S
Sashank Narain
Researcher at Northeastern University
Publications - 20
Citations - 371
Sashank Narain is an academic researcher from Northeastern University. The author has contributed to research in topics: Computer science & Android (operating system). The author has an hindex of 7, co-authored 12 publications receiving 282 citations. Previous affiliations of Sashank Narain include University of Massachusetts Lowell.
Papers
More filters
Proceedings ArticleDOI
Inferring User Routes and Locations Using Zero-Permission Mobile Sensors
TL;DR: It is shown that a zero-permissions Android app can infer vehicular users' location and traveled routes, with high accuracy and without the users' knowledge, using gyroscope, accelerometer, and magnetometer information.
Proceedings ArticleDOI
Single-stroke language-agnostic keylogging using stereo-microphones and domain specific machine learning
TL;DR: This paper investigates the feasibility of keystroke inference when user taps on a soft keyboard are captured by the stereoscopic microphones on an Android smartphone, and develops algorithms for sensor-signals processing and domain specific machine learning to infer key taps using a combination of stereo-microphones and gyroscopes.
Proceedings ArticleDOI
Security of GPS/INS Based On-road Location Tracking Systems
TL;DR: The security guarantees of INS-aided GPS tracking and navigation for road transportation systems are evaluated and countermeasures that limit an attacker's ability are proposed, without the need for any hardware modifications are proposed.
Proceedings ArticleDOI
A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link
Milan Stute,Sashank Narain,Alex Mariotto,Alexander Heinrich,David Kreitschmann,Guevara Noubir,Matthias Hollick +6 more
TL;DR: This work uncovers several security and privacy vulnerabilities ranging from design flaws to implementation bugs leading to a man-in-the-middle (MitM) attack enabling stealthy modification of files transmitted via AirDrop, denial-of-service (DoS) attacks preventing communication, privacy leaks that enable user identification and long-term tracking undermining MAC address randomization, and DoS attacks enabling targeted or simultaneous crashing of all neighboring devices.
Proceedings ArticleDOI
An autonomic and permissionless Android covert channel
TL;DR: This paper sever the acquisition / exfiltration bundling by assigning independent responsibilities to two apps communicating via a stealthy, permissionless, self-configuring and self-optimizing ultrasonic bridge, and presents a framework for analyzing channel feasibility and performance.