Refine Your Search

Search Results

Viewing 1 to 5 of 5
Technical Paper

A Secure and Privacy-Preserving Collaborative Machine Learning System for Intelligent Transportation System

2020-04-14
2020-01-0139
Modern vehicles are increasingly equipped with multiple advanced on-board sensors and keep generating large volumes of data. Along with the recent advances in a wide range of Machine Learning (ML) algorithms, the vehicular data are being analyzed intelligently to enable users to be better informed and make safer, more coordinated, and smarter use of transport networks. The success of ML model relies on the availability of large set of relevant data so that the underlying model can be trained better. However, it is not possible for a ML model to fetch the complete set of data from a single vehicle, thus, the collaboration of other vehicles are desired in sharing their local model and collaboratively training the model. Collaborative machine learning (CML) mechanism can improve the intelligence of the ML models in different vehicles by transferring the learned knowledge from the local ML model of one vehicle to another across the distributed network.
Technical Paper

Autonomous Vehicles Camera Blinding Attack Detection Using Sequence Modelling and Predictive Analytics

2020-04-14
2020-01-0719
Autonomous vehicles are waiting to address the global automotive mobility challenges through an intelligent smart transportation system, which includes advanced sensor-actuator configurations to control, navigate, and drive the vehicles. Multi-sensor data fusion from the key sensors such as camera, radar, and lidar is used to achieve the environmental perception for autonomous vehicles by capturing the various attributes of the environment. Cameras are the dominant sensors to achieve the perception by providing vision capability to vehicles. The direct interface of the cameras with the dynamic driving environment carries numerous attack surfaces on the camera. Blinding attacks on the cameras are one of the critical attacks with an intention to blind the cameras either fully or partially by projecting light into the cameras to hide the objects which results in failure in object detection.
Technical Paper

Deep Learning Based Automotive Requirements Analysis

2023-04-11
2023-01-0864
Automotive system functionalities spread over a wide range of sub-domains ranging from non-driving related components to complex autonomous driving related components. The requirements to design and develop these components span across software, hardware, firmware, etc. elements. The successful development of these components to achieve the needs from the stockholders requires accurate understanding and traceability of the requirements of these component systems. The high-level customer requirements transformation into low level granularity requires an efficient requirement engineer. The manual understanding of the customer requirements from the requirement documents are influenced by the context and the knowledge gap of the requirement engineer in understanding and transforming the requirements.
Technical Paper

Deep Learning Based Real Time Vulnerability Fixes Verification Mechanism for Automotive Firmware/Software

2021-04-06
2021-01-0183
Software vulnerability management is one of the most critical and crucial security techniques, which analyzes the automotive software/firmware across the digital cockpit, ADAS, V2X, etc. domains for vulnerabilities, and provides security patches for the concerned Common Vulnerabilities and Exposures (CVE). The process of automotive SW/FW vulnerability management system between the OEMs and vendors happen through a channel of fixing a certain number of vulnerabilities by 1st tier supplier which needs to be verified in front of OEMs for the fixed number and type of patches in there deliverable SW/FW. The gap of verification between for the fixed patches between the OEMs and 1st tier supplier requires a reliable human independent intelligent technique to have a trustworthiness of verification.
Technical Paper

Mechanism for Secure Storage without a Trusted Execution Environment for Low/Mid Automotive Segments

2021-04-06
2021-01-0145
Increasing adoption of connected vehicles has led the vehicle manufacturers to deal with security issues in a vehicle-embedded system. In order to secure the security critical instructions/operations such as security functions, cryptographic credentials in a connected embedded system Arm Trustzone Technology is widely used in automotive embedded system across Cockpit, ADAS, V2X, etc. The Arm Trustzone technology protects the security critical operations by executing them in a trusted execution environment (TEE) parallelly by isolating them through hardware from classic rich execution environment (REE) using the shared hardware resources by protecting the confidentiality and integrity of the system.
X