{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:36:25Z","timestamp":1764333385631,"version":"3.37.3"},"reference-count":50,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T00:00:00Z","timestamp":1717200000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2024,6]]},"DOI":"10.1109\/tnsm.2024.3364526","type":"journal-article","created":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T18:33:14Z","timestamp":1707503594000},"page":"2582-2595","source":"Crossref","is-referenced-by-count":6,"title":["EFACTLS: Effective Active TLS Fingerprinting for Large-Scale Server Deployment Characterization"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7322-5804","authenticated-orcid":false,"given":"Markus","family":"Sosnowski","sequence":"first","affiliation":[{"name":"Department of Computer Science, TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2918-016X","authenticated-orcid":false,"given":"Johannes","family":"Zirngibl","sequence":"additional","affiliation":[{"name":"Department of Computer Science, TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9375-3113","authenticated-orcid":false,"given":"Patrick","family":"Sattler","sequence":"additional","affiliation":[{"name":"Department of Computer Science, TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany"}]},{"given":"Georg","family":"Carle","sequence":"additional","affiliation":[{"name":"Department of Computer Science, TUM School of Computation, Information and Technology, Technical University of Munich, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8270-9360","authenticated-orcid":false,"given":"Claas","family":"Grohnfeldt","sequence":"additional","affiliation":[{"name":"Huawei Munich Research Center, Munich, Germany"}]},{"given":"Michele","family":"Russo","sequence":"additional","affiliation":[{"name":"Huawei Munich Research Center, Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5238-8068","authenticated-orcid":false,"given":"Daniele","family":"Sgandurra","sequence":"additional","affiliation":[{"name":"Huawei Munich Research Center, Munich, Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/c2015-0-00743-2"},{"key":"ref2","first-page":"1","article-title":"Internet traffic 2009-2019","volume-title":"Proc. Asia Pac. Reg. Internet Conf. Oper. Technol.","author":"Labovitz"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278568"},{"key":"ref4","article-title":"Accurate TLS fingerprinting using destination context and knowledge bases","author":"Anderson","year":"2020","journal-title":"arXiv:2009.01939"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2015.35"},{"volume-title":"TLS Fingerprinting With JA3 and JA3S","year":"2019","author":"Althouse","key":"ref6"},{"volume-title":"Nearly Half of Malware Now Use TLS to Conceal Communications","year":"2021","author":"Gallagher","key":"ref7"},{"journal-title":"Easily Identify Malicious Servers on the Internet With JARM","year":"2020","author":"Althouse","key":"ref8"},{"volume-title":"Data definitions.","year":"2023","key":"ref9"},{"key":"ref10","first-page":"1","article-title":"Active TLS stack fingerprinting: Characterizing TLS server deployments at scale","volume-title":"Proc. Netw. Traffic Meas. Anal. Conf. (TMA)","author":"Sosnowski"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23386"},{"volume-title":"We will be retiring Alexa.com on may 1, 2022.","year":"2021","key":"ref12"},{"key":"ref13","first-page":"1","article-title":"Toward undetected operating system fingerprinting","volume-title":"Proc. USENIX Workshop Offens. Technol.","author":"Greenwald"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2015.2447492"},{"volume-title":"Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning","year":"2009","author":"Lyon","key":"ref15"},{"key":"ref16","article-title":"QUIC library hunter: Identifying server libraries across the Internet","author":"Zirngibl","year":"2023","journal-title":"arXiv:2308.15841"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9000"},{"volume-title":"SSLyze.","year":"2023","author":"Diquet","key":"ref18"},{"volume-title":"Testing TLS\/SSL encryption, Dirk Wetter.","year":"2023","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-28486-1_6"},{"volume-title":"TLS prober-an SSL\/TLS server fingerprinting tool.","year":"2023","author":"Moore","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3278532.3278543"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.17487\/rfc6066"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472928"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC58397.2023.10218210"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3411740.3411742"},{"volume-title":"Transport Layer Security (TLS) Extensions","year":"2023","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8446"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/BF01013465"},{"volume-title":"MassDNS.","year":"2023","author":"Birk Blechschmidt","key":"ref31"},{"volume-title":"Unbound.","year":"2024","key":"ref32"},{"volume-title":"TUM goscanner.","year":"2024","author":"Gasser","key":"ref33"},{"key":"ref34","first-page":"325","article-title":"Mission accomplished? HTTPS security after Diginotar","volume-title":"Proc. ACM Int. Meas. Conf. (IMC)","author":"Amann"},{"key":"ref35","first-page":"605","article-title":"ZMap: Fast Internetwide scanning and its security applications","volume-title":"Proc. USENIX Security Symp.","author":"Durumeric"},{"volume-title":"The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research","year":"2012","author":"Dittrich","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2896816"},{"volume-title":"Active TLS fingerprinting: Additional material.","year":"2024","key":"ref38"},{"volume-title":"Transport Layer Security (TLS) Parameters","year":"2023","key":"ref39"},{"volume-title":"SEC 2: Recommended Elliptic Curve Domain Parameters","year":"2010","author":"Brown","key":"ref40"},{"volume-title":"EFACTLS measurement data","year":"2024","author":"Sosnowski","key":"ref41"},{"volume-title":"SSL Certificate Blacklist","year":"2023","key":"ref42"},{"volume-title":"Feodo tracker","year":"2023","key":"ref43"},{"volume-title":"High-Reliability OCSP Stapling and Why It Matters","year":"2017","author":"Sullivan","key":"ref44"},{"volume-title":"Route Views Archive Project","year":"2024","key":"ref45"},{"volume-title":"Pyasn.","year":"2024","author":"Asghari","key":"ref46"},{"volume-title":"Internet Services","year":"2023","key":"ref47"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76481-8_9"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1842733.1842736"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.3390\/e6050388"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10599562\/10430411.pdf?arnumber=10430411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,19]],"date-time":"2024-07-19T05:52:10Z","timestamp":1721368330000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10430411\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6]]},"references-count":50,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2024.3364526","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2024,6]]}}}