Our Leadership Workshop Webinar Series Launches June 3 for Archimedes Members!
Members, check your emails, follow us on Twitter and stay tuned for more information on joining us VIRTUALLY on June 3!
Dr. Kevin Fu's Conversation with UofM's Michigan Today on Probing Tech's Soft Underbelly
“Too often, people have a sense of complacency and a feeling that bad things can never happen,” Fu says.
Read the full article
Dr. Kevin Fu Contributes to Guidance on Decontamination N95 Masks During COVID-19 Pandemic.
“I think there’s a lot of uncertainty among the healthcare systems on the science behind different decontamination methods,” Fu said. “We provide a rigorous scientific assessment to reduce the uncertainty. There is no perfect method. Decision-makers need to make their own choices given their local circumstances and conditions.”
In this consortium, Fu was involved in co-organizing the interdisciplinary team and advising on regulatory science issues. Read more about the efforts of Fu in the article Guidance on decontaminating face masks: U-M researchers contribute to national effort released by the University of Michigan.
To learn more about the group N95DECON and their official research please visit www.n95decon.org.
November 4, 2019
Kevin Fu speaks to NBC Nightly News about his team's discovery of a microphone vulnerability found in Siri, Alexa, and Google Home
The team’s work is presented in the paper “Light Commands: Laser-Based Audio Injection Attacks on Voice-Controllable Systems,” with additional information online at https://lightcommands.com/
September 17, 2019
University of Michigan students from the SPQR lab represent Archimedes at DEF CON 2019
"Through Archimedes, Ben Cyr and I were able to attend DEFCON this year for the first time. For those that have not been to DEFCON, to say the least it is certainly a different kind of event due to the interesting talks, the mob of hackers stumbling around Vegas, hands-on security workshops, and the “villages” with direct access to products such as medical devices or voting machines. We knew we had truly arrived when an ambulance passed by and a random attendee commented on how “cool” it would be if someone had hacked a pacemaker.
In between the craziness described above, we managed to have several productive conversations with medical device manufacturers and attended several interesting talks — particularly at the Biohacking Village. This village included medical device themed talks, hands-on workshops, and a medical device lab. Ultimately, we spent the majority of our time at the medical device lab partially due to full physical access to examine (and hack) several of the devices. But even more importantly, we could talk medical device security with several software and hardware engineers from attending medical device companies. On our end, we believe the relationships and ideas born from these interesting interactions may lead to future research. Similarly, I believe these conversations may have helped these engineers consider new threat vectors. Overall, this experience was very fruitful and fulfilling, and we hope to attend next year and see more medical devices there!"
Graduate Research Assistant
CSE University of Michigan