• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • Research
  • Publications
  • People
  • Teaching
  • Media Outreach
  • News
  • AI Spies News

SPIES Lab, Computer Science and Engineering

Texas A&M University College of Engineering

Home Alone

The Insider Threat of Unattended Wearables and A Defense using Audio Proximity

In this project, we highlight and study the threat arising from the unattended wearable devices pre-paired with a smartphone over a wireless communication medium. Most users may not lock their wearables due to their small form factor, and may strip themselves off of these devices often, leaving or forgetting them unattended while away from homes (or shared office spaces). An “insider” attacker (potentially a disgruntled friend, roommate, colleague, or even a spouse) can therefore get hold of the wearable, take it near the user’s phone (i.e., within radio communication range) at another location (e.g., user’s office), and surreptitiously use it across physical barriers for various nefarious purposes, including pulling and learning sensitive information from the phone (such as messages, photos or emails), and pushing sensitive commands to the phone (such as making phone calls, sending text messages and taking pictures). The attacker can then safely restore the wearable, wait for it to be left unattended again and may repeat the process for maximum impact, while the victim remains completely oblivious to the ongoing attack activity. This malicious behavior is in sharp contrast to the threat of stolen wearables where the victim would unpair the wearable as soon as the theft is detected. Considering the severity of this threat, we also respond by building a defense based on audio proximity, which limits the wearable to interface with the phone only when it can pick up on an active audio challenge produced by the phone.

HAW attack example scenarios. An attacker with an unattended wearable comes in the Bluetooth range of the phone while being hidden across physical barriers, e.g., (a) wall, and (b) floor.

HAW attack example scenarios. An attacker with an unattended wearable comes in the Bluetooth range of the phone while being hidden across physical barriers, e.g., (a) wall, and (b) floor.

People

Faculty

  • Nitesh Saxena

Student

  • Prakash Shrestha (PhD student)
  • Babins Shrestha (@UAB; PhD 2016; now Cybersecurity Professional at Visa)

Publication

  • Home Alone: The Insider Threat of Unattended Wearables and A Defense using Audio Proximity.
    Prakash Shrestha, Babins Shrestha, and Nitesh Saxena.
    To appear in IEEE Conference on Communications and Network Security (CNS), May/June 2018.
    [pdf]

Recent News

  • Paper accepted to WiSec 2026 January 13, 2026
  • Paper accepted to EACL 2026 January 5, 2026
  • Paper accepted to USENIX Security 2026 December 17, 2025
  • SPIES Lab Research Cited in News Coverage on AI Security Breach December 14, 2025
  • SPIES Lab Research Featured in TAMU College of Engineering Spotlight December 5, 2025
  • Paper accepted to IJCNLP-AACL 2025 October 25, 2025
  • TAMU SPIES Lab Wins CCS 2025 Distinguished Paper Award! October 20, 2025
  • Paper accepted to eCrime 2025 September 9, 2025
  • Paper accepted to IEEE S&P (Magazine) August 24, 2025
  • Another recent SPIES graduate to take up faculty position August 21, 2025
  • Paper accepted to CSCML 2025 August 13, 2025
  • SPIES graduate to start as Assistant Professor July 22, 2025
  • Paper accepted to ACM CCS 2025 July 2, 2025
  • News: Security and Accessibility Gaps in Web Authentication for Blind and Visually Impaired Users June 30, 2025
  • Paper accepted to ICME 2025 June 24, 2025
  • SPIES Lab’s Browser Fingerprinting Work in the News June 23, 2025
  • Journal paper accepted to IEEE TIFS June 19, 2025
  • SPIES Lab’s Browser Fingerprinting Work Features in News June 18, 2025
  • Paper Accepted to USENIX Security 2025 June 6, 2025
  • 2 Papers Accepted to PST 2025 June 6, 2025

© 2016–2026 SPIES Lab, Computer Science and Engineering Log in

Texas A&M Engineering Experiment Station Logo
  • College of Engineering
  • Facebook
  • Twitter
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment