Cryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Channel Binding
| dc.contributor.author | Golaszewski, Enis | |
| dc.contributor.author | Sherman, Alan T. | |
| dc.contributor.author | Zieglar, Edward | |
| dc.contributor.author | Fuchs, Jonathan D. | |
| dc.contributor.author | Hamer, Sophia | |
| dc.date.accessioned | 2026-01-06T20:51:51Z | |
| dc.date.issued | 2025-11-08 | |
| dc.description | Security Standardisation Research (SSR) 2025 in Passau, Germany, 4.–5. Dec. ’25 | |
| dc.description.abstract | As a case study in cryptographic binding, we present a formal-methods analysis of the cryptographic channel binding mechanisms in the Fast IDentity Online (FIDO) Universal Authentication Framework (UAF) authentication protocol, which seeks to reduce the use of traditional passwords in favor of authentication devices. First, we show that UAF's channel bindings fail to mitigate protocol interaction by a Dolev-Yao adversary, enabling the adversary to transfer the server's authentication challenge to alternate sessions of the protocol. As a result, in some contexts, the adversary can masquerade as a client and establish an authenticated session with a server (e.g., possibly a bank server). Second, we implement a proof-of-concept man-in-the-middle attack against eBay's open source FIDO UAF implementation. Third, we propose and formally verify improvements to UAF. The weakness we analyze is similar to the vulnerability discovered in the Needham-Schroeder protocol over 25 years ago. That this vulnerability appears in the FIDO UAF standard highlights the strong need for protocol designers to bind messages properly and to analyze their designs with formal-methods tools. To our knowledge, we are first to carry out a formal-methods analysis of channel binding in UAF and first to exhibit details of an attack on UAF that exploits the weaknesses of UAF's channel binding. Our case study illustrates the importance of cryptographically binding context to protocol messages to prevent an adversary from misusing messages out of context. | |
| dc.description.sponsorship | We thank Joshua Guttman for helpful comments and valuable guidance on proving security goals using CPSA. Our work evolves CPSA models of UAF registration created by Danning Liu [25]. Thanks also to Ted Selker for suggesting ways to clarify the presentation. Alan Sherman and Enis Golaszewski were supported in 2023 in part by the National Security Agency under an INSuRE+C grant via Northeastern University, and by the UMBC cybersecurity exploratory grant program. Alan Sherman was also supported in part by the National Science Foundation under DGE grants 1753681 and 2438185 (SFS), 1819521 (SFS Capacity), and 2138921 (SaTC). | |
| dc.description.uri | http://arxiv.org/abs/2511.06028 | |
| dc.format.extent | 48 pages | |
| dc.genre | conference papers and proceedings | |
| dc.genre | preprints | |
| dc.identifier | doi:10.13016/m2gw1p-7a8k | |
| dc.identifier.uri | https://doi.org/10.48550/arXiv.2511.06028 | |
| dc.identifier.uri | http://hdl.handle.net/11603/41381 | |
| dc.language.iso | en | |
| dc.relation.isAvailableAt | The University of Maryland, Baltimore County (UMBC) | |
| dc.relation.ispartof | UMBC Computer Science and Electrical Engineering Department | |
| dc.relation.ispartof | UMBC Mathematics and Statistics Department | |
| dc.relation.ispartof | UMBC Student Collection | |
| dc.relation.ispartof | UMBC Faculty Collection | |
| dc.rights | This work was written as part of one of the author's official duties as an Employee of the United States Government and is therefore a work of the United States Government. In accordance with 17 U.S.C. 105, no copyright protection is available for such works under U.S. Law. | |
| dc.rights | Public Domain | |
| dc.rights.uri | https://creativecommons.org/publicdomain/mark/1.0/ | |
| dc.subject | Computer Science - Cryptography and Security | |
| dc.subject | UMBC ATOMS Lab | |
| dc.subject | UMBC Cyber Defense Lab (CDL) | |
| dc.title | Cryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Channel Binding | |
| dc.type | Text | |
| dcterms.creator | https://orcid.org/0000-0003-1130-4678 | |
| dcterms.creator | https://orcid.org/0009-0003-1528-0244 | |
| dcterms.creator | https://orcid.org/0000-0002-0814-9956 | |
| dcterms.creator | https://orcid.org/0009-0003-8031-3188 |
Files
Original bundle
1 - 1 of 1
