Research Article
Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices
Table 1
The difference between the two kinds of attacks.
| | Type-A Rebinding Attack | Type-B Rebinding Attack |
| Attack target | Some User Agents calling third-party UAF Clients | A specific User Agent with In-App Authenticator | Requiring the root permission | No | Yes | Requiring additional user interaction | Yes | No | Requiring reverse analysis | No | Yes |
|
|