1 |
Skrivarinventering på RinghalsGillgren, Richard January 2016 (has links)
Denna rapport är skriven på och om Ringhals. Den beskriver i stora drag hur Ringhals jobbar för att hålla säkerheten på en hög nivå och hur de jobbar med miljön i fokus, som med t ex avfalls-och utsläppshanteringen. I rapporten kan man även läsa om underhållets och driftens organisation. På teknikavdelningen Nuclear teknik instrumentation analys (NTIA) pågår ett projekt där alla skrivare som sitter i kontrollrummen (KR) ska inventeras. Dessa skrivare ritar trender, från normalt ett flertal olika mätvärden, på papper. Inventeringen görs för att sammanställa information som status, fabrikat, placering och vilken information respektive skrivare presenterar. Det ska också undersökas om informationen som skrivarna presenterar finns tillgänglig i andra system. För att förstå var informationen eventuellt skulle kunna hämtas någonstans så beskrivs i rapporten system som blockdator (BUR), vibrationsdator, reaktorövervakningssystem (RÖS), turbinsystemet 800xA och processinformationssystem (PIS). Huvudsyftet är att detta arbete ska vara en del av det underlag som ingår i ”R34 Målkontrollrum”. ”R34 Målkontrollrum” ska i sin tur vara vägledande gällande hur anläggningarna ska kunna vidmakthållas till en effektiv kostnad. Resultatet av denna rapport visade att det inte var speciellt många mätvärden som kunde fås från de andra systemen utöver pappersskrivarna. Det ligger nu i övriga projektmedlemmars händer att med hjälp av denna inventering besluta vilka skrivare som kan plockas bort och vilka som bör bytas ut till s.k. Loggers.
|
2 |
Automatisk mätning och detektering av röjande signaler / Automatic measuring and detection of compromising emanationsEkman, Anders January 2003 (has links)
<p>This master thesis has been performed at Sectra Communications AB in Linköping where they manufacture electronic encryption devices. In cryptology it is essential that an eavesdropper cannot find the plain text. To assure that a system is safe, all devices are thoroughly examined so that they don’t emit any secret information, so called Compromising Emanations (CE). This is done by comparing the secret signal with measured signals on the screen of an oscilloscope, a process that is very time consuming and furthermore, the risk of missing compromising emanations is high. The purpose of this thesis is to investigate the possibilities to let a computer do this job. Two methods for comparing the signals have been suggested and implemented; cross covariance and model estimation. In the cross covariance method, the cross covariance is calculated and its highest value determine how well the signals match. In the model estimation method, a number of ARX models are estimated, and if the best model is successful in explaining the output signal, it is assumed that there exists CE. </p><p>The work shows that both these methods are functional for solving the task, yet with a few limitations. Both methods announce CE for clock signals, which really aren’t compromising. The cross covariance method is limited only to find compromising emanations that look like the secret signal or certain frequently occurring non-linearities of it. The model estimation method is more general and detects CE for all linear systems, along with the known non-linearities. However, this method has a flaw: the time delay in the system must be known approximately. Further, the results show that the model estimation method is considerably more time consuming than the cross covariance method. The measurement is carried out with a computer communicating with oscilloscope and spectrum analyzer via the GPIB interface. The implementation has been done in LabView with calculation modules coded in C++.</p>
|
3 |
Automatisk mätning och detektering av röjande signaler / Automatic measuring and detection of compromising emanationsEkman, Anders January 2003 (has links)
This master thesis has been performed at Sectra Communications AB in Linköping where they manufacture electronic encryption devices. In cryptology it is essential that an eavesdropper cannot find the plain text. To assure that a system is safe, all devices are thoroughly examined so that they don’t emit any secret information, so called Compromising Emanations (CE). This is done by comparing the secret signal with measured signals on the screen of an oscilloscope, a process that is very time consuming and furthermore, the risk of missing compromising emanations is high. The purpose of this thesis is to investigate the possibilities to let a computer do this job. Two methods for comparing the signals have been suggested and implemented; cross covariance and model estimation. In the cross covariance method, the cross covariance is calculated and its highest value determine how well the signals match. In the model estimation method, a number of ARX models are estimated, and if the best model is successful in explaining the output signal, it is assumed that there exists CE. The work shows that both these methods are functional for solving the task, yet with a few limitations. Both methods announce CE for clock signals, which really aren’t compromising. The cross covariance method is limited only to find compromising emanations that look like the secret signal or certain frequently occurring non-linearities of it. The model estimation method is more general and detects CE for all linear systems, along with the known non-linearities. However, this method has a flaw: the time delay in the system must be known approximately. Further, the results show that the model estimation method is considerably more time consuming than the cross covariance method. The measurement is carried out with a computer communicating with oscilloscope and spectrum analyzer via the GPIB interface. The implementation has been done in LabView with calculation modules coded in C++.
|
4 |
Sidokanalattack mot knappsats för elektroniskt passersystem / Side-channel attack against electronic entry system keypadAlasjö, Alexander January 2017 (has links)
Genom ett undersökande experiment med elektromagnetisk sidokanalattack mot en knappsats för ett kommersiellt passersystem påvisas att informationsläckage i sidokanaler är ett fortsatt aktuellt problem och hur det gör fysisk åtkomstkontroll sårbart genom avlyssning och kopiering av användaruppgifter. Med enkel radioutrustning kan knapptryckningar registreras och avkodas genom oönskad elektromagnetisk strålning och teoretiskt är det möjligt att genomföra avlyssningen på en längre distans med särskilt utformad antenn och anpassad mottagare. Rapporten diskuterar problematiken med emission security hos konsumentprodukter som i militära sammanhang benämns Tempest eller RÖS (röjande signaler) och kräver kostsamma tester för att detekteras och hanteras. I regelverk för EMC (elektromagnetisk kompatibilitet) behandlas elektriska apparaters och näts utstrålning och påverkan av elektromagnetiska vågor, men inte direkt hur information kan läcka från informationsteknologisk utrustning vilket denna rapport vill problematisera. / Through an exploratory experiment using electromagnetic side-channel attack against a keypad for a commercial entry system it is demonstrated that information leakage through side-channels are an ongoing issue and may make entry systems vulnerable by recording of user data. Using simple radio equipment, keypresses can be recorded and decoded by undesired electromagnetic radiation and theoretically it is possible to carry out the attack on a longer distance with a specially designed antenna and a custom recieiver. The report discusses emission security in consumer products which in military context is termed Tempest or compromising emanations (Swedish: RÖS) and requires expensive tests to be detected and handled. The EMC regulations (electromagnetic compatibility) handles radiation and influence of electromagnetic waves in electronic apparatus and nets, but not directly how information can leak from information technology equipment which this report wants to problematize.
|
Page generated in 0.0285 seconds