
[1] https://github.com/cisco/joy
[2] Blake Anderson, Subharthi Paul, David McGrew; Deciphering Malware’s Use of TLS (without
Decryption); arxiv, 2016; Journal of Computer Virology and Hacking Techniques, 2017.
[3] Blake Anderson, David McGrew; OS Fingerprinting: New Techniques and a Study of Information Gain
and Obfuscation; IEEE CNS 2017, https://arxiv.org/abs/1706.08003
[4] Platon Kotzias, Abbas Razaghpanah, Johanna Amann, Kenneth G. Paterson, Narseo Vallina-Rodriguez,
Juan Caballero; Coming of Age: A Longitudinal Study of TLS Deployment; IMC, 2018
[5] John B. Althouse, Jeff Atkinson, Josh Atkins; JA3 –A Method for Profiling SSL/TLS Clients
[6] Lee Brotherston; FingerprinTLS
References