NOTICE: Due to a lapse in annual appropriations, most of this website is not being updated. Learn more.
Form submissions will still be accepted but will not receive responses at this time. Sections of this site for programs using non-appropriated funds (such as NVLAP) or those that are excepted from the shutdown (such as CHIPS and NVD) will continue to be updated.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock (
) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Browser Fingerprinting using Combinatorial Sequence Testing
Published
Author(s)
Bernhard Garn, Dimitris Simos, Stefan Zimmer, D. Richard Kuhn, Raghu N. Kacker
Abstract
In this paper, we propose an approach for browser fingerprinting using their behavior during the TLS 1.2 handshake with a server. Using combinatorial methods, we created test sets consisting of TLS server-side messages as sequences that are sent to the client as server responses during the TLS handshake. We created an appropriate abstract model of the TLS handshake protocol and used it to map browser behavior to a feature vector and use them to derive a distinguisher. We evaluate our approach with a case study showing that combinatorial properties have an impact on browsers' behavior.
Garn, B.
, Simos, D.
, Zimmer, S.
, Kuhn, D.
and Kacker, R.
(2019),
Browser Fingerprinting using Combinatorial Sequence Testing, Hot Topics in the Science of Security, Nashville, TN, US, [online], https://doi.org/10.1145/3314058.3314062, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=927531
(Accessed October 20, 2025)