Refine Your Search

Search Results

Viewing 1 to 4 of 4
Journal Article

A Model-Based Configuration Approach for Automotive Real-Time Operating Systems

2015-04-14
2015-01-0183
Automotive embedded systems have become very complex, are strongly integrated, and the safety-criticality and real-time constraints of these systems raise new challenges. The OSEK/VDX standard provides an open-ended architecture for distributed real-time capable units in vehicles. This is supported by the OSEK Implementation Language (OIL), a language aiming at specifying the configuration of these real-time operating systems. The challenge, however, is to ensure consistency of the concept constraints and configurations along the entire product development. The contribution of this paper is to bridge the existing gap between model-driven systems engineering and software engineering for automotive real-time operating systems (RTOS). For this purpose a bidirectional tool bridge has been established based on OSEK OIL exchange format files.
Technical Paper

ADACS: Advanced Diagnosis for Time-Triggered Automotive Communication Systems

2011-04-12
2011-01-1044
Automotive electronics are complex distributed embedded systems. The tight interconnection of the different functionalities (e.g. ABS, ESP) makes the network resource the backbone of the system. Time-triggered architectures and time-triggered communication systems such as FlexRay have been introduced in this context to support the development and integration of safety-relevant systems. An important enhancement to this approach is online monitoring and transparent diagnosis to ensure better assessment of the system status (faster fault detection) during operation. This is required for preventive maintenance in order to improve system availability. We propose a non-intrusive two steps method for the analysis of the communication architecture. In the first step, the system behavior is monitored at different abstraction levels by a dedicated tester node. The traces are analyzed online and the current system behavior is compared to the specification (e.g.
Technical Paper

An Integrated View on Automotive SPICE, Functional Safety and Cyber-Security

2020-04-14
2020-01-0145
The automotive domain has seen safety engineering at the forefront of the industry’s priorities for the last decade. Therefore, additional safety engineering efforts, design approaches, and well-established safety processes have been stipulated. Today many connected and automated vehicles are available and connectivity features and information sharing are increasingly used. This increases the attractiveness of an attack on vehicles and thus introduces new risks for vehicle cybersecurity. Thus, just as safety became a critical part of the development in the late 20th century, the automotive domain must now consider cybersecurity as an integral part of the development of modern vehicles. Aware of this fact, the automotive industry has, therefore, recently taken multiple efforts in designing and producing safe and secure connected and automated vehicles.
Technical Paper

Integrated Safety and Security Development in the Automotive Domain

2017-03-28
2017-01-1661
The replacement of safety-critical mechanical components with electro-mechanical systems has led to the fact that safety aspects play a central role in development of embedded automotive systems. Recently, consumer demands for connectivity (e.g., infotainment, car-2-car or car-2-infrastructure communication) as well as new advances toward advanced driver assistance systems (ADAS) or even autonomous driving functions make cybersecurity another key factor to be taken into account by vehicle suppliers and manufacturers. Although these can capitalize on experiences from many other domains, they still have to face several unique challenges when gearing up for specific cybersecurity challenges. A key challenge is related to the increasing interconnection of automotive systems with networks (such as Car2X). Due to this connectivity, it is no longer acceptable to assume that safety-critical systems are immune to security risks.
X