Zhuoqing Morley Mao
Microphones that “hear” light; microprocessors that “tell” us secrets; self-driving cars that “see” fake objects; sensors that “feel” the wrong temperature. Our devices are under attack in new, increasingly sophisticated ways. Security researchers at CSE are exploring the limits of hardware and finding new, sobering vulnerabilities in our computers and homes.
Autonomous vehicles can be fooled to ‘see’ nonexistent obstacles
Vehicles that perceive obstacles that aren’t really there could cause traffic accidents.
New attack on autonomous vehicle sensors creates fake obstacles
Up to this point, no attacks had been discovered targeting a car’s LiDAR system—but a major new finding from researchers at the University of Michigan has demonstrated what that might look like.
CSE alum Qi Alfred Chen selected for ProQuest Dissertation Award
Chen’s dissertation research was dedicated to developing proactive defense approaches to the new security challenges of a hyper-connected world.
Using drones, a new software tool can bring LTE networks anywhere
SkyCore is a complete software solution to deploying mobile networks on unmanned drones
Connected cars can lie, posing a new threat to smart cities
The day when cars can talk to each other – and to traffic lights, stop signs, guardrails and even pavement markings – is rapidly approaching.
Michigan researchers discover vulnerabilities in next-generation connected vehicle technology
The vulnerability allows an attacker to manipulate a new intelligent traffic control algorithm and cause severe traffic jams.
Smartphone security hole
‘Open port’ backdoors are common.
Open ports act as security wormholes into mobile devices
Researchers have for the first time characterized a widespread vulnerability in the software that runs on mobile devices.
Qi Alfred Chen receives Rackham Predoctoral Fellowship for research into network and system security
Chen investigates how to develop defense approaches that can fundamentally address security challenges in existing and future smart systems.
Prof. Z. Morley Mao selected to receive CoE George J. Huebner, Jr. Research Excellence award
Prof. Mao has led inquiries into issues of Internet routing, measurement and security, wide-area and enterprise network management, malware behavior analysis and host-based security in general.
Michigan and Verisign researchers demonstrate new man-in-the-middle WPAD query attack
New security ramifications exist when laptops and smartphones configured for enterprise systems are used outside the enterprise in the realm of the wider web.
Michigan Researchers Win Best Poster Award at MobiSys 2015
It describes their work in measuring important network phenomena for debugging problems at the edge of a cellular network.
Two Michigan Papers Share the Best Paper Award at MobiSys 2015
In an unusual turn of events, we've tied with ourselves for this one.
Z. Morley Mao Receives Google Faculty Research Award
Mao’s goal was to create a diagnosis tool to achieve responsive and energy-efficient mobile apps that work well in diverse network conditions.
Shared Memory in Mobile Operating Systems Provides Ingress Point for Hackers
Sneak attack through smartphone shared memory
A weakness believed to exist in Android, Windows and iOS operating systems could be used to obtain personal information from unsuspecting users, research at the University of Michigan has shown.
Sanae Rosen Selected for Margaret Ayers Host Award
Mark Gordon selected for Google PhD Fellowship
2013 EECS Outstanding Achievement AwardsThese annual awards recognize faculty's outstanding accomplishments in teaching, research, and service.
Researchers demonstrate firewall vulnerability in cell network
RobustNet research group releases mobile app that measures 3G network performance
U-M and AT&T researchers develop energy efficiency profiling technology for mobile platforms
Z. Morley Mao Awarded VeriSign Grant for Mobile Internet Infrastructure Research
Yahoo! Expands M45 Supercomputing Initivative, selects U-M
The M45 program allows universities to conduct research otherwise impossible without the power and speed of an Internet-scale supercomputing resource.