Aanjhan Ranganathan

Orcid: 0000-0003-0464-5861

Affiliations:
  • Northeastern University, Boston, MA, USA


According to our database1, Aanjhan Ranganathan authored at least 41 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Assessing the Feasibility of the Virtual Smartphone Paradigm in Countering Zero-Click Attacks.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Track You: A Deep Dive into Safety Alerts for Apple AirTags.
Proc. Priv. Enhancing Technol., October, 2023

Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Authentication.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.
Proceedings of the 32nd USENIX Security Symposium, 2023

Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings.
Proceedings of the 32nd USENIX Security Symposium, 2023

mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

2022
Privacy-Preserving Positioning in Wi-Fi Fine Timing Measurement.
Proc. Priv. Enhancing Technol., 2022

Experience Report on the Challenges and Opportunities in Securing Smartphones Against Zero-Click Attacks.
CoRR, 2022

Cryptography Is Not Enough: Relay Attacks on Authenticated GNSS Signals.
CoRR, 2022

On the Robustness of Wi-Fi Deauthentication Countermeasures.
Proceedings of the WiSec '22: 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, San Antonio, TX, USA, May 16, 2022

An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs.
Proceedings of the 31st USENIX Security Symposium, 2022

V-Range: Enabling Secure Ranging in 5G Wireless Networks.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

SemperFi: Anti-spoofing GPS Receiver for UAVs.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

On the Implications of Spoofing and Jamming Aviation Datalink Applications.
Proceedings of the Annual Computer Security Applications Conference, 2022

ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
SemperFi: A Spoofer Eliminating GPS Receiver for UAVs.
CoRR, 2021

A framework to test and fuzz wi-fi devices.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Here, there, and everywhere: security analysis of wi-fi fine timing measurement.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Let numbers tell the tale: measuring security trends in wi-fi networks and best practices.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

2019
Wireless attacks on aircraft landing systems: demo.
Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, 2019

Wireless Attacks on Aircraft Instrument Landing Systems.
Proceedings of the 28th USENIX Security Symposium, 2019

Security of GPS/INS Based On-road Location Tracking Systems.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Practical Side-Channel Attacks against WPA-TKIP.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

2018
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks.
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2018

2017
Are We Really Close? Verifying Proximity in Wireless Systems.
IEEE Secur. Priv., 2017

On the Security of Carrier Phase-based Ranging.
IACR Cryptol. ePrint Arch., 2017

2016
Physical-layer Techniques for Secure Proximity Verification and Localization.
PhD thesis, 2016

SALVE: server authentication with location verification.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

SPREE: a spoofing resistant GPS receiver.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures.
Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking, 2016

2015
W-SPS: Designing a Wide-Area Secure Positioning System.
IACR Cryptol. ePrint Arch., 2015

Thermal Covert Channels on Multi-core Platforms.
Proceedings of the 24th USENIX Security Symposium, 2015

Proximity Verification for Contactless Access Control and Authentication Systems.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
Low-power Distance Bounding.
CoRR, 2014

Short paper: detection of GPS spoofing attacks in power grids.
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014

2013
On Limitations of Friendly Jamming for Confidentiality.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

2012
Physical-layer attacks on chirp-based ranging systems.
Proceedings of the Fifth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2012

Counting stream registers: An efficient and effective snoop filter architecture.
Proceedings of the 2012 International Conference on Embedded Computer Systems: Architectures, 2012

Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System.
Proceedings of the Computer Security - ESORICS 2012, 2012

Enabling trusted scheduling in embedded systems.
Proceedings of the 28th Annual Computer Security Applications Conference, 2012


  Loading...