header for web
recent publications

Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems

Research depicting vulnerability of MEMS microphones light commands, November 2019.

Download the PDF | Website

Trick of Heat? Manipulating Critical Temperature-Based Control Systems Using Rectification Attacks

In Proceedings of the 26th ACM Conference on Computer and Communications Security (ACM CCS), November 2019.

Download the PDF | Conference

Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving

In Proceedings of the 26th ACM Conference on Computer and Communications Security (ACM CCS), November 2019.

Download the PDF | Conference 

IEEE Workshop on the Internet of Safe Things Poster

IoT Two-Factor Neurometric Authentication System using Wearable EEG: March 12, 2019

Visit Website

Archimedes Center for Medical Device Security 

Response to U.S House Energy and Commerce Committee Request for Information on Supported Lifetimes of Legacy Medical Technology: May 2018

Download the PDF 



Archimedes stands in solidarity. #blacklivesmatter #strongertogether

social injustice



Archimedes and the Design of Medical Devices Conference teamed up this week to bring followers: Hacking the Future of Healthcare presented by Nina Alli, Biohacking Village and Beau Woods, The Atlantic Council. Catch the recorded webinar here 


Our Leadership Workshop Webinar Series Launches June 3 for Archimedes Members!

webinar series Copy

Members, check your emails, follow us on Twitter and stay tuned for more information on joining us VIRTUALLY on June 3!


Dr. Kevin Fu's Conversation with UofM's Michigan Today on Probing Tech's Soft Underbelly

“Too often, people have a sense of complacency and a feeling that bad things can never happen,” Fu says.

Read the full article

Dr. Kevin Fu Contributes to Guidance on Decontamination N95 Masks During COVID-19 Pandemic.

“I think there’s a lot of uncertainty among the healthcare systems on the science behind different decontamination methods,” Fu said. “We provide a rigorous scientific assessment to reduce the uncertainty. There is no perfect method. Decision-makers need to make their own choices given their local circumstances and conditions.”

In this consortium, Fu was involved in co-organizing the interdisciplinary team and advising on regulatory science issues. Read more about the efforts of Fu in the article Guidance on decontaminating face masks: U-M researchers contribute to national effort released by the University of Michigan.

To learn more about the group N95DECON and their official research please visit www.n95decon.org


November 4, 2019
Kevin Fu speaks to NBC Nightly News about his team's discovery of a microphone vulnerability found in Siri, Alexa, and Google Home

The team’s work is presented in the paper “Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems,” with additional information online at  https://lightcommands.com/

September 17, 2019
University of Michigan students from the SPQR lab represent Archimedes at DEF CON 2019

def con collage

"Through Archimedes, Ben Cyr and I were able to attend DEFCON this year for the first time. For those that have not been to DEFCON, to say the least it is certainly a different kind of event due to the interesting talks, the mob of hackers stumbling around Vegas, hands-on security workshops, and the “villages” with direct access to products such as medical devices or voting machines. We knew we had truly arrived when an ambulance passed by and a random attendee commented on how “cool” it would be if someone had hacked a pacemaker.

In between the craziness described above, we managed to have several productive conversations with medical device manufacturers and attended several interesting talks — particularly at the Biohacking Village. This village included medical device themed talks, hands-on workshops, and a medical device lab. Ultimately, we spent the majority of our time at the medical device lab partially due to full physical access to examine (and hack) several of the devices. But even more importantly, we could talk medical device security with several software and hardware engineers from attending medical device companies. On our end, we believe the relationships and ideas born from these interesting interactions may lead to future research. Similarly, I believe these conversations may have helped these engineers consider new threat vectors. Overall, this experience was very fruitful and fulfilling, and we hope to attend next year and see more medical devices there!"

-Connor Bolton
Graduate Research Assistant
CSE  University of Michigan