Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Complex Paths and Derelict Sentinels - Software Engineering Underpinnings of NTP Vulnerabilities

IEEE via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the software engineering underpinnings of recent Network Time Protocol (NTP) vulnerabilities in this IEEE conference talk. Delve into the complex paths and derelict sentinels that have led to security issues in the de facto standard for synchronizing computer clocks on the Internet. Examine how specific software engineering choices may have caused or obscured these vulnerabilities. Review several recent cases where attackers could arbitrarily control remote system clocks using NTP. Cover NTP basics, packet consistency checks, ephemeral associations, and spoofing. Gain insights into improving the security of time synchronization protocols and implementations.

Syllabus

Intro
NTP basics
Packet consistency checks
Ephemeral associations
Spoofing

Taught by

IEEE Symposium on Security and Privacy

Reviews

Start your review of Complex Paths and Derelict Sentinels - Software Engineering Underpinnings of NTP Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.