Research Article

Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices

Figure 1

Architecture of the UAF protocol.