Security Analysis and Bypass User Authentication Bound to Device of Windows Hello in the Wild
Table 4
Comparison of security properties of related works. Our focus is on the threats and attack scenarios presented by the studies and whether the attacks are feasible. We investigated the protocol, analysis method, analysis target, and attack model targeted for previous works.