Refine Your Search




Search Results

Training / Education

Fundamentals of High Voltage xEV, Safety, and PPE

Do you know what personal protective equipment (PPE), tools, and instruments are needed to keep you safe around high voltage (HV) vehicles? Are you aware of how to protect yourself or your employees when working around high voltage systems and platforms? Safety is paramount when working around any type of high voltage. As electric vehicles (EV) and EV fleets become more prevalent, the critical need for OEMs, suppliers, companies, and organizations to provide comprehensive safety training for teams working with or around xEV systems and platforms increases.

The New Future of Public Transit, Second Edition

From hydrogen-fueled buses to AI-driven advancements and cybersecurity, this book offers an unparalleled glimpse into the future of transit. Navigate the complexities of transit planning in a post-COVID world, where innovative solutions are essential to tackle infrastructure challenges and workforce shortages.
Technical Paper

Trucking Forward: Intrusion Detection for SAE J1708/J1587 Networks in Heavy-Duty Vehicles

While current cybersecurity endeavors in the heavy-duty (HD) vehicle space focus on securing conventional communication technologies such as the controller area network (CAN), there is a notable deficiency in defensive research concerning legacy technologies, particularly those utilized between trucks and trailers. ...To the best of current knowledge, this publication marks the first presentation of cybersecurity defense research on the SAE J1708/J1587 protocol stack.
Technical Paper

Cyber Security Rating Framework and its Application to J1939-1C Standard

Cyber Security Rating Framework and its Application to J1939-1C Standard Present day automotives are becoming smart and more software driven. Conversely every line of code equals to a possible threat to the vehicle, passenger as well as the OEM. To hit the brakes on the alarming increase in cyber-threats, Government bodies have introduced standards and regulations globally. UNECE's WP.29 R155 & R156 regulations and ISO/SAE 21434 standards are mandatory for all OEMS. However, the gap is a framework and a standard that provides guidance and common criteria for automakers to measure the vehicle's level of compliance and compute a publicly accepted cyber security rating. This paper addresses the above requirement and discusses the Cyber Security Rating Framework (CSRF) that establishes a standard for rating vehicle cyber security by standardizing the measurement criteria, parameter vectors, process and tools.
Technical Paper

A Zero Trust Architecture for Automotive Networks

Since the early 1990’s, commercial vehicles have suffered from repeated vulnerability exploitations that resulted in a need for improved automotive cybersecurity. This paper describes the strategies and challenges involved in securing vehicle networks through the implementation of an automotive Zero Trust Architecture (ZTA). ...This ZTA solution leverages the best cybersecurity practices from the IT industry and preexisting vehicle architecture components. For example, the vehicle gateway electronic control unit (ECU) is utilized to enforce cyber policy, monitor the network, distribute keys, and implement network segmentation. ...This research successfully demonstrates that using Zero Trust principles in an on-vehicle network greatly improves the cybersecurity posture with manageable impact to system performance, cost, and deployment.
Technical Paper

Vehicle E/E Architecture and Key Technologies Enabling Software-Defined Vehicle

This paper gives a definition of the SDV concept, provides views from different aspects, discusses the latest progress in vehicle E/E architecture, especially the centralized and zone-based architecture, and various technologies including High-Performance Computing (HPC) platform, vehicle Operating System (OS), Over-The-Air (OTA) Update, advanced communication, connectivity, cybersecurity, and cloud service, etc. that enable SDV.
Technical Paper

The Interference of Functional Safety and Cyber Security in the Context of Fail-Operational Systems

The development of highly automated driving functions (AD) recently drives the demand for so called Fail-Operational systems for native driving functions like steering and braking of vehicles. Fail-Operational systems shall guarantee the availability of driving functions even in presence of failures. This can also mean a degradation of system performance or limiting a system’s remaining operating period. In either case, the goal is independency from a human driver as a permanently situation-aware safety fallback solution to provide a certain level of autonomy. In parallel, the connectivity of modern vehicles is rapidly increasing and especially in vehicles with highly automated functions, there is high demand for connected functions, Infotainment (web conference, Internet, Shopping) and Entertainment (Streaming, Gaming) to entertain the passengers, who are no longer occupied with driving tasks.
Technical Paper

A Comprehensive Training Approach for Automotive Cybersecurity Engineering

The publication of ISO/SAE DIS 21434 “Road vehicles — Cybersecurity engineering” represents a major step forward for cybersecurity engineering in the automotive domain. ...While ISO/SAE 21434 is the first international standard for automotive cybersecurity there is also a new type approval regulation on automotive cybersecurity (UN R155) for the European market. ...Thus the challenges for embedded automotive systems engineers are increasing while frameworks, tools, and shared concepts for cybersecurity engineering and training are scarce. Furthermore, cybersecurity training in the automotive domain includes very detailed domain knowledge and challenges related to cybersecurity and embedded systems engineering.
Technical Paper

Applying Concolic Testing to the Automotive Domain

Symbolic code execution is a powerful cybersecurity testing approach that facilitates the systematic exploration of all paths within a program to uncover previously unknown cybersecurity vulnerabilities. ...Symbolic code execution is a powerful cybersecurity testing approach that facilitates the systematic exploration of all paths within a program to uncover previously unknown cybersecurity vulnerabilities. This is achieved through a Satisfiability Modulo Theory (SMT) solver, which operates on symbolic values for program inputs instead of using their concrete counterparts.
Technical Paper

Integrating Functional and Component-Level Threat Analyses in Automotive Systems: A Holistic Approach to Risk Assessment

This method's detailed approach ensures that cybersecurity requirements can be readily implemented as a part of feature design, addressing the concerns of feature owners directly. ...Unified Threat Modeling: Leveraging techniques from systems engineering and cybersecurity domains to create a single, unified, and analytical threat model that takes into account both functional and component perspectives. 2.