BU Today

Campus Life + Science & Tech

CAS Team Finds Flaw in Computers’ Timekeeping

Tens of millions of computers were vulnerable to attack

3

Sharon Goldberg frets about internet security so the rest of us don’t have to. In a paper released yesterday, Goldberg and her team reported the kind of security problem worth worrying about, one that could be used by a bad guy to cripple the clock function of tens of millions of computers on the internet using a single attacking machine. 

Happily, says Goldberg, a College of Arts & Sciences associate professor of computer science, fixes for the vulnerability were implemented before the paper was published.

Working with students Aanchal Malhotra (GRS’19), Isaac Cohen (CAS’16), and Erik Brakke (CAS’16) last spring, Goldberg discovered a potential vulnerability in the Network Time Protocol (NTP), the software and rules that synchronize clocks on computers. The team developed attacks that could alter the time on computer systems, compromising other applications, such as the encryption schemes that protect internet communications to bank websites. Other apps, from bitcoin systems to website authentication and login protocols, also could be breached.

“If NTP breaks, many other computing applications break as well,” says Goldberg, who holds a fellowship from the Rafik B. Hariri Institute for Computing and Computational Science & Engineering and is also a Sloan Fellow.

Before posting the paper on her project’s website, Goldberg’s team worked with the Network Time Foundation, which implements the NTP, and with software firms like Cisco Systems and Red Hat, to plug the holes in the NTP code. Goldberg says most computer users need not take corrective action, because their NTP software is routinely revised “via updates or patches to their operating systems.” She says operating systems “will be issuing patches that protect against our attacks, and other members of the Network Time Foundation are likely to do so as well.”

Experts needing to test their servers can consult the Goldberg team’s website for instructions.

“It is very likely that your laptop uses NTP to synchronize its clock to a time server somewhere out on the internet,” says Goldberg. “The encryption protocols that protect the information sent from your web browser to your bank’s website, for example, depend strongly on the accuracy of your computer clocks.”

The Network Time Foundation “really appreciates the work of Sharon, Aanchal, and their team in finding these issues and reporting them responsibly,” says NTF founder and president Harlan Stenn. “NTF has very limited resources, so the work of BU and other research teams is helpful in finding issues.”

The most serious potential attack found by Goldberg’s team involves the “kiss-o’-death packet,” a message that would prevent a computer system from communicating with its time server, possibly for years, essentially turning off NTP on the victim system.

Last week, Goldberg received a $250,000 grant from the Silicon Valley Community Foundation to continue research on the security of the NTP. She and her team applied for the grant last March, when they began to enable various computers in their lab “to speak NTP to each other,” she says, “and started running various experiments with the kiss-o’-death packet.”

“Timeshifting” attacks, in which a computer system’s time settings are altered, took longer to develop, she says, “because NTP is actually quite a complex protocol that has evolved over time.”

Goldberg says her team followed the standard “responsible disclosure” guidelines for researchers who uncover software vulnerabilities. That means alerting affected parties to the vulnerability and giving them a prescribed time to patch the problem, after which the researcher publicizes her work. Goldberg sent Cisco an early draft of her team’s paper in August—she regularly briefs that firm on her research, she says, because it has funded her work and has hired several of her students—and the company was “instrumental in helping us coordinate the responsible disclosure of our research results.”

Goldberg’s work helps cement “BU’s presence in cybersecurity,” says Azer Bestavros, a CAS computer science professor and director of the Hariri Institute. “Sharon’s work often involves undergraduate students, and they get inspired by taking her courses, underscoring how excellence in research contributes significantly to the quality of teaching and experiential learning.”

3 Comments

3 Comments on CAS Team Finds Flaw in Computers’ Timekeeping

  • Michael Hirsch on 10.22.2015 at 8:49 am

    The correct URL for Prof. Goldberg’s NTP vulnerability page is

    http://www.cs.bu.edu/~goldbe/NTPattack.html

    • Ben Heyman on 10.22.2015 at 8:59 am

      Hi Michael, we’ve updated the URL in the story. Thanks!

  • Margrit Betke on 10.22.2015 at 10:34 am

    “Tens of millions of computers were vulnerable to attack” — If Sharon Goldberg and her team had not been so curious, creative, and clever, this vulnerability would have remained undetected — potentially until someone decided to exploit it and disrupt not just banking, but our world’s modern infrastructure, including our hospitals and government. Thank you, Sharon, Aanchal, Isaac, and Eric!!!

Post Your Comment

(never shown)