Browser Fingerprinting using Combinatorial Sequence Testing
Bernhard Garn, Dimitris Simos, Stefan Zimmer, D. Richard Kuhn, Raghu N. Kacker
In this paper, we propose an approach for browser fingerprinting using their behavior during the TLS 1.2 handshake with a server. Using combinatorial methods, we created test sets consisting of TLS server-side messages as sequences that are sent to the client as server responses during the TLS handshake. We created an appropriate abstract model of the TLS handshake protocol and used it to map browser behavior to a feature vector and use them to derive a distinguisher. We evaluate our approach with a case study showing that combinatorial properties have an impact on browsers' behavior.
, Simos, D.
, Zimmer, S.
, Kuhn, D.
and Kacker, R.
Browser Fingerprinting using Combinatorial Sequence Testing, Hot Topics in the Science of Security, Nashville, TN, US, [online], https://doi.org/10.1145/3314058.3314062, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=927531
(Accessed December 3, 2022)