• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • Research Projects
  • Publications
  • People
  • Teaching
  • Media Outreach
  • News Archive

SPIES Lab, Computer Science and Engineering

Texas A&M University College of Engineering

Vibrational Emanations

Pairing between wireless devices may be secured by the use of an auxiliary channel such as audio, visual or vibrations. A simple approach to pairing involves one of the devices initiating the transmission of a key, or keying material like a short password, over a vibration channel to the other device. This approach is efficient (only unidirectional transfer is needed) and simple (the sending device requires an embedded vibration motor and receiving device requires an accelerometer sensor). A successful pairing is achieved when the receiving device is able to decode the key without any errors while any eavesdropper attacker is unable to eavesdrop the key.

Figure 1: Use case scenario for auxiliary channel in pairing constrained devices.

Figure 1: Use case scenario for auxiliary channel in pairing constrained devices.

We pursue a systematic investigation of the security of vibration channel against an eavesdropping attacker. Recent work suggests sending the keying material over a clear vibrational channel poses a significant risk of an acoustic side channel attack. Specifically, an adversary can listen onto the acoustic sounds generated by the vibration motor of the sending device and infer the keying material with a high accuracy. To counteract this threat, we aim to design a novel pairing scheme, called Vibreaker (a “Vibrating speaker”), that involves active injection of acoustic noise in order to mask the key signal. In this scheme, the sending device artificially injects noise in the otherwise clear audio channel while transmitting the keying material via vibrations. The scheme requires no additional effort by the user, and imposes minimum hardware requirement and hence can be applied to many different contexts, such as pairing of IoT and implanted devices, wearables and other commodity gadgets.

Figure 2: Noisy vibrational pairing in the face of an acoustic eavesdropping attacker.

Figure 2: Noisy vibrational pairing in the face of an acoustic eavesdropping attacker.

We also examine the prospect of a co-resident eavesdropping model where the eavesdropper is co-located with the victim device(s). We found out that such an attacker is able to breach noisy vibration pairing such as Vibreaker due to inefficiency of current hardware present on constrained wireless devices. We aim to enhance the existing noisy vibrational pairing by adding low frequency tones that will cloak the footprints of vibration sounds at sub 500Hz frequency bands. We also study the usability of the enhanced masking signal and its effect on the decoding ability of the receiving device.

People

Faculty

  • Nitesh Saxena

Student

  • S Abhishek Anand (PhD candidate)

Publication

  • Noisy Vibrational Pairing of IoT Devices
    Abhishek Anand, and Nitesh Saxena
    In IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Emerging Attacks and Solutions for Secure Hardware in the Internet of Things, 2018.
    [pdf]
  • Coresident Evil: Noisy Vibrational Pairing in the Face of Co-located Acoustic Eavesdropping.
    S Abhishek Anand and Nitesh Saxena.
    In 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2017.
    [pdf]
  • Vibreaker: Securing Vibrational Pairing with Deliberate Acoustic Noise.
    S Abhishek Anand and Nitesh Saxena.
    In 9th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec), 2016.
    [pdf]

Recent News

  • “Neuro Security” work got a MURI award from AFOSR March 22, 2023
  • Paper accepted to Oakland 2023 March 14, 2023
  • Paper (conditionally) accepted to MobiSys 2023 February 27, 2023
  • Paper accepted to USENIX Security 2023 February 21, 2023
  • 2 full papers accepted to WiSec 2023 January 30, 2023
  • Cybersecurity Program Led By Dr. Saxena Ranks Best! January 26, 2023
  • EarSpy in Media January 26, 2023
  • Dr. Saxena is a Co-PI on Thematic AI Lab November 28, 2022
  • Paper accepted to PMC 2022 November 28, 2022
  • Paper accepted to ICISC 2022 November 28, 2022
  • A New Grant from NSA October 17, 2022
  • Dr. Saxena appointed as a Dean’s Research Fellow October 17, 2022
  • Dr. Saxena to lead a new SaTC Medium project on Election Security July 16, 2022
  • SPIES Lab’s 12th PhD Graduate — Anuradha Mandal July 16, 2022
  • SPIES Lab’s 11th PhD Graduate – Payton Walker July 6, 2022
  • Two papers accepted to PST 2022 June 9, 2022
  • Paper accepted to ICDCS 2022 April 4, 2022
  • Paper accepted CHIL 2022 March 19, 2022
  • 2 papers accepted to WiSec 2022 March 19, 2022
  • Paper accepted to EuroS&P 2022 February 12, 2022

© 2016–2023 SPIES Lab, Computer Science and Engineering Log in

Texas A&M Engineering Experiment Station Logo
  • College of Engineering
  • Facebook
  • Twitter
  • State of Texas
  • Open Records
  • Risk, Fraud & Misconduct Hotline
  • Statewide Search
  • Site Links & Policies
  • Accommodations
  • Environmental Health, Safety & Security
  • Employment