Breaking Precision Time: OS Vulnerability Exploits Against IEEE 1588
By: Muhammad Abdullah Soomro, Fatima Muhammad Anwar
Potential Business Impact:
Hacks computer clocks without being seen.
The Precision Time Protocol (PTP), standardized as IEEE 1588, provides sub-microsecond synchronization across distributed systems and underpins critical infrastructure in telecommunications, finance, power systems, and industrial automation. While prior work has extensively analyzed PTP's vulnerability to network-based attacks, prompting the development of cryptographic protections and anomaly detectors, these defenses presume an uncompromised host. In this paper, we identify and exploit a critical blind spot in current threat models: kernel-level adversaries operating from within the host running the PTP stack. We present the first systematic study of kernel-rooted attacks on PTP, demonstrating how privileged attackers can manipulate system time by corrupting key interfaces without altering PTP network traffic. We implement three attack primitives, constant offset, progressive skew, and random jitter, using in-kernel payloads, and evaluate their impact on the widely used ptp4l and phc2sys daemons. Our experiments reveal that these attacks can silently destabilize clock synchronization, bypassing existing PTP security extensions. These findings highlight the urgent need to reconsider host-level trust assumptions and integrate kernel integrity into the design of secure time synchronization systems.
Similar Papers
Cracking the Microsecond: An Efficient and Precise Time Synchronization Scheme for Hybrid 5G-TSN Networks
Networking and Internet Architecture
Makes wireless devices sync time perfectly for factories.
Trace of the Times: Rootkit Detection through Temporal Anomalies in Kernel Activity
Cryptography and Security
Finds hidden computer viruses by timing code.
Systematic Timing Leakage Analysis of NIST PQDSS Candidates: Tooling and Lessons Learned
Cryptography and Security
Finds secret code flaws in computer programs.