Research Article

Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild

Figure 2

Flow of Windows Hello migration attack. An attacker identifies a victim’s authentication data for Windows Hello and extracts it from the victim’s device. The attacker then calibrates it to their device. Finally, the attacker accesses applications with the victim’s account.