Amirali Sanatinia

Learn More
Mobile phones are equipped with an increasingly large number of precise and sophisticated sensors. This raises the risk of direct and indirect privacy breaches. In this paper, we investigate the feasibility of keystroke inference when user taps on a soft keyboard are captured by the stereoscopic microphones on an Android smartphone. We developed algorithms(More)
WiFi Access Points (APs) are ideal targets of attack. They have access to home internal networks which allows an adversary to easily carry out man-in-the-middle attacks and spread infections wirelessly. They can also be used to launch massive denial of service attacks that target the physical infrastructure as well as the RF spectrum (both WiFi and(More)
Over the last decade botnets survived by adopting a sequence of increasingly sophisticated strategies to evade detection and take overs, and to monetize their infrastructure. At the same time, the success of privacy infrastructures such as Tor opened the door to illegal activities, including botnets, ransomware, and a marketplace for drugs and contraband.(More)
In the last decade, Tor proved to be a very successful and widely popular system to protect users' anonymity. However, Tor remains a practical system with a variety of limitations, some of which were indeed exploited in the recent past. In particular, Tor's security relies on the fact that a substantial number of its nodes do not misbehave. In this work we(More)
Over the last decade privacy infrastructures such as Tor proved to be very successful and widely used. However, Tor remains a practical system with a variety of limitations and open to abuse [2]. Tor’s security and anonymity is based on the assumption that the large majority of the its relays are honest and do not misbehave. Particularly the privacy of the(More)
Over the last decade botnets have become a serious security threat. They have evaded mitigation and take overs by adopting an increasing sophisticated strategies. At the same time the rise and success of privacy infrastructures, has opened new possibilities of abuse by malicious users. Tor is a prominent example of such infrastructure, which allows users to(More)
WiFi APs are ideal targets of attack. They are the main gateway to residential networks with direct access to home computers, as such they are highly prone to man-in-themiddle attacks. They are also wirelessly interconnected, independent of the wired Internet. WiFi APs can transmit at one Watt, they do not run anti-virus software, do not have an automatic(More)