<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Tue, 21 Apr 2026 16:40:47 -0400" url="https://beta.my.umbc.edu/groups/csee/posts.xml?tag=authentication">
<NewsItem contentIssues="true" id="131367" important="false" status="posted" url="https://beta.my.umbc.edu/groups/csee/posts/131367">
<Title>Talk: Analysis of FIDO UAF Authentication, 12-1 ET Fri 3/3</Title>
<Tagline>Cryptographic Binding Should Not Be Optional</Tagline>
<Body>
<![CDATA[
    <div class="html-content"><img src="https://www.csee.umbc.edu/wp-content/uploads/sites/659/2023/03/FIDO2-Graphic-v2.jpg" style="max-width: 100%; height: auto;"><div><strong><br></strong></div><div><span><strong>The UMBC Cyber Defense Lab presents</strong></span></div><div><div><br></div><h4><strong>Cryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Authentication</strong></h4><div><strong><br></strong></div><h5><strong>Ennis Golaszewski, </strong><strong>UMBC Cyber Defense Lab</strong></h5><div><strong><br></strong></div><h5><strong>12-1pm ET, Friday, 3 March 2023, via <a href="https://umbc.webex.com/meet/sherman" rel="nofollow external" class="bo">WebEx</a></strong></h5><div><br></div><div>We present a formal-methods analysis of the <a href="https://fidoalliance.org/specifications/" rel="nofollow external" class="bo">FIDO Universal Authentication Framework</a> (UAF) authentication protocol, and we present a case study that highlights the pitfalls of optional cryptographic binding by illustrating a man-in-the-middle attack against UAF authentication when cryptographic channel-binding is absent. We carry out our analysis using the <a href="https://github.com/mitre/cpsa" rel="nofollow external" class="bo">Cryptographic Protocol Shapes Analyzer</a> (CPSA) on two significant variations of the protocol: one using the four available channel-binding mechanisms, and one without channel binding. In our case study, we confirm the presence of a harmful protocol interaction in which an adversary, by transferring information from one protocol context to another, can compel a UAF client and authenticator pair to act as confused deputies that help authenticate the adversary to an honest server. Also, we demonstrate the feasibility of such an attack against existing, open-source FIDO implementations, and we suggest potential mitigations.</div><div><br></div><div>Our work aims to promote the importance of cryptographic binding in mitigating protocol interactions within the Dolev-Yao intruder model to mitigate man-in-the-middle attacks that exploit flaws in a protocol's structure. Protocol designers and policy makers must be aware that, if cryptographic binding is an optional feature of a protocol standard, then serious vulnerabilities may result. Additionally, we discuss the groundwork for incorporating cryptographic binding into network protocol specifications automatically. Cryptographic binding is a vital tool for resisting adversarial protocol interactions, and many existing and emerging standards, including UAF, do not bind adequately.</div><div><br></div><div><strong><a href="https://www.linkedin.com/in/ennis-golaszewski-88742179/" rel="nofollow external" class="bo">Ennis Golaszewski</a></strong> (<a href="mailto:golaszewski@umbc.edu">golaszewski@umbc.edu</a>) is a computer science PhD student at UMBC under Alan T. Sherman, where he studies, researches, and teaches cryptographic protocol analysis.</div><div><br></div><div>Host: Alan T. Sherman, <a href="mailto:sherman@umbc.edu">sherman@umbc.edu</a>. Support for this event was provided in part by the National Science Foundation under SFS grant DGE-1753681. The UMBC Cyber Defense Lab meets biweekly Fridays 12-1pm.  All meetings are open to the public.</div><div><br></div></div></div>
]]>
</Body>
<Summary>The UMBC Cyber Defense Lab presents      Cryptographic Binding Should Not Be Optional: A Formal-Methods Analysis of FIDO UAF Authentication     Ennis Golaszewski, UMBC Cyber Defense Lab     12-1pm...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/131367/guest@my.umbc.edu/f23547d99284c2ffca572a224be11d3f/api/pixel</TrackingUrl>
<Tag>authentication</Tag>
<Tag>cybersecurity</Tag>
<Tag>fido</Tag>
<Group token="csee">Computer Science and Electrical Engineering</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/csee</GroupUrl>
<AvatarUrl>https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="original">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/original.png?1314043393</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="xlarge">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xlarge.png?1314043393</AvatarUrl>
<AvatarUrl size="large">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/large.png?1314043393</AvatarUrl>
<AvatarUrl size="medium">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/medium.png?1314043393</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/small.png?1314043393</AvatarUrl>
<AvatarUrl size="xsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xsmall.png?1314043393</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/000/099/d117dca133c64bf78a4b7696dd007189/xxsmall.png?1314043393</AvatarUrl>
<Sponsor>Computer Science and Electrical Engineering</Sponsor>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 01 Mar 2023 18:14:11 -0500</PostedAt>
<EditAt>Wed, 01 Mar 2023 18:36:54 -0500</EditAt>
</NewsItem>

</News>
