Thermal Covert Channels on Multi-core Platforms. RJ Masti, D Rai, A Ranganathan, C Müller, L Thiele, S Capkun USENIX Security Symposium, 865-880, 2015 | 195 | 2015 |
SPREE: Spoofing Resistant GPS Receiver A Ranganathan, H Ólafsdóttir, S Capkun arXiv preprint arXiv:1603.05462, 2016 | 131 | 2016 |
On Limitations of Friendly Jamming for Confidentiality NO Tippenhauer, L Malisa, A Ranganathan, S Capkun IEEE Symposium on Security and Privacy (S&P), 2013 | 110 | 2013 |
Security of GPS/INS based on-road location tracking systems S Narain, A Ranganathan, G Noubir 2019 IEEE Symposium on Security and Privacy (SP), 587-601, 2019 | 77 | 2019 |
Are we really close? Verifying proximity in wireless systems A Ranganathan, S Capkun IEEE Security & Privacy 15 (3), 52-58, 2017 | 72 | 2017 |
Short paper: detection of GPS spoofing attacks in power grids DY Yu, A Ranganathan, T Locher, S Capkun, D Basin Proceedings of the 2014 ACM conference on Security and privacy in wireless …, 2014 | 66 | 2014 |
Investigation of multi-device location spoofing attacks on air traffic control and possible countermeasures D Moser, P Leu, V Lenders, A Ranganathan, F Ricciato, S Capkun Proceedings of the 22nd Annual International Conference on Mobile Computing …, 2016 | 63 | 2016 |
Design and implementation of a terrorist fraud resilient distance bounding system A Ranganathan, NO Tippenhauer, B Škorić, D Singelée, S Čapkun European Symposium on Research in Computer Security, 415-432, 2012 | 56 | 2012 |
On the Security of Carrier Phase-based Ranging H Ólafsdóttir, A Ranganathan, S Capkun arXiv preprint arXiv:1610.06077, 2016 | 46 | 2016 |
Wireless attacks on aircraft landing systems H Sathaye, D Schepers, A Ranganathan, G Noubir Proceedings of the 12th Conference on Security and Privacy in Wireless and …, 2019 | 44 | 2019 |
Physical-layer attacks on chirp-based ranging systems A Ranganathan, B Danev, A Francillon, S Capkun Proceedings of the fifth ACM conference on Security and Privacy in Wireless …, 2012 | 41 | 2012 |
Semperfi: Anti-spoofing gps receiver for uavs H Sathaye, G LaMountain, P Closas, A Ranganathan Network and Distributed Systems Security (NDSS) Symposium 2022, 2022 | 36* | 2022 |
An Experimental Study of {GPS} Spoofing and Takeover Attacks on {UAVs} H Sathaye, M Strohmeier, V Lenders, A Ranganathan 31st USENIX Security Symposium (USENIX Security 22), 3503-3520, 2022 | 28 | 2022 |
On the Robustness of Wi-Fi Deauthentication Countermeasures D Schepers, A Ranganathan, M Vanhoef Proceedings of the 15th ACM Conference on Security and Privacy in Wireless …, 2022 | 24 | 2022 |
I Send, Therefore I Leak: Information Leakage in Low-Power Wide Area Networks P Leu, I Puddu, A Ranganathan, S Čapkun Proceedings of the 11th ACM Conference on Security & Privacy in Wireless and …, 2018 | 22 | 2018 |
Enabling trusted scheduling in embedded systems RJ Masti, C Marforio, A Ranganathan, A Francillon, S Capkun Proceedings of the 28th Annual Computer Security Applications Conference, 61-70, 2012 | 19 | 2012 |
Let numbers tell the tale: measuring security trends in wi-fi networks and best practices D Schepers, A Ranganathan, M Vanhoef Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 18 | 2021 |
Proximity Verification for Contactless Access Control and Authentication Systems A Ranganathan, B Danev, S Capkun Proceedings of the 31st Annual Computer Security Applications Conference …, 2015 | 18 | 2015 |
Practical Side-Channel Attacks against WPA-TKIP D Schepers, A Ranganathan, M Vanhoef Proceedings of the 2019 ACM Asia Conference on Computer and Communications …, 2019 | 17 | 2019 |
Here, there, and everywhere: security analysis of wi-fi fine timing measurement D Schepers, M Singh, A Ranganathan Proceedings of the 14th ACM Conference on Security and Privacy in Wireless …, 2021 | 16 | 2021 |