Research Article

Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild

Table 4

Comparison of security properties of related works. Our focus is on the threats and attack scenarios presented by the studies and whether the attacks are feasible. We investigated the protocol, analysis method, analysis target, and attack model targeted for previous works.

ItemProperty[28][29][30][31][32][33][34][35][36][37][38][39]

ProtocolUAF/WebAuthn
U2F/CTAP

Analysis targetDesign
Implementation

Analysis methodFormal
Informal

Attack modelServer attacker
Network attacker
Web attacker
Local attacker (without TEE)
Local attacker (with TEE)
Human error