profilepic

Contact

Aanjhan Ranganathan
Assistant Professor
CCIS, Northeastern University
Boston, USA
Office #608 ISEC
+1 (617) 373 5701
aanjhan@northeastern.edu

Publications

The following are the list of papers (sorted in reverse chronological order) that I have (co)-authored.

[17] I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks Paper
Patrick Leu, Ivan Puddu, Aanjhan Ranganathan, Srdjan Capkun
In Proceedings of ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2018)

[16] On the Security of Carrier Phase-based Ranging Paper Bibtex
Hildur Ólafsdóttir, Aanjhan Ranganathan, Srdjan Capkun
In Proceedings of Cryptographic Hardware and Embedded Systems (CHES 2017)

[15] Are We Really Close? Verifying Proximity in Wireless Systems Draft version
Aanjhan Ranganathan, Srdjan Capkun
IEEE Security & Privacy Magazine (June-July 2017 edition)

[14] Physical-layer Techniques for Secure Proximity Verification & Localization Abstract Full-text Bibtex
Aanjhan Ranganathan
Ph.D. Dissertation, 2016

[13] SPREE: Spoofing Resistant GPS Receiver Paper Bibtex
Aanjhan Ranganathan, Hildur Ólafsdóttir, Srdjan Capkun
In Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking (MobiCom 2016)

[12] Investigation of Multi-device Location Spoofing Attacks on Air Traffic Control and Possible Countermeasures Paper Bibtex
Daniel Moser, Patrick Leu, Vincent Lenders, Aanjhan Ranganathan, Fabio Ricciato, Srdjan Capkun
In Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking (MobiCom 2016)

[11] SALVE: Server Authentication with Location VErification Paper Bibtex
Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun
In Proceedings of the 22nd Annual International Conference on Mobile Computing and Networking (MobiCom 2016)

[10] Proximity Verification for Contactless Access Control and Authentication Systems Paper Bibtex
Aanjhan Ranganathan, Boris Danev, Srdjan Capkun
In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC 2015)

[9] Thermal Covert Channels on Multi-core Platforms Paper Bibtex
Ramya Jayaram Masti, Devendra Rai, Aanjhan Ranganathan, Christian Müller, Lothar Thiele, Srdjan Capkun.
In the proceedings of 24th USENIX Security Symposium (USENIX Security 15)

[8] W-SPS: Designing a Wide-Area Secure Positioning System Paper Bibtex
Der-Yeuan Yu, Aanjhan Ranganathan, Ramya Jayaram Masti, Claudio Soriente, Srdjan Capkun
Cryptology ePrint Archive: Report 2015/230

[7] Short Paper: Detection of GPS Spoofing Attacks in Power Grids Paper Bibtex
Der-Yeuan Yu, Aanjhan Ranganathan, Thomas Locher, Srdjan Capkun, David A. Basin.
In Proceedings of the 2014 ACM conference on Security and privacy in wireless & mobile networks (WiSec 2014)

[6] Low-power Distance Bounding Paper Bibtex
Aanjhan Ranganathan, Boris Danev, Srdjan Capkun
arXiv preprint arXiv:1404.4435 (2014)

[5] On Limitations of Friendly Jamming for Confidentiality Paper Bibtex
Nils Ole Tippenhauer, Luka Malisa, Aanjhan Ranganathan, Srdjan Capkun.
In Security and Privacy (SP), 2013 IEEE Symposium on (IEEE S&P 2013)

[4] Enabling Trusted Scheduling in Embedded Systems Paper Bibtex
Ramya Jayaram Masti, Claudio Marforio, Aanjhan Ranganathan, Aurélien Francillon, Srdjan Capkun.
In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC 2012)

[3] Design and Implementation of a Terrorist Fraud Resilient Distance Bounding System Paper Bibtex
Aanjhan Ranganathan, Nils Ole Tippenhauer, Boris Skoric, Dave Singelée, Srdjan Capkun.
In Computer Security – (ESORICS 2012)

[2] Counting stream registers: An efficient and effective snoop filter architecture Paper Bibtex
Aanjhan Ranganathan, Ali Galip Bayrak, Theo Kluter, Philip Brisk, Edoardo Charbon, Paolo Ienne
In Embedded Computer Systems (SAMOS), 2012 International Conference on (ICSAMOS 2012)

[1] Physical-layer attacks on chirp-based ranging systems Paper Bibtex
Aanjhan Ranganathan, Boris Danev, Aurélien Francillon, Srdjan Capkun
In Proceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2012)