National Repository of Grey Literature 5 records found  Search took 0.00 seconds. 
Platform for Automated Fingerprints Generation for Mobile Apps
Kičinka, Kristián ; Grégr, Matěj (referee) ; Matoušek, Petr (advisor)
The goal of this work is to develop a platform that would enable automated TLS fingerprinting of mobile applications for the Android platform. The thesis contains information required to understand the issues of TLS fingerprinting, the available types of fingerprints and the method of creating mobile application fingerprints using TLS fingerprints, the design and implementation of the modules required to create the platform. It discusses the issues of automated application acquisition, installation and launching in order to analyze network communication and create fingerprints. It covers the storage and versioning of the created fingerprints and the experiments performed with the created platform in order to verify the functionality and usability of the platform in a real-world environment. It also includes analysis of communication of malicious and malware applications. The platform will contribute to improvements in the field of network traffic analysis, to increase the efficiency of network administrator’s work and is useful in monitoring network communication to identify individual applications on the network, in identifying malicious applications or detecting malware.
Detection of Mobile Applications Using Traffic Profiling
Babic, Radovan ; Grégr, Matěj (referee) ; Matoušek, Petr (advisor)
This bachelor thesis deals with JA3 and JA3S methods of digital profiling of mobile applications based on TLS handshake between client and server. The thesis describes the used method of emulation of mobile devices using the Android operating system, installation of applications, generation and capture of traffic needed to create a database of profiles. Furthermore, the work describes the method that I implemented in the tool for automated creation of a database of digital profiles of applications and their subsequent classification and recognition using data obtained from internet traffic in the network.
Mobile Application Identification Based on TLS Data
Borbély, Richard ; Matoušek, Petr (referee) ; Burgetová, Ivana (advisor)
This thesis deals with identification of mobile applications based on data from network protocol TLS. It conducts a research of values from the TLS handshake, specifically of JA3, JA3S and SNI values. The work represents an application that includes an algorithm performing a classification over TLS data. The results of the classification represent information based on which we can decide, if the identification of the apps was successful. This method allowed to identify 17 of the 18 given applications. The benefit of this work is the ability to identify mobile apps based on JA3, JA3S and SNI values and for example, it can be used in network administration.
Detection of Mobile Applications Using Traffic Profiling
Babic, Radovan ; Grégr, Matěj (referee) ; Matoušek, Petr (advisor)
This bachelor thesis deals with JA3 and JA3S methods of digital profiling of mobile applications based on TLS handshake between client and server. The thesis describes the used method of emulation of mobile devices using the Android operating system, installation of applications, generation and capture of traffic needed to create a database of profiles. Furthermore, the work describes the method that I implemented in the tool for automated creation of a database of digital profiles of applications and their subsequent classification and recognition using data obtained from internet traffic in the network.
Mobile Application Identification Based on TLS Data
Borbély, Richard ; Matoušek, Petr (referee) ; Burgetová, Ivana (advisor)
This thesis deals with identification of mobile applications based on data from network protocol TLS. It conducts a research of values from the TLS handshake, specifically of JA3, JA3S and SNI values. The work represents an application that includes an algorithm performing a classification over TLS data. The results of the classification represent information based on which we can decide, if the identification of the apps was successful. This method allowed to identify 17 of the 18 given applications. The benefit of this work is the ability to identify mobile apps based on JA3, JA3S and SNI values and for example, it can be used in network administration.

Interested in being notified about new results for this query?
Subscribe to the RSS feed.