Complex Paths and Derelict Sentinels software engineering underpinnings of NTP vulnerabilities