{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T21:32:26Z","timestamp":1764106346479,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,28]]},"DOI":"10.1145\/3730567.3764478","type":"proceedings-article","created":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:22:38Z","timestamp":1763738558000},"page":"493-510","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Measuring the Time Source Vulnerabilities in the NTP Ecosystem"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0157-4796","authenticated-orcid":false,"given":"Zhentian","family":"Huang","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7814-240X","authenticated-orcid":false,"given":"Shuai","family":"Wang","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4228-7885","authenticated-orcid":false,"given":"Li","family":"Chen","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7581-8865","authenticated-orcid":false,"given":"Dan","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8955-4623","authenticated-orcid":false,"given":"Yilun","family":"Liu","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]}],"member":"320","published-online":{"date-parts":[[2025,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Akamai. 2024. Akamai. https:\/\/www.akamai.com\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.139"},{"key":"e_1_3_2_1_3_1","unstructured":"Masibus Automation and Instrumentation Pvt. Ltd. 2024. Masibus GPS Time Sync Unit MC-1-DE Operator's Manual. https:\/\/example.com\/overiew.pdf."},{"key":"e_1_3_2_1_4_1","unstructured":"Axis. 2022. Network Time Security AXIS OS 11.1. https:\/\/www.axis.com\/developer-community\/news\/NTS."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.52"},{"key":"e_1_3_2_1_6_1","volume-title":"A Day in the Life of NTP: Analysis of NTPPool Traffic. Master's thesis","author":"Bhaskar Rushvanth","unstructured":"Rushvanth Bhaskar. 2022. A Day in the Life of NTP: Analysis of NTPPool Traffic. Master's thesis. University of Twente."},{"key":"e_1_3_2_1_7_1","unstructured":"CAIDA. 2024a. AS to organizations mappings. https:\/\/catalog.caida.org\/dataset\/as_organizations."},{"key":"e_1_3_2_1_8_1","unstructured":"CAIDA. 2024b. ROA Collector. https:\/\/github.com\/CAIDA\/roa-collector."},{"key":"e_1_3_2_1_9_1","unstructured":"CAIDA. 2024c. RouteViews Prefix to AS mappings. https:\/\/catalog.caida.org\/dataset\/routeviews_prefix2as"},{"key":"e_1_3_2_1_10_1","unstructured":"Chrony. 2024a. Chrony Introduction. https:\/\/chrony-project.org\/index.html."},{"key":"e_1_3_2_1_11_1","unstructured":"Chrony. 2024b. chrony.conf(5) Manual Page. https:\/\/chrony-project.org\/doc\/4.3\/chrony.conf.html."},{"key":"e_1_3_2_1_12_1","unstructured":"Baidu Cloud. 2024a. Baidu Cloud. https:\/\/cloud.baidu.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Tencent Cloud. 2024b. Tencent Cloud. https:\/\/www.tencentcloud.com\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Cloudflare. 2024. Cloudflare. https:\/\/www.cloudflare.com\/."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2663716.2663717"},{"key":"e_1_3_2_1_16_1","volume-title":"25th USENIX security symposium (USENIX security 16). 823-840.","author":"Dowling Benjamin","unstructured":"Benjamin Dowling, Douglas Stebila, and Greg Zaverucha. 2016. Authenticated network time synchronization. In 25th USENIX security symposium (USENIX security 16). 823-840."},{"key":"e_1_3_2_1_17_1","first-page":"605","volume-title":"22nd USENIX Security Symposium (USENIX Security 13)","author":"Durumeric Zakir","year":"2013","unstructured":"Zakir Durumeric, Eric Wustrow, and J Alex Halderman. 2013. ZMap: Fast internet-wide scanning and its security applications. In 22nd USENIX Security Symposium (USENIX Security 13). 605-620."},{"key":"e_1_3_2_1_18_1","unstructured":"Amazon EC2. 2024. Amazon Web Services. https:\/\/aws.amazon.com\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2004.03.033"},{"key":"e_1_3_2_1_20_1","unstructured":"Network Time Foundation. 2023a. Orphan Mode. https:\/\/www.ntp.org\/documentation\/4.2.8-series\/orphan\/."},{"key":"e_1_3_2_1_21_1","unstructured":"Network Time Foundation. 2023b. Stratum One Time Servers. https:\/\/support.ntp.org\/Servers\/StratumOneTimeServers."},{"key":"e_1_3_2_1_22_1","unstructured":"Network Time Foundation. 2023c. Stratum Two Time Servers. https:\/\/support.ntp.org\/Servers\/StratumTwoTimeServers."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC8915"},{"key":"e_1_3_2_1_24_1","unstructured":"Google. 2024. Google cloud. https:\/\/cloud.google.com\/."},{"key":"e_1_3_2_1_25_1","unstructured":"Alibaba Group. 2024. Alibaba cloud services. https:\/\/www.alibabacloud.com\/."},{"key":"e_1_3_2_1_26_1","unstructured":"Ask Bj\u00f8rn Hansen. 2024. NTP Pool. https:\/\/www.ntppool.org\/."},{"key":"e_1_3_2_1_27_1","unstructured":"Hetzner. [n.d.]. Hetzner Online GmbH. https:\/\/www.hetzner.com\/."},{"key":"e_1_3_2_1_28_1","unstructured":"Jauder Ho. 2024. NTP servers with NTS support. https:\/\/github.com\/jauderho\/nts-servers."},{"key":"e_1_3_2_1_29_1","unstructured":"Jauder Ho. 2024. Time Servers with NTS support. https:\/\/gist.github.com\/jauderho\/2ad0d441760fc5ed69d8d4e2d6b35f8d."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Jeff Hodges Collin Jackson and Adam Barth. 2012. Http strict transport security (hsts). Technical Report.","DOI":"10.17487\/rfc6797"},{"key":"e_1_3_2_1_31_1","unstructured":"Holmberd. [n.d.]. How Nginx determines which server block to route the request through. https:\/\/gist.github.com\/holmberd\/fa87e5f505e04a378ccf9a7b59456e8c."},{"key":"e_1_3_2_1_32_1","unstructured":"Domain Time II. 2024. What's wrong with the Windows Time Service? https:\/\/www.greyware.com\/software\/domaintime\/v5\/overview\/w32time.asp."},{"key":"e_1_3_2_1_33_1","unstructured":"IP2location. 2024. IP geolocation. https:\/\/lite.ip2location.com."},{"key":"e_1_3_2_1_34_1","first-page":"6151","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Kwon Jonghoon","year":"2023","unstructured":"Jonghoon Kwon, Jeonggyu Song, Junbeom Hur, and Adrian Perrig. 2023. Did the Shark Eat the Watchdog in the NTP Pool? Deceiving the NTP Pool's Monitoring System. In 32nd USENIX Security Symposium (USENIX Security 23). 6151-6166."},{"key":"e_1_3_2_1_35_1","unstructured":"ANT Lab. [n.d.]. cryptopANT IP Address Anonymization Library. https:\/\/ant.isi.edu\/software\/cryptopANT\/index.html."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531536.3532947"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Matt Lepinski and S Kent. 2012. RFC 6480: an infrastructure to support secure Internet routing.","DOI":"10.17487\/rfc6480"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3589334.3645539"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2024.24782"},{"key":"e_1_3_2_1_40_1","unstructured":"Gordon Lyon. 2024. Nmap. https:\/\/nmap.org\/."},{"key":"e_1_3_2_1_41_1","volume-title":"Attacking the network time protocol. Cryptology ePrint Archive","author":"Malhotra Aanchal","year":"2015","unstructured":"Aanchal Malhotra, Isaac E Cohen, Erik Brakke, and Sharon Goldberg. 2015. Attacking the network time protocol. Cryptology ePrint Archive (2015)."},{"key":"e_1_3_2_1_42_1","volume-title":"GPS THREAT MITIGATION: WHY NETWORK TIME USERS SHOULD CARE. https:\/\/www.masterclock.com\/gps-threat-mitigation-why-network-time-users-should-care.html.","year":"2017","unstructured":"Masterclock. 2017. GPS THREAT MITIGATION: WHY NETWORK TIME USERS SHOULD CARE. https:\/\/www.masterclock.com\/gps-threat-mitigation-why-network-time-users-should-care.html."},{"key":"e_1_3_2_1_43_1","unstructured":"Microsoft. 2024. Microsoft Azure. https:\/\/azure.microsoft.com\/."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"DL Mills. 1985. RFC0958: Network Time Protocol (NTP).","DOI":"10.17487\/rfc0958"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"David Mills. 2006. Simple network time protocol (SNTP) version 4 for IPv4 IPv6 and OSI. Technical Report.","DOI":"10.17487\/rfc4330"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"David Mills Jim Martin Jack Burbank and William Kasch. 2010. RFC 5905: Network time protocol version 4: Protocol and algorithms specification. Technical Report.","DOI":"10.17487\/rfc5905"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/26.103043"},{"key":"e_1_3_2_1_48_1","volume-title":"Calibrating NTP. In 2019 IEEE international symposium on precision clock synchronization for measurement, control, and communication (ISPCS). IEEE, 1-6.","author":"Mkacher Faten","year":"2019","unstructured":"Faten Mkacher and Andrzej Duda. 2019. Calibrating NTP. In 2019 IEEE international symposium on precision clock synchronization for measurement, control, and communication (ISPCS). IEEE, 1-6."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3639041"},{"key":"e_1_3_2_1_50_1","unstructured":"Sergey Mutin. 2023. List of Top Public Time Servers. https:\/\/gist.github.com\/mutin-sa\/eea1c396b1e610a2da1e5550d94b0453."},{"key":"e_1_3_2_1_51_1","unstructured":"Netnod. 2024. How to use NTS. https:\/\/www.netnod.se\/netnod-time\/how-to-use-nts."},{"key":"e_1_3_2_1_52_1","unstructured":"NIST. 2024. NIST Internet Time Servers. https:\/\/tf.nist.gov\/tf-cgi\/servers.cgi."},{"key":"e_1_3_2_1_53_1","unstructured":"NPL. 2025. Internet time from NPL. https:\/\/www.npl.co.uk\/products-services\/time-frequency\/internet-time."},{"key":"e_1_3_2_1_54_1","unstructured":"NTPsec. 2024a. Orphan Mode. https:\/\/docs.ntpsec.org\/latest\/orphan.html."},{"key":"e_1_3_2_1_55_1","unstructured":"NTPsec. 2024b. Welcome to NTPsec. https:\/\/support.ntp.org\/Support\/InstallingNTP."},{"key":"e_1_3_2_1_56_1","unstructured":"Hong Kong Observatory. 2024. Synchronization of PC clocks for Windows users. https:\/\/www.hko.gov.hk\/en\/nts\/ntime.htm."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896816"},{"key":"e_1_3_2_1_58_1","volume-title":"Roughtime: Securing Time with Digital Signatures","author":"Patton Christopher","year":"2018","unstructured":"Christopher Patton. 2018. Roughtime: Securing Time with Digital Signatures. http:\/\/blog.cloudflare.com\/roughtime\/."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028824"},{"key":"e_1_3_2_1_60_1","volume-title":"Virtual Conference.","author":"Perry Yarin","year":"2021","unstructured":"Yarin Perry, Neta Rozen Schiff, and Michael Schapira. 2021. A devil of a time: How vulnerable is NTP to malicious timeservers?. In NDSS. ISOC, Virtual Conference."},{"key":"e_1_3_2_1_61_1","unstructured":"Prefixx. 2021. What is the use of a loopback address in IPv4? https:\/\/prefixx.net\/news\/ipv4-loopback-address."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","unstructured":"Denis Reilly Harlan Stenn and Dieter Sibold. 2019. Network Time Protocol Best Current Practices. RFC 8633. doi:10.17487\/RFC8633","DOI":"10.17487\/RFC8633"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Eric Rescorla. 2018. The transport layer security (TLS) protocol version 1.3. Technical Report.","DOI":"10.17487\/RFC8446"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2018.00017"},{"key":"e_1_3_2_1_65_1","unstructured":"Windows server. 2023. Windows Time service tools and settings. https:\/\/learn.microsoft.com\/en-us\/windows-server\/networking\/windows-time-service\/windows-time-service-tools-and-settings?tabs=config."},{"key":"e_1_3_2_1_66_1","volume-title":"MEDIUM: NTP Version Report. https:\/\/www.shadowserver.org\/what-we-do\/network-reporting\/ntp-version-report\/.","year":"2023","unstructured":"Shadowserver. 2023. MEDIUM: NTP Version Report. https:\/\/www.shadowserver.org\/what-we-do\/network-reporting\/ntp-version-report\/."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.6028\/jres.121.003"},{"key":"e_1_3_2_1_68_1","unstructured":"Bodet Time. 2024. What is Network Time Security (NTS)? https:\/\/www.bodet-time.com\/resources\/blog\/1886-what-is-network-time-security-nts.html."},{"key":"e_1_3_2_1_69_1","unstructured":"VIX. 2024. Step by Step to VIX. https:\/\/www.vix.at\/en\/participants-partners\/how-to-join-vix\/step-by-step-to-vix."},{"key":"e_1_3_2_1_70_1","unstructured":"Wikipedia. 2025. Private network. https:\/\/en.wikipedia.org\/wiki\/Private_network."}],"event":{"name":"IMC '25:ACM Internet Measurement Conference","location":"Madison WI USA","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGCOMM ACM Special Interest Group on Data Communication"]},"container-title":["Proceedings of the 2025 ACM Internet Measurement Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3730567.3764478","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T15:27:32Z","timestamp":1763738852000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3730567.3764478"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,28]]},"references-count":70,"alternative-id":["10.1145\/3730567.3764478","10.1145\/3730567"],"URL":"https:\/\/doi.org\/10.1145\/3730567.3764478","relation":{},"subject":[],"published":{"date-parts":[[2025,10,28]]},"assertion":[{"value":"2025-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}