Research Article

Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices

Figure 2

Trust Model of FIDO UAF Client.