2021
DOI: 10.1007/978-3-030-68734-2_1
|View full text |Cite
|
Sign up to set email alerts
|

On Reliability of JA3 Hashes for Fingerprinting Mobile Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 27 publications
0
2
0
Order By: Relevance
“…It contains server names (TLS SNI extension), used application protocol (TLS ALPN extension), and TLS JA3 fingerprints. 4 All of these values are commonly used in encrypted traffic analysis [7] , [13] , [14] . The description of provided flow data fields is in Table 1 .…”
Section: Data Descriptionmentioning
confidence: 99%
“…It contains server names (TLS SNI extension), used application protocol (TLS ALPN extension), and TLS JA3 fingerprints. 4 All of these values are commonly used in encrypted traffic analysis [7] , [13] , [14] . The description of provided flow data fields is in Table 1 .…”
Section: Data Descriptionmentioning
confidence: 99%
“…To the best of our knowledge, ref. [104] is the only research on JA3's reliability. The authors insist that JA3 is not sufficient for mobile app identifications; however, a combination of JA3, JA3S, and SNI can improve reliability.…”
Section: Tls Flow Fingerprintingmentioning
confidence: 99%