
References
● [Ristić; 2009] HTTP client fingerprinting using SSL handshake analysis.
https://blog.ivanristic.com/2009/06/http-client-fingerprinting-using-ssl-handshake-analysis.html
● [Majkowski; 2012] SSL fingerprinting for p0f. https://idea.popcount.org/2012-06-17-ssl-fingerprinting-for-p0f
● [Brotherston; 2015] TLS Fingerprinting: Smarter Defending & Stealthier Attacking.
https://blog.squarelemon.com/tls-fingerprinting/
● [Anderson, McGrew; 2016]. TLS Fingerprinting in the Real World.
https://blogs.cisco.com/security/tls-fingerprinting-in-the-real-world
● [Durumeric et al.; 2017] The Security Impact of HTTPS Interception.
https://jhalderm.com/pub/papers/interception-ndss17.pdf
● [Althouse, Atkinson, Atkins; 2017]. TLS Fingerprinting with JA3 and JA3S.
https://engineering.salesforce.com/tls-fingerprinting-with-ja3-and-ja3s-247362855967
● [Frolov, Wustrow; 2019]. Tlsfingerprint.io
● [Raman et al.; 2019] Kazakhstan’s HTTPS Interception. https://censoredplanet.org/kazakhstan