diff options
Diffstat (limited to 'ma')
-rw-r--r-- | ma/Makefile | 19 | ||||
-rw-r--r-- | ma/murks.tex | 160 | ||||
-rw-r--r-- | ma/safety_reset.tex | 336 |
3 files changed, 515 insertions, 0 deletions
diff --git a/ma/Makefile b/ma/Makefile new file mode 100644 index 0000000..3645f5f --- /dev/null +++ b/ma/Makefile @@ -0,0 +1,19 @@ + +SHELL := bash +.ONESHELL: +.SHELLFLAGS := -eu -o pipefail -c +.DELETE_ON_ERROR: +MAKEFLAGS += --warn-undefined-variables +MAKEFLAGS += --no-builtin-rules + +all: safety_reset.pdf + +%.pdf: %.tex %.bib + pdflatex $< + biber $* + pdflatex $< + +.PHONY: clean +clean: + rm -f safety_reset.aux safety_reset.bbl safety_reset.bcf safety_reset.log safety_reset.blg + rm -f safety_reset.out safety_reset.run.xml texput.log diff --git a/ma/murks.tex b/ma/murks.tex new file mode 100644 index 0000000..4c3527e --- /dev/null +++ b/ma/murks.tex @@ -0,0 +1,160 @@ +% LaTeX-Vorlage für die Titelseite und Selbständigkeitserklärung einer Abschlussarbeit +% basierend auf der vorigen Institutsvorlage des Instituts für Informatik +% sowie der Vorlage für Promotionsarbeiten. +% +% erweitert: 2014-06-12 Dennis Schneider <dschneid@informatik.hu-berlin.de> + +% gepunktete Linie unter Objekt: +\newcommand{\TitelPunkte}[1]{% + \tikz[baseline=(todotted.base)]{ + \node[inner sep=1pt,outer sep=0pt] (todotted) {#1}; + \draw[dotted] (todotted.south west) -- (todotted.south east); + }% +}% + +% gepunktete Linie mit gegebener Länge: +\newcommand{\TitelPunktLinie}[1]{\TitelPunkte{\makebox[#1][l]{}}} + +\makeatletter + +\newcommand*{\@titelTitel}{Titel der Arbeit} +\newcommand{\titel}[1]{\renewcommand*{\@titelTitel}{#1}} % Titel der Arbeit +\newcommand*{\@titelArbeit}{Arbeitstyp} +\newcommand{\typ}[1]{\renewcommand*{\@titelArbeit}{#1}} % Typ der Arbeit +\newcommand*{\@titelGrad}{akademischer Grad} +\newcommand{\grad}[1]{\renewcommand*{\@titelGrad}{#1}} % Akademischer Grad +\newcommand*{\@titelAutor}{Autor} +\newcommand{\autor}[1]{\renewcommand*{\@titelAutor}{#1}} % Autor der Arbeit +\newcommand*{\@titelGeburtsdatum}{\TitelPunktLinie{2cm}} +\newcommand{\gebdatum}[1]{\renewcommand*{\@titelGeburtsdatum}{#1}} % Geburtsdatum des Autors +\newcommand*{\@titelGeburtsort}{\TitelPunktLinie{5cm}} +\newcommand{\gebort}[1]{\renewcommand*{\@titelGeburtsort}{#1}} % Geburtsort des Autors +\newcommand*{\@titelGutachterA}{\TitelPunktLinie{5cm}} +\newcommand*{\@titelGutachterB}{\TitelPunktLinie{5cm}} +\newcommand{\gutachter}[2]{\renewcommand*{\@titelGutachterA}{#1}\renewcommand*{\@titelGutachterB}{#2}} % Erst- und Zweitgutachter +\newcommand*{\@titelEinreichungsdatum}{\TitelPunktLinie{3cm}} % Datum der Einreichung, wird nicht vom Studenten ausgefüllt +\newcommand*{\@titelVerteidigungsdatum}{} % Verteidigungstext, wird nicht vom Studenten ausgefüllt +\newcommand{\mitverteidigung}{\renewcommand*{\@titelVerteidigungsdatum}{verteidigt am: \,\,\TitelPunktLinie{3cm}}} % Verteidigungsplatzhalter erzeugen +\newcommand*{\@wastwoside}{} + +% Titelseite erzeugen: +\newcommand{\makeTitel}{% + % Speichere, ob doppelseitiges Layout gewählt wurde: +\if@twoside% + \renewcommand*{\@wastwoside}{twoside} +\else + \renewcommand*{\@wastwoside}{twoside=false} +\fi + \begin{titlepage} + % Ändern der Einrückungen + \newlength{\parindentbak} \setlength{\parindentbak}{\parindent} + \newlength{\parskipbak} \setlength{\parskipbak}{\parskip} + \setlength{\parindent}{0pt} + \setlength{\parskip}{\baselineskip} + + \thispagestyle{empty} + + \begin{minipage}[c][3cm][c]{12cm} + \textsc{% + % optischer Randausgleich per Hand: + \hspace{-0.4mm}\textls*[68]{\Large Humboldt-Universität zu Berlin}\\ + \normalsize \textls*[45]{ + Mathematisch-Naturwissenschaftliche Fakultät\\ + Institut für Informatik + } + } + \end{minipage} + \hfill + + + % Also wenn schon serifenlose Schriften (Titel), dann ganz oder gar nicht + \sffamily + + \vfill + + \begin{center} + \begin{doublespace} + \vspace{\baselineskip} + {\LARGE \textbf{\@titelTitel}}\\ + %\vspace{1\baselineskip} + {\Large + \@titelArbeit\\ + zur Erlangung des akademischen Grades\\ + \@titelGrad + \vspace{\baselineskip} + } + \end{doublespace} + \end{center} + + \vfill +\newcolumntype{L}{>{\raggedright\arraybackslash}X} + {\large \raggedleft + \begin{tabularx}{\textwidth}{l@{\,\,\raggedright~}L} % verbreiterter Abstand zwischen Feldern wurde gewünscht + eingereicht von: & \@titelAutor\\ + geboren am: & {\@titelGeburtsdatum}\\ + geboren in: & \@titelGeburtsort + \vspace{0.5\baselineskip}\\ + Gutachter/innen: & \@titelGutachterA \\ + & \@titelGutachterB + \vspace{0.5\baselineskip}\\ + eingereicht am: & \@titelEinreichungsdatum \hfill \@titelVerteidigungsdatum + \end{tabularx}} + \vspace{-1\baselineskip}\\\phantom{x} % Übler Hack, um eine Warnung wg. einer zu leeren hbox zu verhindern + % Wiederherstellen der Einrückung + \setlength{\parindent}{\parindentbak} + \setlength{\parskip}{\parskipbak} + \end{titlepage} + + % Aufräumen: + \let\@titelTitel\undefined + \let\titel\undefined + \let\@titelArbeit\undefined + \let\typ\undefined + \let\@titelGrad\undefined + \let\grad\undefined + \let\@titelAutor\undefined + \let\autor\undefined + \let\@titelGeburtsdatum\undefined + \let\gebdatum\undefined + \let\@titelGeburtsort\undefined + \let\gebort\undefined + \let\@titelGutachterA\undefined + \let\@titelGutachterB\undefined + \let\gutachter\undefined + \let\@titelEinreichungsdatum\undefined + \let\einreichungsdatum\undefined + \let\@titelVerteidigungsdatum\undefined + \let\verteidigungsdatum\undefined + + \let\@wastwoside\undefined + \cleardoublepage % ganzes Blatt für die Titelseite +} + +% Als Allerallerletztes kommt Selbständigkeitserklärung: +% Aufruf mit dem Datum in deutscher und englischer Form +\newcommand{\selbstaendigkeitserklaerung}[1]{% + \cleardoublepage% Wieder auf eine eigene Doppelseite + {\parindent0cm + \subsection*{Selbständigkeitserklärung} + Ich erkläre hiermit, dass ich die vorliegende Arbeit selbständig verfasst + und noch nicht für andere Prüfungen eingereicht habe. + Sämtliche Quellen einschließlich Internetquellen, die unverändert oder + abgewandelt wiedergegeben werden, insbesondere Quellen für Texte, Grafiken, + Tabellen und Bilder, sind als solche kenntlich gemacht. Mir ist bekannt, + dass bei Verstößen gegen diese Grundsätze ein Verfahren wegen + Täuschungsversuchs bzw. Täuschung eingeleitet wird. + \vspace{3\baselineskip} + + {\raggedright Berlin, den #1 \hfill \TitelPunktLinie{8cm}\\} +% \vspace{3\baselineskip} +% +% \selectlanguage{english} +% \subsection*{Statement of authorship} +% Hier würde die englische Selbständigkeitserklärung folgen, falls gewünscht. Doch es fehlt eine akzeptable Übersetzung. +% \vspace{3\baselineskip} +% +% Berlin, #2 \hfill \TitelPunktLinie{6cm} + } +}% + +\makeatother diff --git a/ma/safety_reset.tex b/ma/safety_reset.tex new file mode 100644 index 0000000..41b511b --- /dev/null +++ b/ma/safety_reset.tex @@ -0,0 +1,336 @@ +\documentclass[12pt,a4paper,notitlepage]{report} +\usepackage[utf8]{inputenc} +\usepackage[a4paper,textwidth=17cm, top=2cm, bottom=3.5cm]{geometry} +\usepackage[T1]{fontenc} +\usepackage[ + backend=biber, + style=numeric, + natbib=true, + url=true, + doi=true, + eprint=false + ]{biblatex} +\addbibresource{safety_reset.bib} +\usepackage{amssymb,amsmath} +\usepackage{listings} +\usepackage{eurosym} +\usepackage{wasysym} +\usepackage{amsthm} +\usepackage{tabularx} +\usepackage{multirow} +\usepackage{multicol} +\usepackage{tikz} + +\usetikzlibrary{arrows} +\usetikzlibrary{backgrounds} +\usetikzlibrary{calc} +\usetikzlibrary{decorations.markings} +\usetikzlibrary{decorations.pathreplacing} +\usetikzlibrary{fit} +\usetikzlibrary{patterns} +\usetikzlibrary{positioning} +\usetikzlibrary{shapes} + +\usepackage{hyperref} +\usepackage{tabularx} +\usepackage{commath} +\usepackage{graphicx,color} +\usepackage{subcaption} +\usepackage{float} +\usepackage{footmisc} +\usepackage{array} +\usepackage[underline=false]{pgf-umlsd} +\usetikzlibrary{calc} +%\usepackage[pdftex]{graphicx,color} +%\usepackage{epstopdf} +% Needed for murks.tex +\usepackage{setspace} +\usepackage[draft=false,babel,tracking=true,kerning=true,spacing=true]{microtype} % optischer Randausgleich etc. +% For german quotation marks + +\newcommand{\foonote}[1]{\footnote{#1}} +\newcommand{\degree}{\ensuremath{^\circ}} +\newcolumntype{P}[1]{>{\centering\arraybackslash}p{#1}} + +\begin{document} + +% Beispielhafte Nutzung der Vorlage für die Titelseite (bitte anpassen): +\input{murks} +\titel{FIXME} % Titel der Arbeit +\typ{Masterarbeit} % Typ der Arbeit: Diplomarbeit, Masterarbeit, Bachelorarbeit +\grad{Master of Science (M. Sc.)} % erreichter Akademischer Grad +% z.B.: Master of Science (M. Sc.), Master of Education (M. Ed.), Bachelor of Science (B. Sc.), Bachelor of Arts (B. A.), Diplominformatikerin +\autor{Jan Sebastian Götte} +\gebdatum{Aus datenschutzrechtlichen Gründen nicht abgedruckt} % Geburtsdatum des Autors +\gebort{Aus datenschutzrechtlichen Gründen nicht abgedruckt} % Geburtsort des Autors +\gutachter{Prof. Dr. Björn Scheuermann}{FIXME} % Erst- und Zweitgutachter der Arbeit +\mitverteidigung % entfernen, falls keine Verteidigung erfolgt +\makeTitel +\selbstaendigkeitserklaerung{31.03.2020} +\newpage + +% Hier folgt die eigentliche Arbeit (bei doppelseitigem Druck auf einem neuen Blatt): +\tableofcontents +\newpage + +\chapter{Introduction} +\section{Structure and operation of the electrical grid} +\subsection{Structure of the electrical grid} +\subsubsection{Generators and loads} +\subsubsection{Transformers} +\subsubsection{Tie lines} + +\subsection{Operational concerns} +\subsubsection{Modelling the electrical grid} +\subsubsection{Generator controls} +\subsubsection{Load shedding} +\subsubsection{System stability} +\subsubsection{Power System Stabilizers} + +\subsubsection{Smart metering} + +\section{Regulatory frameworks around the world} +\subsection{International standards} +\subsection{Regulations in Europe} +\subsection{The regulatory situation in Germany} +\subsection{The regulatory situation in France} +\subsection{The regulatory situation in the UK} +\subsection{The regulatory situation in Italy} +\subsection{The regulatory situation in northern America} +\subsection{The regulatory situation in Japan} +\subsection{Common themes} + +\section{Security in smart grids} +The smart grid in practice is nothing more or less than an aggregation of embedded control and measurement devices that +are part of a large control system. This implies that all the same security concerns that apply to embedded systems in +general also apply to most components of a smart grid in some way. Where programmers have been struggling for decades +now with input validation\cite{leveson01}, the same potential issue raises security concerns in smart grid scenarios as +well\cite{mo01, lee01}. Only, in smart grid we have two complicating factors present: Many components are embedded +systems, and as such inherently hard to update. Also, the smart grid and its control algorithms act as a large +(partially-)distributed system, making problems such as input validation or authentication difficult to +implement\cite{blaze01} and adding a host of distributed systems problems on top\cite{lamport01}. + +Given that the electrical grid is a major piece of essential infrastructure in modern civilization, these problems +amount to significant issues in practice. Attacks on the electrical grid may have grave consequences\cite{lee01} all the +while the long maintenance cycles of various components make the system slow to adapt. Thus, components for the smart +grid need to be built to a much higher standard of security than most consumer devices to ensure they live up to +well-funded attackers even decades down the road. This requirement intensifies the challenges of embedded security and +distributed systems security among others that are inherent in any modern complex technological system. + +\subsection{Smart grid components as embedded devices} +A fundamental challenge in smart grid implementations is the central role smart electricity meters play. Smart meters +are used both for highly-granular load measurement and (in some countries) load switching\cite{zheng01}. +Smart electricity meters are effectively consumer devices. They are built down to a certain price point that is +measured by the burden it puts on consumers and that is generally fixed by regulatory authorities. % FIXME cite +This requirement precludes some hardware features such as the use of a standard hardened software environment on a +high-powerded embedded system (such as a hypervirtualized embedded linux setup) that would both increase resilience +against attacks and simplify updates. Combined with the small market sizes in smart grid deployments +\footnote{ + Most vendors of smart electricity meters only serve a handful of markets. For the most part, smart meter development + cost lies in the meter's software % TODO cite? + and most countries use their own home-grown standards, creating a large development burden for new market entrants + \cite{cenelec01}. +} +this produces a high cost pressure on the software development process for smart electricity meters. + +\subsection{The state of the art in embedded security} +Embedded security generally is much harder than security of higher-level systems. This is due to a combination of the +unique constraints of embedded devices (hard to update, usually small quantity) and their lack of capabilities +(processing power, memory protection functions, user interface devices). Even very well-funded companies continue to +have serious problems securing their embedded systems. A spectacular example of this difficulty is the recently-exposed +flaw in Apple's iPhone SoC first-stage ROM bootloader\footnote{ + Modern system-on-chips integrate one or several CPUs with a multitude of peripherals, from memory and DMA + controllers over 3D graphics accelerators down to general-purpose IO modules for controlling things like indicator + LEDs. Most SoCs boot from one of several boot devices such as flash memory, ethernet or USB according to a + configuration set e.g. by connecting some SoC pins a certain way or set by device-internal write-only fuse bits. + + Physically, one of the processing cores of the SoC (usually one of the main CPU cores) is connected such that it is + taken out of reset before all other devices, and is tasked with switching on and configuring all other devices of + the SoC. In order to run later intialization code or more advanced bootloaders, this core on startup runs a very + small piece of code hard-burned into the SoC in the factory. This ROM loader initializes the most basic peripherals + such as internal SRAM memory and selects a boot device for the next bootloader stage. + + Apple's ROM loader performs some authorization checks, to ensure no unauthorized software is loaded. The present + flaw allows an attacker to circumvent these checks, booting code not authorized by Apple on a USB-connected iPhone, + compromising Apple's chain of trust from ROM loader to userland right at its root. +}, that allows a full compromise of any iPhone before the iPhone X. iPhone 8, one of the affected models, is still being +manufactured and sold by Apple today\footnote{ + i.e. at the time this paragraph was written, on %FIXME +}. In another instance, Samsung put a flaw in their secure-world firmware used for protection of sensitive credentials +in their mobile phone SoCs in % FIXME year % . +If both of these very large companies have trouble securing parts of their secure embedded software stacks measuring a +mere few hundred bytes in Apple's case or a few kilobytes in Samsung's, what is a smart electricity meter manufacturer +to do? For their mass-market phones, these two companies have R\&D budgets that dwarf some countries' national budgets. +% FIXME hyperbole? +% FIXME cite + +Since thorough formal verification of code is not yet within reach for either large-scale software development or +code heavy in side-effects such as embedded firmware or industrial control software\cite{pariente01} +the two most effective measures for embedded security is reducing the amount of code on one hand, and labour-intensively +checking and double-checking this code on the other hand. A smart electricity manufacturer does not have a say in the +former since it is bound by the official regulations it has to comply with, and will almost certainly not have sufficient +resources for the latter. +% FIXME expand? +% FIXME cite some figures on code size in smart meter firmware? + +\subsection{Attack avenues in the smart grid} +If we model the smart grid as a control system responding to changes in inputs by regulating outputs, on a very high +level we can see two general categories of attacks: Attacks that directly change the state of the outputs, and attacks +that try to influence the outputs indirectly by changing the system's view of its inputs. The former would be an attack +such as one that shuts down a power plant to decrease generation capacity. The latter would be an attack such as one +that forges grid frequency measurements where they enter a power plant's control systems to provoke increasing +oscillation in the amount of power generated by the plant according to the control systems' directions. +% FIXME cite +% FIXME expand + +\subsubsection{Communication channel attacks} +Communication channel attacks are attacks on the communication links between smart grid components. This could be +attacks on IP-connected parts of the core network or attacks on shared busses between smart meters and IP gateways in +substations. Generally, these attacks can be mitigated by securing the aforementioned communication links using modern +cryptography. IP links can be protected using TLS, and more low-level busses can be protected using more lightweight +Noise-based protocols. % FIXME cite +Cryptographic security transforms an attackers ability to manipulate communication contents into a mere denial of +service attack. Thus, in addition to cryptographic security safety under DoS conditions must be ensured to ensure +continued system performance under attacks. This safety property is identical with the safety required to withstand +random outages of components, such as communications link outages due to physical damage from storms, flooding etc. +% FIXME cite papers on attack impact, on coutermeasures and on attack realization + +\subsubsection{Exploiting centralized control systems} +The type of smart grid attack most often cited in popular discourse, and to the author's knowledge % FIXME verify, cite +the only type that has so far been conducted in practice, is a direct attack on centralized control systems. In this +attack, computer components of control systems are compromised by the same techniques used to compromise any other kind +of computer system such as exploiting insecure services running on internet-exposed ports and using one compromised +system to compromised other systems connected with it through an ostensably secure internal network. These attacks are +very powerful as they yield the attacker direct control over whatever outputs the control systems are controlling. If an +attacker manages to compromise a power stations control computers, they may be able to influence generation output or +even cause an emergency shutdown. % FIXME + +Despite their potentially large impact, these attacks are only moderately interesting from a scientific perspective. For +one, their mitigation mostly consists of a straightforward application of security practices well-known for decades. +Though there is room for the implementation of genuinely new, application-specific security systems in this field, the +general state of the art is lacking behind the rest of the computer industry such that the low-hanging fruit should take +priority. % FIXME cite this bold claim very properly + +In addition, given political will these systems can readily be secured since there is only a comparatively small number +of them and driving a technician to every one of them in turn to install some security update is perfectly feasible. + +\subsubsection{Control function exploits} +Control function exploits are attacks on the mathematical control loops used by the centralized control system. One +example of such an attack would be resonance attacks as described in \textcite{wu01}. +In this kind of attack, inputs from peripheral sensors indicating grid load to the centralized control system are +carefully modified to cause a disproportionally large oscillation in control system action. This type of attack relies +on complex resonance effects that arise when mechanical generators are electrically coupled. These resonances, +coloquially called ``modes'' are well-studied in power system engineering\cite{rogers01,grebe01,entsoe01}. +% FIXME: refer to section on stability control above here +Even disregarding modern attack scenarios, for stability electrical grids are designed with measures in place to dampen +any resonances inherent to grid structure. Still, requiring an accurate grid model these resonances are hard to analyze +and unlikely to be noiticed under normal operating conditions. + +Mitigation of these attacks is most easily done by on the one hand ensuring unmodified sensor inputs to the control +systems in the first place, and on the other hand carefully designing control systems not to exhibit exploitable +behavior such as oscillations. +% FIXME cite mitigation approaches + +\subsubsection{Endpoint exploits} +One rather interesting attack on smart grid systems is one exploiting the grid's endpoint devices such as smart +electricity meters\footnote{ + Though potentially this could also aim at other kinds of devices distributed on a large scale such as sensors in + unmanned substations. % FIXME cite verify +} +These meters are deployed on a massive scale, with several thousand meters deployed for every substation. +% FIXME cite (this should be straightforward) +Thus, once compromised restoration to an uncompromised state can be potentially very difficult if it requires physical +access to thousands of devices hidden inaccessible in private homes. + +By compromising smart electricity meters, an attacker can trivially forge the distributed energy measurements these +devices perform. In a best-case scenario, this might only affect billing and lead to customers being under- or +over-charged if the attack is not noticed in time. However, in a less ideal scenario the energy measurements taken by +these devices migth be used to inform the grid centralized control systems % FIXME cite (straightforward) +and a falsification of these measurements might lead to inefficiency or even instability. + +In some countries and for some customers, these smart meters have one additional function that is highly useful to an +attacker: They contain high-current load switches to disconnect the entire household or business in case electricity +bills are left unpaid for a certain period. In countries that use these kinds of systems, the load disconnect is often +simply hooked up to one of the smart merter's central microcontroller's general-purpose IO pins, allowing anyone +compromising this microcontroller's firmware to actuate the load switch at will. % FIXME validate cite add pictures + +Given control over a large number of network-connected smart meters, an attacker might thus be able to cause large-scale +disruptions of power consumption by repeatedly disconnecting and re-connecting a large number of consumers. +% FIXME cite some analysis of this +Combined with an attack method such as the resonance attack from \textcite{wu01} +that was mentioned above, this scenario poses a serious danger to grid stability. + +% FIXME add small-scale load shedding for heaters etc. + +\subsection{Attacker models in the smart grid} +\subsection{Practical attacks} +\subsection{Practical threats} +\subsection{Conclusion, or why we are doomed} + +\chapter{Restoring endpoint safety in an age of smart devices} +\section{The theory of endpoint safety} +\subsection{Attack characteristics} +\subsection{Complex microcontroller firmware} +\subsection{Modern microcontroller hardware} +\subsection{Regulatory and economical constraints} +\subsection{Safety vs. Security: Opting for restoration instead of prevention} +\subsection{Technical outline of a safety reset} + +\section{Communication channels on the grid} +\subsection{Powerline communication systems and their use} +\subsection{Proprietary wireless systems} +\subsection{Landline IP} +\subsection{IP-based wireless systems} +\subsection{Frequency modulation as a communication channel} +\subsubsection{The frequency dependance of grid frequency} +\subsubsection{Control systems coupled to grid frequency} +\subsubsection{Avoiding dangerous modes} +\subsubsection{Overall system parameters} +\subsubsection{An outline of practical implementation} + +\section{From grid frequency to a reliable communications channel} +\subsection{Channel properties} +\subsection{Modulation and its parameters} +\subsection{Error-correcting codes} +\subsection{Cryptographic security} + +\chapter{Practical implementation} +\section{Cryptographic validation} + +\section{Data collection for channel validation} +\subsection{Frequency sensor hardware design} +\subsection{Frequency sensor measurement results} + +\section{Channel simulation and parameter validation} + +\section{Implementation of a demonstrator unit} + +\section{Experimental results} + +\section{Lessons learned} + +\chapter{Future work} +\section{Technical standardization} +\section{Regulatory adoption} +\section{Practical implementation} + +\newpage +\appendix +\chapter{Acknowledgements} +\newpage + +\chapter{References} +\nocite{*} +\printbibliography +\newpage + +\chapter{Demonstrator schematics and code} + +\chapter{Economic viability of countermeasures} +\section{Attack cost} +\section{Countermeasure cost} +\section{Conclusion} + +\chapter{The ethics and security implications of centralized crackdown on energy theft} + +\end{document} |