• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • Research
  • Publications
  • People
  • Teaching
  • Media Outreach
  • News
  • AI Spies News

SPIES Lab, Computer Science and Engineering

Texas A&M University College of Engineering

Vibrational Emanations

Pairing between wireless devices may be secured by the use of an auxiliary channel such as audio, visual or vibrations. A simple approach to pairing involves one of the devices initiating the transmission of a key, or keying material like a short password, over a vibration channel to the other device. This approach is efficient (only unidirectional transfer is needed) and simple (the sending device requires an embedded vibration motor and receiving device requires an accelerometer sensor). A successful pairing is achieved when the receiving device is able to decode the key without any errors while any eavesdropper attacker is unable to eavesdrop the key.

Figure 1: Use case scenario for auxiliary channel in pairing constrained devices.

Figure 1: Use case scenario for auxiliary channel in pairing constrained devices.

We pursue a systematic investigation of the security of vibration channel against an eavesdropping attacker. Recent work suggests sending the keying material over a clear vibrational channel poses a significant risk of an acoustic side channel attack. Specifically, an adversary can listen onto the acoustic sounds generated by the vibration motor of the sending device and infer the keying material with a high accuracy. To counteract this threat, we aim to design a novel pairing scheme, called Vibreaker (a “Vibrating speaker”), that involves active injection of acoustic noise in order to mask the key signal. In this scheme, the sending device artificially injects noise in the otherwise clear audio channel while transmitting the keying material via vibrations. The scheme requires no additional effort by the user, and imposes minimum hardware requirement and hence can be applied to many different contexts, such as pairing of IoT and implanted devices, wearables and other commodity gadgets.

Figure 2: Noisy vibrational pairing in the face of an acoustic eavesdropping attacker.

Figure 2: Noisy vibrational pairing in the face of an acoustic eavesdropping attacker.

We also examine the prospect of a co-resident eavesdropping model where the eavesdropper is co-located with the victim device(s). We found out that such an attacker is able to breach noisy vibration pairing such as Vibreaker due to inefficiency of current hardware present on constrained wireless devices. We aim to enhance the existing noisy vibrational pairing by adding low frequency tones that will cloak the footprints of vibration sounds at sub 500Hz frequency bands. We also study the usability of the enhanced masking signal and its effect on the decoding ability of the receiving device.

People

Faculty

  • Nitesh Saxena

Student

  • S Abhishek Anand (PhD candidate)

Publication

  • Noisy Vibrational Pairing of IoT Devices
    Abhishek Anand, and Nitesh Saxena
    In IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Emerging Attacks and Solutions for Secure Hardware in the Internet of Things, 2018.
    [pdf]
  • Coresident Evil: Noisy Vibrational Pairing in the Face of Co-located Acoustic Eavesdropping.
    S Abhishek Anand and Nitesh Saxena.
    In 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2017.
    [pdf]
  • Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise.
    S Abhishek Anand and Nitesh Saxena.
    In 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2016.
    [pdf]

Recent News

  • Paper accepted to ICME 2025 June 24, 2025
  • SPIES Lab’s Browser Fingerprinting Work in the News June 23, 2025
  • Journal paper accepted to IEEE TIFS June 19, 2025
  • SPIES Lab’s Browser Fingerprinting Work Features in News June 18, 2025
  • Paper Accepted to USENIX Security 2025 June 6, 2025
  • 2 Papers Accepted to PST 2025 June 6, 2025
  • AI Spies News — BPSniff (IEEE S&P 2025) Paper News Story May 12, 2025
  • Launching the AI Spies News Channel May 12, 2025
  • Paper accepted to WiSec 2025 May 11, 2025
  • SPIES Lab’s Secure Messaging Work Features in News May 3, 2025
  • SPIES Lab Student to Start as an Assistant Professor April 18, 2025
  • Dr. Saxena’s Primer on Secure Communications in News Media March 31, 2025
  • Dr. Saxena recognized with the Dean’s Excellence Award! February 14, 2025
  • Dr. Saxena appointed as the Senior Area Editor, IEEE TIFS February 6, 2025
  • 2 Full Papers Accepted to WWW 2025 January 20, 2025
  • Journal paper accepted to IEEE TMC December 18, 2024
  • New post-doctoral researcher joins the lab December 11, 2024
  • Paper Accepted to ACM Computing Surveys 2024 November 30, 2024
  • Paper Accepted to IEEE S&P 2025 October 21, 2024
  • Paper Accepted to Nature Human Behaviour October 20, 2024

© 2016–2025 SPIES Lab, Computer Science and Engineering Log in

Texas A&M Engineering Experiment Station Logo
  • College of Engineering
  • Facebook
  • Twitter
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment