A Malhotra, IE Cohen, E Brakke… - Cryptology ePrint …, 2015 - eprint.iacr.org
We explore the risk that network attackers can exploit unauthenticated Network Time
Protocol (NTP) traffic to alter the time on client systems. We first discuss how an on-path …