scispace - formally typeset
S

Sashank Narain

Researcher at Northeastern University

Publications -  20
Citations -  371

Sashank Narain is an academic researcher from Northeastern University. The author has contributed to research in topics: Computer science & Android (operating system). The author has an hindex of 7, co-authored 12 publications receiving 282 citations. Previous affiliations of Sashank Narain include University of Massachusetts Lowell.

Papers
More filters
Proceedings ArticleDOI

Inferring User Routes and Locations Using Zero-Permission Mobile Sensors

TL;DR: It is shown that a zero-permissions Android app can infer vehicular users' location and traveled routes, with high accuracy and without the users' knowledge, using gyroscope, accelerometer, and magnetometer information.
Proceedings ArticleDOI

Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning

TL;DR: This paper investigates the feasibility of keystroke inference when user taps on a soft keyboard are captured by the stereoscopic microphones on an Android smartphone, and develops algorithms for sensor-signals processing and domain specific machine learning to infer key taps using a combination of stereo-microphones and gyroscopes.
Proceedings ArticleDOI

Security of GPS/INS Based On-road Location Tracking Systems

TL;DR: The security guarantees of INS-aided GPS tracking and navigation for road transportation systems are evaluated and countermeasures that limit an attacker's ability are proposed, without the need for any hardware modifications are proposed.
Proceedings ArticleDOI

A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link

TL;DR: This work uncovers several security and privacy vulnerabilities ranging from design flaws to implementation bugs leading to a man-in-the-middle (MitM) attack enabling stealthy modification of files transmitted via AirDrop, denial-of-service (DoS) attacks preventing communication, privacy leaks that enable user identification and long-term tracking undermining MAC address randomization, and DoS attacks enabling targeted or simultaneous crashing of all neighboring devices.
Proceedings ArticleDOI

An autonomic and permissionless Android covert channel

TL;DR: This paper sever the acquisition / exfiltration bundling by assigning independent responsibilities to two apps communicating via a stealthy, permissionless, self-configuring and self-optimizing ultrasonic bridge, and presents a framework for analyzing channel feasibility and performance.