Research Article

Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices

Figure 4

UAF implementation in Out-App Authenticator Mode.