Cybersecurity Vulnerabilities in Precision Time Protocol - Attacks and Mitigations
Open Compute Project via YouTube
Finance Certifications Goldman Sachs & Amazon Teams Trust
AI, Data Science & Business Certificates from Google, IBM & Microsoft
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn about critical cybersecurity vulnerabilities in the IEEE 1588 Precision Time Protocol (PTP) through a research presentation that demonstrates multiple zero-day exploits discovered in a PTP test bed environment. Explore experimental findings on various attack vectors including master clock spoofing, denial of service variations, data injection methods, and covert channel attacks. Examine how these exploits can manipulate timing offsets, create temporal vortex attacks, and affect clock frequency steering. Discover proposed mitigation techniques and future research directions for securing this high-precision timing and clock distribution protocol.
Syllabus
Cybersecurity for Precision Time Protocol Covert Channels, Code Injection, Spoofing, and DoS
Taught by
Open Compute Project