuranceHer fight for your rights
Less nosy smart speakers
Election lessons from Michigan
First IFIP Workshop on Intelligent Vehicle Dependability and Security
The workshop, co-organized by a team including two EECS faculty, focused on ensuring the safety of Level 3 autonomous vehicles, where humans must be ready to take over control.Hacking reality
After five years, Let’s Encrypt, a non-profit based on tech developed at Michigan, has helped to secure the internet
Major side-channel discovery wins NSA contest
Censored Planet: Tracking internet censorship without on-the-ground participation
5 ways Americans can keep their vote secure and accurate
Burn after reading
CSE researchers help organize 10th anniversary workshop on internet freedom
$1.8M DARPA project aims to protect cars, trucks and spacecraft from hackers
New collaboration promises greater innovation in medical device security
New remote voting risks and solutions identified
IEEE security conference features six accepted papers from CSE researchers
Catching nuclear smugglers: fast algorithm could enable cost-effective detectors at borders
Xueru Zhang awarded Rackham Predoctoral Fellowship
Rackham Predoctoral Fellowship for design of robust, reliable and repairable software systems
Autonomous vehicles can be fooled to ‘see’ nonexistent obstacles
Todd Austin Named S. Jack Hu Collegiate Professor of Computer Science and Engineering
Real-time monitor tracks the growing use of network filters for censorship
Not enough voters detecting ballot errors and potential hacks, study finds
Researchers design new solution to widespread side-channel attacks
How Let’s Encrypt doubled the percentage of secure websites in four years
How Russia’s online censorship could jeopardize internet freedom worldwide
Researchers take control of Siri, Alexa, and Google Home with lasers
Offensive vehicle security toolbox makes car hacking easier
New tool combats evolving internet censorship methods
Year of vulnerability hunting uncovers potential attacks on Intel Chips, RAM
All three of these attacks put users’ privacy at risk, exploiting new routes to sensitive data.Remote attack on temperature sensors threatens safety in incubators and industry
PET Award for making privacy policies easier to read
Best paper award for analysis of a decade of malware reports
Computer vision: Finding the best teaching frame in a video for fake video fightback
Michigan’s new Election Security Commission holds inaugural meeting on U-M Campus
Halderman co-chairs new commission to protect Michigan votes
Election security: Halderman recommends actions to ensure integrity of US systems
Facebook Fellowship for research on web privacy, security, and censorship
Online censorship detector aims to make the internet a freer place
Time-varying metamaterials for next generation communication, sensing, and defense systems
Study reveals new data on region-specific website blocking practices
A secure future for US elections starts in the classroom
Tyche: A new permission model to defend against smart home hacks
Intel processor vulnerability could put millions of PCs at risk
Undocumented immigrants’ privacy at risk online, on phones
Building a security standard for a post-quantum future
Zuckerberg Capitol Hill testimony: Engineering experts offer comments
‘I hacked an election. So can the Russians.’
Michigan researchers discover vulnerabilities in next-generation connected vehicle technology
CSE PhD student Matt Bernhard on the Facebook data breach
Can sound be used as a weapon? 4 questions answered
Cuba ‘sonic attacks’: A covert accident?
Chat tool simplifies tricky online privacy policies
A shoe-box-sized chemical detector
FCC repeals net neutrality: Engineering experts offer comments
An armed robber’s Supreme Court case could affect all Americans’ digital privacy for decades to come
Manos Kapritsos and collaborators win USENIX security paper award
Prof. J. Alex Halderman testifies in front of senate intelligence committee on secure elections
Smartphone security hole
Behzad Yektakhah earns paper award for research in seeing through walls
Sonic cyber attacks show security holes in ubiquitous sensors
Professor to Congress: ‘Internet of Things security is woefully inadequate’
Peter Honeyman receives USENIX Test of Time Award
Several Michigan Papers Presented at 2016 USENIX Security Symposium
A total of five papers authored by CSE researchers were presented.Researchers David Adrian and Alex Halderman receive Pwnie Award for work on DROWN attack
With over 7 million certificates issued, Let’s Encrypt aims to secure the entire web
Two Michigan papers win top awards at IEEE Security and Privacy Symposium
Michigan and Verisign researchers demonstrate new man-in-the-middle WPAD query attack
Hacking into homes: Security flaws found in SmartThings connected home system
Passwords, privacy and protection: Can Apple meet FBI’s demand without creating a ‘backdoor’?
Secure your website now: Let’s Encrypt enters Public Beta
Michigan Researchers Win the 2016 Applied Networking Research Prize
Computer Scientists Win Best Paper Award at ACM Conference on CCS for Exposing the Vulnerabilities of the Diffie-Hellman Key Exchange
J. Alex Halderman and Collaborators Receive NSF Cybersecurity Award to Develop Rapid-Response Architecture
Virta Labs Introduces PowerGuard™
Thomas Chen earns NSF Graduate Research Fellowship for research in artificial neural networks for computer vision
Security Flaw in New South Wales Puts Thousands of Online Votes at Risk
Yi-Chin Wu receives ProQuest Distinguished Dissertation Award for research in network security
Computer science researchers aim to securely encrypt every website
Computer Scientists Win Best Paper Award at 2014 ACM Internet Measurement Conference
Yelin Kim wins Best Student Paper Award at ACM Multimedia 2014 for research in facial emotion recognition
Kamal Sarabandi elected President of IEEE Geoscience and Remote Sensing Society
Becky Peterson awarded DARPA Young Faculty Award to investigate new materials for power semiconductor devices
Pallab Bhattacharya to receive 2015 IEEE David Sarnoff Award
Shrinking the size of optical systems, exponentially
Iranian internet censorship system profiled for first time
When GPS fails, this speck of an electronic device could step in
New laser shows what substances are made of; could be new eyes for military
After Newtown: A new use for a weapons-detecting radar?
James McCullagh receives Best Student Paper Award for research to keep bridges safe
Michael Bailey receives Research Faculty Recognition Award from OVPR
His research is focused on the security and availability of complex distributed systems.Computer scientists win Best Paper Award at 21st USENIX Security Symposium
Halderman’s “Securing Digital Democracy” opens on Coursera
Computer scientists named runners up for PET Award
Duo of CSE Alums Form and Grow Security Company in Ann Arbor
Researchers demonstrate firewall vulnerability in cell network
J. Alex Halderman to Teach Course on Electronic and Internet Voting through Coursera
The 5-week course will provide the technical background and public policy foundation that today’s citizens need to understand the electronic voting debate.Prof. J. Alex Halderman featured in PBS story on the security of internet voting
CSE Alum Jon Oberheide Named One of Forbes’ 30 Under 30 in Technology
‘Perfect black’ coating can render a 3D object flat, raises intriguing dark veil possibility in astronomy