Research Article

Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices

Figure 3

Simplified UAF protocol operation.