Analyzing HTTPS Encrypted Traffic to Identify User’s Operating System, Browser and Application

Author
Ariel University, Ben-Gurion University of the Negev

The paper looks into how external attackers (who are able to eavesdrop on the network traffic of a device from the network side) can identify the operating system, browser and application of HTTP encrypted traffic (HTTPS).

Share on FacebookTweet