Research Article

Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices

Figure 9

A pop-up window asking the victim to choose a UAF Client.