Detail publikace

PC Browser and Android Applications Fingerprinting

VICTOR, M.

Originální název

PC Browser and Android Applications Fingerprinting

Anglický název

PC Browser and Android Applications Fingerprinting

Jazyk

en

Originální abstrakt

This technical report summarizes results of the research focused on identification of PC browsers and Android applications from network communication. I review several fingerprinting methods and highlight their advantages and disadvantages. I will then delve on web browser fingerprinting by examining the values from TLS handshake, HTTP headers and DNS traffic. I discuss the reliability and stability of this multi-OS profiling of web browsers. Chapter 3 focuses on JA3, a specific method for creating TLS fingerprints in an easy to produce and shareable way. Based on previous research, I conduct various experiments using datasets obtained from network communication to observe the reliability of this approach in profiling web browsers and Android applications.

Anglický abstrakt

This technical report summarizes results of the research focused on identification of PC browsers and Android applications from network communication. I review several fingerprinting methods and highlight their advantages and disadvantages. I will then delve on web browser fingerprinting by examining the values from TLS handshake, HTTP headers and DNS traffic. I discuss the reliability and stability of this multi-OS profiling of web browsers. Chapter 3 focuses on JA3, a specific method for creating TLS fingerprints in an easy to produce and shareable way. Based on previous research, I conduct various experiments using datasets obtained from network communication to observe the reliability of this approach in profiling web browsers and Android applications.

Dokumenty

BibTex


@techreport{BUT168669,
  author="Malombe {Victor}",
  title="PC Browser and Android Applications Fingerprinting",
  annote="This technical report summarizes results of the research focused on
identification of PC browsers and Android applications from network
communication. I review several fingerprinting methods and highlight their
advantages and disadvantages. I will then delve on web browser fingerprinting by
examining the values from TLS handshake, HTTP headers and DNS traffic. I discuss
the reliability and stability of this multi-OS profiling of web browsers.
Chapter 3 focuses on JA3, a specific method for creating TLS fingerprints in an
easy to produce and shareable way. Based on previous research, I conduct various
experiments using datasets obtained from network communication to observe the
reliability of this approach in profiling web browsers and Android applications.",
  address="NEUVEDEN",
  chapter="168669",
  edition="NEUVEDEN",
  howpublished="print",
  institution="NEUVEDEN",
  year="2020",
  month="august",
  pages="0--0",
  publisher="NEUVEDEN",
  type="report"
}