default search action
Aanjhan Ranganathan
Person information
- affiliation: Northeastern University, Boston, MA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c36]Narmeen Shafqat, Cem Topcuoglu, Engin Kirda, Aanjhan Ranganathan:
Assessing the Feasibility of the Virtual Smartphone Paradigm in Countering Zero-Click Attacks. HICSS 2024: 7427-7436 - [c35]Narmeen Shafqat, Aanjhan Ranganathan:
Seamlessly Insecure: Uncovering Outsider Access Risks in AiDot-Controlled Matter Devices. SP (Workshops) 2024: 281-288 - [c34]Syed Khandker, Michele Guerra, Evangelos Bitsikas, Roger Piqueras Jover, Aanjhan Ranganathan, Christina Pöpper:
ASTRA-5G: Automated Over-the-Air Security Testing and Research Architecture for 5G SA Devices. WISEC 2024: 89-100 - [c33]Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan:
Amplifying Threats: The Role of Multi-Sender Coordination in SMS-Timing-Based Location Inference Attacks. WOOT @ USENIX Security Symposium 2024: 59-73 - [c32]Maryam Motallebighomi, Earlence Fernandes, Aanjhan Ranganathan:
MakeShift: Security Analysis of Wireless Gear Shifting in Bicycles. WOOT @ USENIX Security Symposium 2024: 75-88 - [i15]Evangelos Bitsikas, Adam Belfki, Aanjhan Ranganathan:
Dyna-5G: A Dynamic, Flexible, and Self-Organizing 5G Network for M2M Ecosystems. CoRR abs/2406.15681 (2024) - 2023
- [j3]Narmeen Shafqat, Nicole Gerzon, Maggie Van Nortwick, Victor Sun, Alan Mislove, Aanjhan Ranganathan:
Track You: A Deep Dive into Safety Alerts for Apple AirTags. Proc. Priv. Enhancing Technol. 2023(4): 132-148 (2023) - [c31]Rohith Reddy Vennam, Ish Kumar Jain, Kshitiz Bansal, Joshua Orozco, Puja Shukla, Aanjhan Ranganathan, Dinesh Bharadia:
mmSpoof: Resilient Spoofing of Automotive Millimeter-wave Radars using Reflect Array. SP 2023: 1807-1821 - [c30]Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef:
Framing Frames: Bypassing Wi-Fi Encryption by Manipulating Transmit Queues. USENIX Security Symposium 2023: 53-68 - [c29]Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan:
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings. USENIX Security Symposium 2023: 2151-2168 - [c28]Evangelos Bitsikas, Syed Khandker, Ahmad Salous, Aanjhan Ranganathan, Roger Piqueras Jover, Christina Pöpper:
UE Security Reloaded: Developing a 5G Standalone User-Side Security Testing Framework. WISEC 2023: 121-132 - [c27]Maryam Motallebighomi, Harshad Sathaye, Mridula Singh, Aanjhan Ranganathan:
Location-independent GNSS Relay Attacks: A Lazy Attacker's Guide to Bypassing Navigation Message Authentication. WISEC 2023: 365-376 - [i14]Evangelos Bitsikas, Theodor Schnitzler, Christina Pöpper, Aanjhan Ranganathan:
Freaky Leaky SMS: Extracting User Locations by Analyzing SMS Timings. CoRR abs/2306.07695 (2023) - 2022
- [j2]Domien Schepers, Aanjhan Ranganathan:
Privacy-Preserving Positioning in Wi-Fi Fine Timing Measurement. Proc. Priv. Enhancing Technol. 2022(2): 325-343 (2022) - [c26]Narmeen Shafqat, Daniel J. Dubois, David R. Choffnes, Aaron Schulman, Dinesh Bharadia, Aanjhan Ranganathan:
ZLeaks: Passive Inference Attacks on Zigbee Based Smart Homes. ACNS 2022: 105-125 - [c25]Harshad Sathaye, Guevara Noubir, Aanjhan Ranganathan:
On the Implications of Spoofing and Jamming Aviation Datalink Applications. ACSAC 2022: 548-560 - [c24]Harshad Sathaye, Gerald LaMountain, Pau Closas, Aanjhan Ranganathan:
SemperFi: Anti-spoofing GPS Receiver for UAVs. NDSS 2022 - [c23]Mridula Singh, Marc Roeschlin, Aanjhan Ranganathan, Srdjan Capkun:
V-Range: Enabling Secure Ranging in 5G Wireless Networks. NDSS 2022 - [c22]Harshad Sathaye, Martin Strohmeier, Vincent Lenders, Aanjhan Ranganathan:
An Experimental Study of GPS Spoofing and Takeover Attacks on UAVs. USENIX Security Symposium 2022: 3503-3520 - [c21]Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef:
On the Robustness of Wi-Fi Deauthentication Countermeasures. WISEC 2022: 245-256 - [i13]Maryam Motallebighomi, Harshad Sathaye, Mridula Singh, Aanjhan Ranganathan:
Cryptography Is Not Enough: Relay Attacks on Authenticated GNSS Signals. CoRR abs/2204.11641 (2022) - [i12]Narmeen Shafqat, Cem Topcuoglu, Engin Kirda, Aanjhan Ranganathan:
Experience Report on the Challenges and Opportunities in Securing Smartphones Against Zero-Click Attacks. CoRR abs/2211.03015 (2022) - 2021
- [c20]Domien Schepers, Mridula Singh, Aanjhan Ranganathan:
Here, there, and everywhere: security analysis of wi-fi fine timing measurement. WISEC 2021: 78-89 - [c19]Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef:
Let numbers tell the tale: measuring security trends in wi-fi networks and best practices. WISEC 2021: 100-105 - [c18]Domien Schepers, Mathy Vanhoef, Aanjhan Ranganathan:
A framework to test and fuzz wi-fi devices. WISEC 2021: 368-370 - [i11]Harshad Sathaye, Gerald LaMountain, Pau Closas, Aanjhan Ranganathan:
SemperFi: A Spoofer Eliminating GPS Receiver for UAVs. CoRR abs/2105.01860 (2021) - [i10]Narmeen Shafqat, Daniel J. Dubois, David R. Choffnes, Aaron Schulman, Dinesh Bharadia, Aanjhan Ranganathan:
ZLeaks: Passive Inference Attacks on Zigbee based Smart Homes. CoRR abs/2107.10830 (2021)
2010 – 2019
- 2019
- [c17]Domien Schepers, Aanjhan Ranganathan, Mathy Vanhoef:
Practical Side-Channel Attacks against WPA-TKIP. AsiaCCS 2019: 415-426 - [c16]Sashank Narain, Aanjhan Ranganathan, Guevara Noubir:
Security of GPS/INS Based On-road Location Tracking Systems. IEEE Symposium on Security and Privacy 2019: 587-601 - [c15]Harshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir:
Wireless Attacks on Aircraft Instrument Landing Systems. USENIX Security Symposium 2019: 357-372 - [c14]Harshad Sathaye, Domien Schepers, Aanjhan Ranganathan, Guevara Noubir:
Wireless attacks on aircraft landing systems: demo. WiSec 2019: 295-297 - [i9]Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, Srdjan Capkun:
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks. CoRR abs/1911.10637 (2019) - 2018
- [c13]Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, Srdjan Capkun:
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks. WISEC 2018: 23-33 - [i8]Sashank Narain, Aanjhan Ranganathan, Guevara Noubir:
Security of GPS/INS based On-road Location Tracking Systems. CoRR abs/1808.03515 (2018) - 2017
- [j1]Aanjhan Ranganathan, Srdjan Capkun:
Are We Really Close? Verifying Proximity in Wireless Systems. IEEE Secur. Priv. 15(3): 52-58 (2017) - [c12]Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-Based Ranging. CHES 2017: 490-509 - [i7]Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-based Ranging. IACR Cryptol. ePrint Arch. 2017: 591 (2017) - 2016
- [b1]Aanjhan Ranganathan:
Physical-layer Techniques for Secure Proximity Verification and Localization. ETH Zurich, Zürich, Switzerland, 2016 - [c11]Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun:
SPREE: a spoofing resistant GPS receiver. MobiCom 2016: 348-360 - [c10]Daniel Moser, Patrick Leu, Vincent Lenders, Aanjhan Ranganathan, Fabio Ricciato, Srdjan Capkun:
Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures. MobiCom 2016: 375-386 - [c9]Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
SALVE: server authentication with location verification. MobiCom 2016: 401-414 - [i6]Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun:
SPREE: Spoofing Resistant GPS Receiver. CoRR abs/1603.05462 (2016) - [i5]Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
SALVE: Server Authentication with Location VErification. CoRR abs/1608.04563 (2016) - [i4]Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun:
On the Security of Carrier Phase-based Ranging. CoRR abs/1610.06077 (2016) - 2015
- [c8]Aanjhan Ranganathan, Boris Danev, Srdjan Capkun:
Proximity Verification for Contactless Access Control and Authentication Systems. ACSAC 2015: 271-280 - [c7]Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele, Srdjan Capkun:
Thermal Covert Channels on Multi-core Platforms. USENIX Security Symposium 2015: 865-880 - [i3]Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele, Srdjan Capkun:
Thermal Covert Channels on Multi-core Platforms. CoRR abs/1503.07000 (2015) - [i2]Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun:
W-SPS: Designing a Wide-Area Secure Positioning System. IACR Cryptol. ePrint Arch. 2015: 230 (2015) - 2014
- [c6]Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun, David A. Basin:
Short paper: detection of GPS spoofing attacks in power grids. WISEC 2014: 99-104 - [i1]Aanjhan Ranganathan, Boris Danev, Srdjan Capkun:
Low-power Distance Bounding. CoRR abs/1404.4435 (2014) - 2013
- [c5]Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun:
On Limitations of Friendly Jamming for Confidentiality. IEEE Symposium on Security and Privacy 2013: 160-173 - 2012
- [c4]Ramya Jayaram Masti, Claudio Marforio, Aanjhan Ranganathan, Aurélien Francillon, Srdjan Capkun:
Enabling trusted scheduling in embedded systems. ACSAC 2012: 61-70 - [c3]Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelée, Srdjan Capkun:
Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System. ESORICS 2012: 415-432 - [c2]Aanjhan Ranganathan, Ali Galip Bayrak, Theo Kluter, Philip Brisk, Edoardo Charbon, Paolo Ienne:
Counting stream registers: An efficient and effective snoop filter architecture. ICSAMOS 2012: 120-127 - [c1]Aanjhan Ranganathan, Boris Danev, Aurélien Francillon, Srdjan Capkun:
Physical-layer attacks on chirp-based ranging systems. WISEC 2012: 15-26
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint