Research Article

Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices

Figure 7

Overview of Authenticator Rebinding Attack.