Aanjhan Ranganathan
Aanjhan Ranganathan
Assistant Professor of Computer Science, Northeastern University
Adresse e-mail validée de northeastern.edu - Page d'accueil
Citée par
Citée par
Thermal Covert Channels on Multi-core Platforms.
RJ Masti, D Rai, A Ranganathan, C Müller, L Thiele, S Capkun
USENIX Security Symposium, 865-880, 2015
On Limitations of Friendly Jamming for Confidentiality
NO Tippenhauer, L Malisa, A Ranganathan, S Capkun
IEEE Symposium on Security and Privacy (S&P), 2013
SPREE: Spoofing Resistant GPS Receiver
A Ranganathan, H Ólafsdóttir, S Capkun
arXiv preprint arXiv:1603.05462, 2016
Design and implementation of a terrorist fraud resilient distance bounding system
A Ranganathan, NO Tippenhauer, B Škorić, D Singelée, S Čapkun
European Symposium on Research in Computer Security, 415-432, 2012
Short paper: detection of GPS spoofing attacks in power grids
DY Yu, A Ranganathan, T Locher, S Capkun, D Basin
Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014
Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures
D Moser, P Leu, V Lenders, A Ranganathan, F Ricciato, S Capkun
Proceedings of the 22nd Annual International Conference on Mobile Computing …, 2016
Are we really close? Verifying proximity in wireless systems
A Ranganathan, S Capkun
IEEE Security & Privacy 15 (3), 52-58, 2017
Physical-layer attacks on chirp-based ranging systems
A Ranganathan, B Danev, A Francillon, S Capkun
Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012
Security of GPS/INS based on-road location tracking systems
S Narain, A Ranganathan, G Noubir
2019 IEEE Symposium on Security and Privacy (SP), 587-601, 2019
On the Security of Carrier Phase-based Ranging
H Ólafsdóttir, A Ranganathan, S Capkun
arXiv preprint arXiv:1610.06077, 2016
Proximity Verification for Contactless Access Control and Authentication Systems
A Ranganathan, B Danev, S Capkun
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
Enabling trusted scheduling in embedded systems
RJ Masti, C Marforio, A Ranganathan, A Francillon, S Capkun
Proceedings of the 28th Annual Computer Security Applications Conference, 61-70, 2012
SALVE: server authentication with location verification
DY Yu, A Ranganathan, RJ Masti, C Soriente, S Capkun
Proceedings of the 22nd Annual International Conference on Mobile Computing …, 2016
Counting Stream Registers: An Efficient and Effective Snoop Filter Architecture
A Ranganathan, AG Bayrak, T Kluter, P Brisk, P Ienne, E Charbon
Weitere Autoren: Philip Brisk, Edoardo Charbon, Paolo Ienne, 2012
Wireless attacks on aircraft instrument landing systems
H Sathaye, D Schepers, A Ranganathan, G Noubir
28th {USENIX} Security Symposium ({USENIX} Security 19), 357-372, 2019
Low-power Distance Bounding
A Ranganathan, B Danev, S Capkun
arXiv preprint arXiv:1404.4435, 2014
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks
P Leu, I Puddu, A Ranganathan, S Čapkun
Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018
Physical-layer Techniques for Secure Proximity Verification & Localization
A Ranganathan
ETH Zurich, 2016
Practical Side-Channel Attacks against WPA-TKIP
D Schepers, A Ranganathan, M Vanhoef
Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019
Mounting of Version Control Repositories: RepoFS
P Mohan, R Aanjhan
High Performance Computing-HiPC 2006, 2006
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20