Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Cybersecurity Vulnerabilities in Precision Time Protocol - Attacks and Mitigations

Open Compute Project via YouTube

Overview

Learn about critical cybersecurity vulnerabilities in the IEEE 1588 Precision Time Protocol (PTP) through a research presentation that demonstrates multiple zero-day exploits discovered in a PTP test bed environment. Explore experimental findings on various attack vectors including master clock spoofing, denial of service variations, data injection methods, and covert channel attacks. Examine how these exploits can manipulate timing offsets, create temporal vortex attacks, and affect clock frequency steering. Discover proposed mitigation techniques and future research directions for securing this high-precision timing and clock distribution protocol.

Syllabus

Cybersecurity for Precision Time Protocol Covert Channels, Code Injection, Spoofing, and DoS

Taught by

Open Compute Project

Reviews

Start your review of Cybersecurity Vulnerabilities in Precision Time Protocol - Attacks and Mitigations

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.