What is it about?
Modern 5G networks rely on extremely precise timing between different pieces of equipment. As companies move toward more open and flexible network designs, this timing information now travels over shared, Ethernet-based networks rather than the highly specialized cables used in the past. While this shift makes networks cheaper and easier to build, it also exposes critical timing signals to new security risks. Our work shows that attackers can exploit these weaknesses. We demonstrate that by sending fake timing messages, an attacker can cause a fully functional 5G base station—built using the open O-RAN standards—to fail in just two seconds, knocking the network offline until someone physically resets it. To address this threat, we developed a machine-learning–based monitoring system that can spot these types of attacks with more than 97.5% accuracy. This shows that even though open and flexible network designs introduce new vulnerabilities, we can still protect them with smarter, adaptive security tools.
Featured Image
Photo by Jürgen Scheeff on Unsplash
Why is it important?
This work is important because modern 5G networks rely on extremely precise timing, and even small manipulations of these signals can cause a base station to fail in seconds. As networks move toward open, flexible designs like O-RAN, the systems that carry this timing information are increasingly exposed to attackers, yet the timing protocols themselves were never built with security in mind. A successful attack doesn’t just disrupt one device—it can knock users offline, interrupt critical services, and cause cascading failures across a network. By demonstrating how easy it is to trigger such failures and by providing a machine-learning–based detector that can identify these attacks with high accuracy, this work highlights both a serious vulnerability in next-generation cellular systems and a practical path to strengthening their security.
Perspectives
From my perspective, the importance of this work lies in closing the gap between theory and reality. For years, the security community has warned that timing attacks against PTP could disrupt 5G and O-RAN systems, but much of industry treated these concerns as theoretical or impractical. Our findings show that they are neither. By demonstrating that these attacks are easy to execute and can take down a production-ready base station in seconds, we provide the first experimental proof that these risks are both real and urgent. At the same time, we wanted this paper to move beyond identifying the problem. By developing an effective, software-only detection mechanism and releasing our tools, data, and digital twin as open source, we offer an accessible first step toward defending these networks. In my view, this combination—showing that a dismissed threat is real, and offering a practical path to mitigation—is what makes this work meaningful.
Joshua Groen
United States Military Academy
Read the Original
This page is a summary of: TIMESAFE: Timing Interruption Monitoring and Security Assessment for Fronthaul Environments., ACM Transactions on Privacy and Security, November 2025, ACM (Association for Computing Machinery),
DOI: 10.1145/3775060.
You can read the full text:
Contributors
The following have contributed to this page







