• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • Research
  • Publications
  • People
  • Teaching
  • Media Outreach
  • News
  • AI Spies News

SPIES Lab, Computer Science and Engineering

Texas A&M University College of Engineering

Vibrational Emanations

Pairing between wireless devices may be secured by the use of an auxiliary channel such as audio, visual or vibrations. A simple approach to pairing involves one of the devices initiating the transmission of a key, or keying material like a short password, over a vibration channel to the other device. This approach is efficient (only unidirectional transfer is needed) and simple (the sending device requires an embedded vibration motor and receiving device requires an accelerometer sensor). A successful pairing is achieved when the receiving device is able to decode the key without any errors while any eavesdropper attacker is unable to eavesdrop the key.

Figure 1: Use case scenario for auxiliary channel in pairing constrained devices.

Figure 1: Use case scenario for auxiliary channel in pairing constrained devices.

We pursue a systematic investigation of the security of vibration channel against an eavesdropping attacker. Recent work suggests sending the keying material over a clear vibrational channel poses a significant risk of an acoustic side channel attack. Specifically, an adversary can listen onto the acoustic sounds generated by the vibration motor of the sending device and infer the keying material with a high accuracy. To counteract this threat, we aim to design a novel pairing scheme, called Vibreaker (a “Vibrating speaker”), that involves active injection of acoustic noise in order to mask the key signal. In this scheme, the sending device artificially injects noise in the otherwise clear audio channel while transmitting the keying material via vibrations. The scheme requires no additional effort by the user, and imposes minimum hardware requirement and hence can be applied to many different contexts, such as pairing of IoT and implanted devices, wearables and other commodity gadgets.

Figure 2: Noisy vibrational pairing in the face of an acoustic eavesdropping attacker.

Figure 2: Noisy vibrational pairing in the face of an acoustic eavesdropping attacker.

We also examine the prospect of a co-resident eavesdropping model where the eavesdropper is co-located with the victim device(s). We found out that such an attacker is able to breach noisy vibration pairing such as Vibreaker due to inefficiency of current hardware present on constrained wireless devices. We aim to enhance the existing noisy vibrational pairing by adding low frequency tones that will cloak the footprints of vibration sounds at sub 500Hz frequency bands. We also study the usability of the enhanced masking signal and its effect on the decoding ability of the receiving device.

People

Faculty

  • Nitesh Saxena

Student

  • S Abhishek Anand (PhD candidate)

Publication

  • Noisy Vibrational Pairing of IoT Devices
    Abhishek Anand, and Nitesh Saxena
    In IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Emerging Attacks and Solutions for Secure Hardware in the Internet of Things, 2018.
    [pdf]
  • Coresident Evil: Noisy Vibrational Pairing in the Face of Co-located Acoustic Eavesdropping.
    S Abhishek Anand and Nitesh Saxena.
    In 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2017.
    [pdf]
  • Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise.
    S Abhishek Anand and Nitesh Saxena.
    In 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2016.
    [pdf]

Recent News

  • Paper accepted to WiSec 2026 January 13, 2026
  • Paper accepted to EACL 2026 January 5, 2026
  • Paper accepted to USENIX Security 2026 December 17, 2025
  • SPIES Lab Research Cited in News Coverage on AI Security Breach December 14, 2025
  • SPIES Lab Research Featured in TAMU College of Engineering Spotlight December 5, 2025
  • Paper accepted to IJCNLP-AACL 2025 October 25, 2025
  • TAMU SPIES Lab Wins CCS 2025 Distinguished Paper Award! October 20, 2025
  • Paper accepted to eCrime 2025 September 9, 2025
  • Paper accepted to IEEE S&P (Magazine) August 24, 2025
  • Another recent SPIES graduate to take up faculty position August 21, 2025
  • Paper accepted to CSCML 2025 August 13, 2025
  • SPIES graduate to start as Assistant Professor July 22, 2025
  • Paper accepted to ACM CCS 2025 July 2, 2025
  • News: Security and Accessibility Gaps in Web Authentication for Blind and Visually Impaired Users June 30, 2025
  • Paper accepted to ICME 2025 June 24, 2025
  • SPIES Lab’s Browser Fingerprinting Work in the News June 23, 2025
  • Journal paper accepted to IEEE TIFS June 19, 2025
  • SPIES Lab’s Browser Fingerprinting Work Features in News June 18, 2025
  • Paper Accepted to USENIX Security 2025 June 6, 2025
  • 2 Papers Accepted to PST 2025 June 6, 2025

© 2016–2026 SPIES Lab, Computer Science and Engineering Log in

Texas A&M Engineering Experiment Station Logo
  • College of Engineering
  • Facebook
  • Twitter
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment