nally, it would be interesting to extend our work by
taking inspiration from some of the considerations
presented in a report (ENISA, 2021) released by the
European Union Agency for Cybersecurity (ENISA)
after this work was already completed.
ACKNOWLEDGEMENTS
The research has been partly supported by Cher-
ryChain S.r.l. in the context of a research and inno-
vation project funded by the Autonomous Province of
Trento, and by IPZS (Poligrafico e Zecca dello Stato
Italiano, the Italian Government Printing Office and
Mint) within the joint laboratory DigiMat Lab.
REFERENCES
AgID (2020). SPID. https://www.spid.gov.it/.
Authenteq (2020). Identity Verification Without Compro-
mise. https://authenteq.com/.
Built for Mars (2020). Opening an account. https://
builtformars.co.uk/banks/opening/.
Campbell, B., Bradley, J., Sakimura, N., and Lodderstedt, T.
(2020). RFC 8705. https://tools.ietf.org/html/rfc8705.
Cassidy, N. (2018). Onfido launches the market’s
most robust video liveness detection. https:
//onfido.com/resources/blog/news-onfido-launches-
the-market-s-most-robust-liveness-detection.
Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley,
R., and Polk, W. (2008). RFC 5280. https://tools.ietf.
org/html/rfc5280.html.
ENISA (2021). Remote ID Proofing. https:
//www.enisa.europa.eu/publications/enisa-report-
remote-id-proofing.
Feng, H., Li, H., Pan, X., and Zhao, Z. (2021). A For-
mal Analysis of the FIDO UAF Protocol. In Network
and Distributed System Security Symposium, NDSS
2021. https://www.ndss-symposium.org/ndss-paper/
a-formal-analysis-of-the-fido-uaf-protocol/.
Fett, D., Küsters, R., and Schmitz, G. (2016). A Compre-
hensive Formal Security Analysis of OAuth 2.0. In
Proceedings of the 2016 ACM SIGSAC Conference
on Computer and Communications Security, CCS ’16.
https://doi.org/10.1145/2976749.2978385.
GIXEL (2009). European Card for e-Services and National
e-ID Applications: Identification Authentication Sig-
nature European Citizen Card (IAS ECC).
Grassi, P. A. and Fenton, J. L. (2017). Digital Identity
Guidelines: Enrollment and Identity Proofing. SP
800-63A. https://doi.org/10.6028/NIST.SP.800-63a.
Grassi, P. A., Fenton, J. L., Newton, E. M., Perlner, R. A.,
Regenscheid, A. R., Burr, W. E., and Richer, J. P.
(2017a). Digital Identity Guidelines: Authentication
and Lifecycle Management. NIST Special Publication
800-63B. https://doi.org/10.6028/NIST.SP.800-63b.
Grassi, P. A., Garcia, M. E., and Fenton, J. L. (2017b).
Digital Identity Guidelines. SP 800-63-3. https:
//doi.org/10.6028/NIST.SP.800-63-3.
HooYu (2020). Identify. https://www.hooyu.com/h/hooyu-
identify/.
ICAO (2015). MRTD. Doc 9303. https://www.icao.int/
publications/pages/publication.aspx?docnum=9303.
iDenfy (2020a). Identity Verification Service. https://www.
idenfy.com/.
iDenfy (2020b). Liveness Detection to prevent Spoofing At-
tack. https://www.idenfy.com/blog/spoofing-attack-
prevention/.
Jacomme, C. and Kremer, S. (2021). An Extensive For-
mal Analysis of Multi-Factor Authentication Proto-
cols. ACM Trans. Priv. Secur., 24(2). https://doi.org/
10.1145/3440712.
Jumio (2020a). Certified Liveness Detection. https://www.
jumio.com/technology/live-detection/.
Jumio (2020b). Jumio. https://www.jumio.com/.
Monzo (2020). Monzo. https://monzo.com/.
NIST (2017). Digital Identity Guidelines document suite.
SP 800-63. https://pages.nist.gov/800-63-3/.
Onfido (2020). User onboarding. https://onfido.com/use-
cases/user-onboarding/.
OWASP (2018). OWASP Risk Rating Methodol-
ogy. https://owasp.org/www-community/OWASP_
Risk_Rating_Methodology.
OWASP (2020). Mobile Application Secu-
rity Verification Standard. Version 1.2.
https://github.com/OWASP/owasp-masvs/releases/
download/v1.2/OWASP_MASVS-v1.2-en.pdf.
Pernpruner, M., Carbone, R., Ranise, S., and Sciarretta, G.
(2020). The Good, the Bad and the (Not So) Ugly of
Out-of-Band Authentication with eID Cards and Push
Notifications: Design, Formal and Risk Analysis. In
Proceedings of the Tenth ACM Conference on Data
and Application Security and Privacy, CODASPY
’20. https://doi.org/10.1145/3374664.3375727.
Poste Italiane (2020). PosteID abilitato a SPID. https://
posteid.poste.it/.
Revolut (2020). Get more from your money. https://www.
revolut.com/.
Sudhodanan, A., Armando, A., Carbone, R., and Com-
pagna, L. (2016). Attack Patterns for Black-Box
Security Testing of Multi-Party Web Applications. In
Network and Distributed System Security Symposium,
NDSS 2016. https://www.ndss-symposium.org/wp-
content/uploads/2017/09/attack-patterns-black-box-
security-testing-multi-party-web-applications.pdf.
Thales Group (2020). ID Verification Suite. https:
//www.thalesgroup.com/en/markets/digital-identity-
and-security/government/identity-verification.
Veriff (2020). Veriff. https://www.veriff.com/.
Yang, R., Lau, W. C., and Liu, T. (2016). Sign-
ing Into One Billion Mobile App Accounts
Effortlessly with OAuth2.0. In Black Hat Eu-
rope 2016. https://www.blackhat.com/docs/eu-
16/materials/eu-16-Yang-Signing-Into-Billion-
Mobile-Apps-Effortlessly-With-OAuth20-wp.pdf.
A Framework for Security and Risk Analysis of Enrollment Procedures: Application to Fully-remote Solutions based on eDocuments
233