Comprehensive threat analysis with 15 attack scenarios and mitigations for the AAP protocol.
Review security considerations section in the spec
Secure deployment patterns for production
See security best practices in working code