Analyzing HTTPS Encrypted Traffic to Identify User’s Operating System, Browser and Application

Share on FacebookTweet

The paper looks into how external attackers (who are able to eavesdrop on the network traffic of a device from the network side) can identify the operating system, browser and application of HTTP encrypted traffic (HTTPS).

Author
Ariel University, Ben-Gurion University of the Negev
Share on FacebookTweet