TECHNIQUES
tls-fingerprint TLS ClientHello fingerprinting
JA3/JA4-style cipher-suite ordering, extensions, GREASE patterns.
17 PAPERS ON FILE
- 2025-alaraj-iran-refraction Measuring Censorship in Iran Using Refraction-based Proxies
- 2025-midtlien-fingerprint-resistant Fingerprint-resistant DTLS for usage in Snowflake
- 2025-mixon-baca-hidden Hidden Links: Analyzing Secret Families of VPN Apps
- 2025-rodriguez-revisiting Revisiting BAT Browsers: Protecting At-Risk Populations from Surveillance, Censorship, and Targeted Attacks
- 2025-xue-discriminative The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic
- 2024-almutairi-fingerprinting Fingerprinting VPNs with Custom Router Firmware: A New Censorship Threat Model
- 2024-chen-extended Extended Abstract: Oscur0: One-shot Circumvention without Registration
- 2024-xue-fingerprinting Fingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes
- 2023-niere-poster Poster: Circumventing the GFW with TLS Record Fragmentation
- 2023-wang-chasing Chasing Shadows: A security analysis of the ShadowTLS proxy
- 2022-xue-openvpn OpenVPN is Open to VPN Fingerprinting
- 2021-satija-blindtls BlindTLS: Circumventing TLS-Based HTTPS Censorship
- 2020-raman-investigating Investigating Large Scale HTTPS Interception in Kazakhstan
- 2015-frolov-the-use-of-tls The use of TLS in censorship circumvention
- 2016-fifield-fingerprintability Fingerprintability of WebRTC
- 2014-jones-automated Automated Detection and Fingerprinting of Censorship Block Pages
- 2013-houmansadr-parrot The Parrot is Dead: Observing Unobservable Network Communications