FINDING · DEFENSE

The paper demonstrates that 'having no fingerprint is itself a fingerprint': randomizing obfuscators that emit uniformly random bytes from the first packet are detectable precisely because conventional protocols (TLS, SSH, HTTP) always begin with fixed plaintext headers. This structural distinction requires no deep payload parsing — the attack operates on only the first TCP packet — and achieves TPR=1.0 / FPR=0.002 against obfsproxy3/4 using commodity-implementable statistics.

From 2015-wang-seeingSeeing through Network-Protocol Obfuscation · §1, §5.1 · 2015 · Computer and Communications Security

Implications

Tags

censors
generic
techniques
random-payload-detectfully-encrypted-detect
defenses
randomizationobfs4pluggable-transport

Extracted by claude-sonnet-4-6 — review before relying.