Learn about critical cybersecurity vulnerabilities in the IEEE 1588 Precision Time Protocol (PTP) through a research presentation that demonstrates multiple zero-day exploits discovered in a PTP test bed environment. Explore experimental findings on various attack vectors including master clock spoofing, denial of service variations, data injection methods, and covert channel attacks. Examine how these exploits can manipulate timing offsets, create temporal vortex attacks, and affect clock frequency steering. Discover proposed mitigation techniques and future research directions for securing this high-precision timing and clock distribution protocol.
Cybersecurity Vulnerabilities in Precision Time Protocol - Attacks and Mitigations
Open Compute Project via YouTube
Overview
Syllabus
Cybersecurity for Precision Time Protocol Covert Channels, Code Injection, Spoofing, and DoS
Taught by
Open Compute Project