ArXiv TLDR

An Analysis of Attack Vectors Against FIDO2 Authentication

🐦 Tweet
2604.20826

Alexander Berladskyy, Andreas Aßmuth

cs.CR

TLDR

An analysis of FIDO2 authentication identifies and evaluates new attack vectors, concluding FIDO2 is largely phishing-resistant.

Key contributions

  • Analyzed FIDO2 (passkey) authentication workflows and existing attack vectors.
  • Identified and detailed two novel attack vectors: Infected Authenticator and Authenticator Deception.
  • Implemented and evaluated both new attack vectors against FIDO2 authentication.
  • Concluded that FIDO2 remains largely phishing-resistant, despite identified attack paths.

Why it matters

This paper is crucial for understanding FIDO2's security against phishing, a major online threat. It details specific attack vectors while confirming FIDO2's strong resilience, guiding developers and users toward more secure authentication. This validates FIDO2's role in significantly improving online security.

Original Abstract

Phishing attacks remain one of the most prevalent threats to online security, with the Anti-Phishing Working Group reporting over 890,000 attacks in Q3 2025 alone. Traditional password-based authentication is particularly vulnerable to such attacks, prompting the development of more secure alternatives. This paper examines passkeys, also known as FIDO2, which claim to provide phishing-resistant authentication through asymmetric cryptography. In this approach, a private key is stored on a user's device, the authenticator, while the server stores the corresponding public key. During authentication, the server generates a challenge that the user signs with the private key; the server then verifies the signature and establishes a session. We present passkey workflows and review state-of-the-art attack vectors from related work alongside newly identified approaches. Two attacks are implemented and evaluated: the Infected Authenticator attack, which generates attacker-known keys on a corrupted authenticator, and the Authenticator Deception attack, which spoofs a target website by modifying the browser's certificate authority store, installing a valid certificate, and intercepting user traffic. An attacker relays a legitimate challenge from the real server to a user, who signs it, allowing the attacker to authenticate as the victim. Our results demonstrate that successful attacks on passkeys require substantial effort and resources. The claim that passkeys are phishing-resistant largely holds true, significantly raising the bar compared to traditional password-based authentication.

📬 Weekly AI Paper Digest

Get the top 10 AI/ML arXiv papers from the week — summarized, scored, and delivered to your inbox every Monday.