Cryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Channel Binding

dc.contributor.authorGolaszewski, Enis
dc.contributor.authorSherman, Alan T.
dc.contributor.authorZieglar, Edward
dc.contributor.authorFuchs, Jonathan D.
dc.contributor.authorHamer, Sophia
dc.date.accessioned2026-01-06T20:51:51Z
dc.date.issued2025-11-08
dc.descriptionSecurity Standardisation Research (SSR) 2025 in Passau, Germany, 4.–5. Dec. ’25
dc.description.abstractAs a case study in cryptographic binding, we present a formal-methods analysis of the cryptographic channel binding mechanisms in the Fast IDentity Online (FIDO) Universal Authentication Framework (UAF) authentication protocol, which seeks to reduce the use of traditional passwords in favor of authentication devices. First, we show that UAF's channel bindings fail to mitigate protocol interaction by a Dolev-Yao adversary, enabling the adversary to transfer the server's authentication challenge to alternate sessions of the protocol. As a result, in some contexts, the adversary can masquerade as a client and establish an authenticated session with a server (e.g., possibly a bank server). Second, we implement a proof-of-concept man-in-the-middle attack against eBay's open source FIDO UAF implementation. Third, we propose and formally verify improvements to UAF. The weakness we analyze is similar to the vulnerability discovered in the Needham-Schroeder protocol over 25 years ago. That this vulnerability appears in the FIDO UAF standard highlights the strong need for protocol designers to bind messages properly and to analyze their designs with formal-methods tools. To our knowledge, we are first to carry out a formal-methods analysis of channel binding in UAF and first to exhibit details of an attack on UAF that exploits the weaknesses of UAF's channel binding. Our case study illustrates the importance of cryptographically binding context to protocol messages to prevent an adversary from misusing messages out of context.
dc.description.sponsorshipWe thank Joshua Guttman for helpful comments and valuable guidance on proving security goals using CPSA. Our work evolves CPSA models of UAF registration created by Danning Liu [25]. Thanks also to Ted Selker for suggesting ways to clarify the presentation. Alan Sherman and Enis Golaszewski were supported in 2023 in part by the National Security Agency under an INSuRE+C grant via Northeastern University, and by the UMBC cybersecurity exploratory grant program. Alan Sherman was also supported in part by the National Science Foundation under DGE grants 1753681 and 2438185 (SFS), 1819521 (SFS Capacity), and 2138921 (SaTC).
dc.description.urihttp://arxiv.org/abs/2511.06028
dc.format.extent48 pages
dc.genreconference papers and proceedings
dc.genrepreprints
dc.identifierdoi:10.13016/m2gw1p-7a8k
dc.identifier.urihttps://doi.org/10.48550/arXiv.2511.06028
dc.identifier.urihttp://hdl.handle.net/11603/41381
dc.language.isoen
dc.relation.isAvailableAtThe University of Maryland, Baltimore County (UMBC)
dc.relation.ispartofUMBC Computer Science and Electrical Engineering Department
dc.relation.ispartofUMBC Mathematics and Statistics Department
dc.relation.ispartofUMBC Student Collection
dc.relation.ispartofUMBC Faculty Collection
dc.rightsThis work was written as part of one of the author's official duties as an Employee of the United States Government and is therefore a work of the United States Government. In accordance with 17 U.S.C. 105, no copyright protection is available for such works under U.S. Law.
dc.rightsPublic Domain
dc.rights.urihttps://creativecommons.org/publicdomain/mark/1.0/
dc.subjectComputer Science - Cryptography and Security
dc.subjectUMBC ATOMS Lab
dc.subjectUMBC Cyber Defense Lab (CDL)
dc.titleCryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Channel Binding
dc.typeText
dcterms.creatorhttps://orcid.org/0000-0003-1130-4678
dcterms.creatorhttps://orcid.org/0009-0003-1528-0244
dcterms.creatorhttps://orcid.org/0000-0002-0814-9956
dcterms.creatorhttps://orcid.org/0009-0003-8031-3188

Files

Original bundle

Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2511.06028v1.pdf
Size:
485.96 KB
Format:
Adobe Portable Document Format