{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:52:56Z","timestamp":1771703576536,"version":"3.50.1"},"publisher-location":"Cham","reference-count":40,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319709710","type":"print"},{"value":"9783319709727","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70972-7_23","type":"book-chapter","created":{"date-parts":[[2017,12,22]],"date-time":"2017-12-22T08:57:55Z","timestamp":1513933075000},"page":"405-423","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["The Security of NTP\u2019s Datagram Protocol"],"prefix":"10.1007","author":[{"given":"Aanchal","family":"Malhotra","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Van Gundy","sequence":"additional","affiliation":[]},{"given":"Mayank","family":"Varia","sequence":"additional","affiliation":[]},{"given":"Haydn","family":"Kennedy","sequence":"additional","affiliation":[]},{"given":"Jonathan","family":"Gardner","sequence":"additional","affiliation":[]},{"given":"Sharon","family":"Goldberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"https:\/\/github.com\/dfoxfranke\/nts"},{"key":"23_CR2","unstructured":"https:\/\/github.com\/mlichvar\/chrony\/blob\/master\/ntp_core.c#L908"},{"key":"23_CR3","unstructured":"https:\/\/github.com\/ntp-project\/ntp\/blob\/1a399a03e674da08cfce2cdb847bfb65d65df237\/libntp\/ntp_random.c"},{"key":"23_CR4","unstructured":"https:\/\/github.com\/philpennock\/openntpd\/blob\/master\/client.c#L174"},{"key":"23_CR5","unstructured":"The NIST authenticated NTP service (2010). http:\/\/www.nist.gov\/pml\/div688\/grp40\/auth-ntp.cfm. Accessed July 2015"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-68697-5_1","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201996","author":"M Bellare","year":"1996","unstructured":"Bellare, M., Canetti, R., Krawczyk, H.: Keying hash functions for message authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1\u201315. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68697-5_1"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: FOCS, pp. 136\u2013145. IEEE (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/11957454_2","volume-title":"Privacy Enhancing Technologies","author":"R Clayton","year":"2006","unstructured":"Clayton, R., Murdoch, S.J., Watson, R.N.M.: Ignoring the Great Firewall of China. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 20\u201335. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11957454_2"},{"key":"23_CR9","unstructured":"corbixgwelt. Timejacking & bitcoin: The global time agreement puzzle (culubas blog) (2011). http:\/\/culubas.blogspot.com\/2011\/05\/timejacking-bitcoin_802.html. Accessed Aug 2015"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Czyz, J., Kallitsis, M., Gharaibeh, M., Papadopoulos, C., Bailey, M., Karir, M.: Taming the 800 pound gorilla: the rise and decline of NTP DDoS attacks. In: Proceedings of the 2014 Internet Measurement Conference, pp. 435\u2013448. ACM (2014)","DOI":"10.1145\/2663716.2663717"},{"key":"23_CR11","unstructured":"Dowling, B., Stebila, D., Zaverucha, G.: Authenticated network time synchronization. In: 25th USENIX Security Symposium (USENIX Security 2016), Austin, TX, pp. 823\u2013840. USENIX Association, August 2016"},{"key":"23_CR12","unstructured":"Duan, H., Weaver, N., Zhao, Z., Hu, M., Liang, J., Jiang, J., Li, K., Paxson, V.: Hold-on: protecting against on-path DNS poisoning. In: Proceedings of Workshop on Securing and Trusting Internet Names, SATIN (2012)"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Durairajan, R., Mani, S.K., Sommers, J., Barford, P.: Time\u2019s forgotten: using NTP to understand internet latency. In: HotNets 2015, November 2015","DOI":"10.1145\/2834050.2834108"},{"key":"23_CR14","unstructured":"Durumeric, Z., Wustrow, E., Halderman, J.A.: ZMap: fast internet-wide scanning and its security applications. In: USENIX Security, pp. 605\u2013620. Citeseer (2013)"},{"key":"23_CR15","unstructured":"Haberman, B., Mills, D.: RFC 5906: Network Time Protocol Version 4: Autokey Specification. Internet Engineering Task Force (IETF) (2010). https:\/\/tools.ietf.org\/html\/rfc5906"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Itkin, E., Wool, A.: A security analysis and revised security extension for the precision time protocol. CoRR, abs\/1603.00707 (2016)","DOI":"10.1109\/ISPCS.2016.7579501"},{"key":"23_CR17","unstructured":"Klein, J.: Becoming a time lord - implications of attacking time sources. Shmoocon Firetalks 2013 (2013). https:\/\/youtu.be\/XogpQ-iA6Lw"},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"615","DOI":"10.1007\/978-3-319-26362-5_28","volume-title":"Research in Attacks, Intrusions, and Defenses","author":"L Kr\u00e4mer","year":"2015","unstructured":"Kr\u00e4mer, L., Krupp, J., Makita, D., Nishizoe, T., Koide, T., Yoshioka, K., Rossow, C.: AmpPot: monitoring and defending against amplification DDoS attacks. In: Bos, H., Monrose, F., Blanc, G. (eds.) RAID 2015. LNCS, vol. 9404, pp. 615\u2013636. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-26362-5_28"},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Malhotra, A., Cohen, I.E., Brakke, E., Goldberg, S.: Attacking the network time protocol. In: NDSS 2016, February 2016","DOI":"10.14722\/ndss.2016.23090"},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Malhotra, A., Goldberg, S.: Attacking NTP\u2019s authenticated broadcast mode. In: SIGCOMM Computer Communication Review, April 2016","DOI":"10.1145\/2935634.2935637"},{"key":"23_CR21","unstructured":"Malhotra, A., Goldberg, S.: Message Authentication Codes for the Network Time Protocol. Internet Engineering Task Force (IETF), November 2016. https:\/\/datatracker.ietf.org\/doc\/draft-ietf-ntp-mac\/"},{"key":"23_CR22","unstructured":"Mauch, J.: openntpproject: NTP Scanning Project. http:\/\/openntpproject.org\/"},{"key":"23_CR23","unstructured":"Mills, D.: RFC 1305: Network Time Protocol (Version 3) Specification, Implementation and Analysis. Internet Engineering Task Force (IETF) (1992). http:\/\/tools.ietf.org\/html\/rfc1305"},{"key":"23_CR24","unstructured":"Mills, D., Haberman, B.: draft-haberman-ntpwg-mode-6-cmds-00: Control Messages Protocol for Use with Network Time Protocol Version 4. Internet Engineering Task Force (IETF), May 2016. https:\/\/datatracker.ietf.org\/doc\/draft-haberman-ntpwg-mode-6-cmds\/"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Mills, D., Martin, J., Burbank, J., Kasch, W.: RFC 5905: Network Time Protocol Version 4: Protocol and Algorithms Specification. Internet Engineering Task Force (IETF) (2010). http:\/\/tools.ietf.org\/html\/rfc5905","DOI":"10.17487\/rfc5905"},{"key":"23_CR26","volume-title":"Computer Network Time Synchronization","author":"DL Mills","year":"2011","unstructured":"Mills, D.L.: Computer Network Time Synchronization, 2nd edn. CRC Press, Boca Raton (2011)","edition":"2"},{"key":"23_CR27","unstructured":"Minar, N.: A survey of the NTP network (1999)"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Mizrahi, T.: A game theoretic analysis of delay attacks against time synchronization protocols. In: Precision Clock Synchronization for Measurement Control and Communication (ISPCS), pp. 1\u20136. IEEE (2012)","DOI":"10.1109\/ISPCS.2012.6336612"},{"key":"23_CR29","unstructured":"Mizrahi, T.: RFC 7384 (Informational): Security Requirements of Time Protocols in Packet Switched Networks. Internet Engineering Task Force (IETF) (2012). http:\/\/tools.ietf.org\/html\/rfc7384"},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Moreira, N., Lazaro, J., Jimenez, J., Idirin, M., Astarloa, A.: Security mechanisms to protect IEEE 1588 synchronization: state of the art and trends. In: 2015 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS), pp. 115\u2013120. IEEE (2015)","DOI":"10.1109\/ISPCS.2015.7324694"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Murta, C.D., Torres Jr. P.R., Mohapatra, P.: Characterizing quality of time and topology in a time synchronization network. In: GLOBECOM (2006)","DOI":"10.1109\/GLOCOM.2006.467"},{"key":"23_CR32","unstructured":"R\u00f6ttger, S.: Analysis of the ntp autokey procedures. Master\u2019s thesis, Technische Universitt Braunschweig (2012)"},{"key":"23_CR33","unstructured":"Selvi, J.: Bypassing HTTP strict transport security. In: Black Hat Europe (2014)"},{"key":"23_CR34","unstructured":"Selvi, J.: Breaking SSL using time synchronisation attacks. In: DEFCON\u201923 (2015)"},{"key":"23_CR35","doi-asserted-by":"publisher","first-page":"33","DOI":"10.6028\/jres.121.003","volume":"121","author":"JA Sherman","year":"2016","unstructured":"Sherman, J.A., Levine, J.: Usage analysis of the NIST internet time service. J. Res. Natl. Inst. Stand. Technol. 121, 33 (2016)","journal-title":"J. Res. Natl. Inst. Stand. Technol."},{"key":"23_CR36","unstructured":"Sibold, D., Roettger, S.: draft-ietf-ntp-network-time-security: Network Time Security. Internet Engineering Task Force (IETF) (2015). http:\/\/tools.ietf.org\/html\/draft-ietf-ntp-network-time-security-08"},{"key":"23_CR37","doi-asserted-by":"crossref","unstructured":"Sibold, D., Roettger, S., Teichel, K.: draft-ietf-ntp-network-time-security-10: Network Time Security. Internet Engineering Task Force (IETF) (2015). https:\/\/tools.ietf.org\/html\/draft-ietf-ntp-network-time-security-10","DOI":"10.1109\/EFTF.2016.7477786"},{"issue":"1","key":"23_CR38","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/2716276.2717320","volume":"13","author":"H Stenn","year":"2015","unstructured":"Stenn, H.: Securing the network time protocol. ACM Queue 13(1), 20\u201325 (2015). Communications of the ACM","journal-title":"ACM Queue"},{"key":"23_CR39","unstructured":"Stenn, H.: Security notice, 27 April 2016. http:\/\/support.ntp.org\/bin\/view\/Main\/SecurityNotice"},{"key":"23_CR40","unstructured":"Weaver, N., Sommer, R., Paxson, V.: Detecting forged TCP reset packets. In: NDSS (2009)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70972-7_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,13]],"date-time":"2023-04-13T17:07:57Z","timestamp":1681405677000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-70972-7_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319709710","9783319709727"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70972-7_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}