Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Learn about critical cybersecurity vulnerabilities in the IEEE 1588 Precision Time Protocol (PTP) through a research presentation that demonstrates multiple zero-day exploits discovered in a PTP test bed environment. Explore experimental findings on various attack vectors including master clock spoofing, denial of service variations, data injection methods, and covert channel attacks. Examine how these exploits can manipulate timing offsets, create temporal vortex attacks, and affect clock frequency steering. Discover proposed mitigation techniques and future research directions for securing this high-precision timing and clock distribution protocol.