Refine Your Search

Topic

Author

Affiliation

Search Results

Technical Paper

Attacking vehicles with ransomware: Watch the horizon

2022-03-29
2022-01-0358
Ransomware use is rampant throughout most industries. With the number of successful ransomware attacks through the industrial economy, this feels like a tsunami of attacks. These attacks seemingly originate from anywhere with an internet connection. There are vast numbers of bad actors creating these attacks, all focused on your systems. With the large number of attacks, it is granted there have been many breaches. While there have been a large number of successful attacks, each attack’s objectives have varied. These have historically been to generate revenue in the form of fees for the decrypt key or a promise not to publish exfiltrated data. The landscape has become saturated with ransomware attacks on consumers and the enterprise. There has been extensive training for staff in an effort to mitigate these issues. The next potential targets are vehicles and ground systems. These, as targets, have not been evaluated via a full risk assessment to the recommended extent.
Technical Paper

Strategy to adopt ISO/SAE 21434 Cyber security assurance level in the organization

2022-03-29
2022-01-0121
The study adopts an RVC (Rear-View Camera) system and performs a threat modeling to describe the details of the proposed process and helps cybersecurity experts, organizations to implement a structured process of CAL in their existing cybersecurity management system. Keywords: Cybersecurity, CAL, ISO21434, threat scenario, risk management, secure development lifecycle. ...This standard has introduced a new classification scheme, cybersecurity assurance level (CAL), that helps in validating the process rigor needed for mitigating different threat scenarios. ...CAL values can be determined at the earlier stages of the SDLC (cybersecurity concept phase) through the knowledge of attack vectors and attack severity specific to a system.
Technical Paper

UDS Security Access for highly-constrained ECUs

2022-03-29
2022-01-0132
Legacy electronic control units are, nowadays, required to implement cybersecurity measures, but they often do not have all the facilities that are necessary to realise industry-standard cybersecurity controls. ...Legacy electronic control units are, nowadays, required to implement cybersecurity measures, but they often do not have all the facilities that are necessary to realise industry-standard cybersecurity controls. Such systems must still be protected with a sufficient level of rigor against attackers who wish to modify their operation or extract confidential information from them. ...While the classic UDS service $27 (Security Access) has a reputation for poor cybersecurity, there is nothing inherent in the way it operates which prevents a secure access-control from being implemented.
Technical Paper

Future of Automotive Embedded Hardware Trust Anchors

2022-03-29
2022-01-0122
In this paper, we look at the upcoming trends in EE architectures, and investigate the underlying cyber-security threats and corresponding security requirements that lead to potential requirements for an “Automotive Embedded Hardware Trust Anchors” (AEHTA).
Research Report

Unsettled Issues in Remote Operation for On-road Driving Automation

2021-12-15
EPR2021028
On-road vehicles equipped with driving automation features—where a human might not be needed for operation on-board—are entering the mainstream public space. However, questions like “How safe is safe enough?” and “What to do if the system fails?” persist. This is where remote operation comes in, which is an additional layer to the automated driving system where a human remotely assists the so-called “driverless” vehicle in certain situations. Such remote-operation solutions introduce additional challenges and potential risks as the entire vehicle-network-human now needs to work together safely, effectively, and practically. Unsettled Issues in Remote Operation for On-road Driving Automation highlights technical questions (e.g., network latency, bandwidth, cyber security) and human aspects (e.g., workload, attentiveness, situational awareness) of remote operation and introduces evolving solutions.
Research Report

Unsettled Issues Concerning Automated Driving Services in the Smart City Infrastructure

2021-12-15
EPR2021030
Information and communication technology is fundamentally changing the way we live and operate in cities, such as instant access to events, transportation, bookings, payments, and other services. At the same time, three “megatrends” in the automotive industry—self-driving, electrification, and advanced manufacturing technology—are enabling the design of innovative, application-specific vehicles that capitalize on city connectivity. Applications could countless; however, they also need to be safe and securely integrated into a city’s physical and digital infrastructure, and into the overall urban ecosystem. Unsettled Issues Concerning Automated Driving Services in the Smart City Infrastructure examines the current state of the industry, the developments in automated driving and robotics, and how these new urban, self-driving city applications are different. It also analyzes higher level challenges for urban applications.
Research Report

Unsettled Aspects of the Digital Thread in Additive Manufacturing

2021-11-15
EPR2021026
Additive manufacturing (AM), also known as “3D printing,” now provides the ability to have an almost fully digital chain from part design through manufacture and service. This “digital thread” can bring great benefits in improving designs, processes, materials, operations, and the ability to predict failure in a way that maximizes safety and minimizes cost and downtime. Unsettled Aspects of the Digital Thread in Additive Manufacturing discusses what the interplay between AM and a digital thread in the mobility industry would look like, the potential benefits and costs, the hurdles that need to be overcome for the combination to be useful, and how an organization can answer these questions to scope and benefit from the combination. Click here to access the full SAE EDGETM Research Report portfolio.
Technical Paper

Designing a Next Generation Trailer Braking System

2021-10-11
2021-01-1268
Passenger vehicles have made astounding technological leaps in recent years. Unfortunately, little of that progress has trickled down to other segments of the transportation industry leaving opportunities for massive gains in safety and performance. In particular, the electric drum brakes on most consumer trailers differ little from those on trailers over 70 years ago. Careful examination of current production passenger vehicle hardware and trailering provided the opportunity to produce a design and test vehicle for a plausible, practical, and performant trailer braking system for the future. This study equips the trailer with high control frequency antilock braking and dynamic torque distribution through use of passenger vehicle grade apply hardware.
Technical Paper

Towards Establishing Continuous-X Pipeline Using Modular Software-in-the-Loop Test Environments

2021-09-22
2021-26-0412
Software-in-the-Loop (SiL) test environments are the ideal virtual platforms for enabling continuous-development, -integration, -testing -delivery or -deployment commonly referred as Continuous-X (CX) of the complex functionalities in the current automotive industry. This trend especially is contributed by several factors such as the industry wide standardization of the model exchange formats, interfaces as well as architecture definitions. The approach of frontloading software testing with SiL test environments is predominantly advocated as well as already adopted by various Automotive OEMs, thereby the demand for innovating applicable methods is increasing. However, prominent usage of the existing monolithic architecture for interaction of various elements in the SiL environment, without regarding the separation between functional and non-functional test scope, is reducing the usability and thus limiting significantly the cost saving potential of CX with SiL.
Technical Paper

Improved Run Time Error Analysis Using Formal Methods for Automotive Software - Improvement of Quality, Cost Effectiveness and Efforts to Proactive Defects Check

2021-09-22
2021-26-0459
Quality is what determines success or failure. If products are not error-free, reliable and robust, customers will be put off. Criticism is inevitable. Bosch is focusing on this theme and taking appropriate action to improve the quality of automotive software. Runtime errors most often refer to issues that appear during the execution of a program like buffer overflow issues and pointer access out of bounds. They are important to detect as they may cause critical safety, security or business operation concerns. They can potentially cause the critical systems of high-integrity applications to fail, leading to disastrous results and they have been blamed as the root cause of system failure in high-profile examples in automotive software. This has resulted in identifying run-time error detection as critical field of interest where safety-critical embedded software has to satisfy stringent quality requirements by all contemporary safety standards where no run-time errors must occur.
Technical Paper

Onboard Cybersecurity Diagnostic System for Connected Vehicles

2021-09-21
2021-01-1249
Here, we discuss the On-Board Diagnostic (OBD) regulations for next generation BEV/HEV, its vulnerabilities and cybersecurity threats that come with hacking. We propose three cybersecurity attack detection and defense methods: Cyber-Attack detection algorithm, Time-Based CAN Intrusion Detection Method and, Feistel Cipher Block Method. ...These control methods autonomously diagnose a cybersecurity problem in a vehicle’s onboard system using an OBD interface, such as OBD-II when a fault caused by a cyberattack is detected, All of this is achieved in an internal communication network structure.
Research Report

Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles

2021-09-13
EPR2021019
Modern automobiles collect around 25 gigabytes of data per hour and autonomous vehicles are expected to generate more than 100 times that number. In comparison, the Apollo Guidance Computer assisting in the moon launches had only a 32-kilobtye hard disk. Without question, the breadth of in-vehicle data has opened new possibilities and challenges. The potential for accessing this data has led many entrepreneurs to claim that data is more valuable than even the vehicle itself. These intrepid data-miners seek to explore business opportunities in predictive maintenance, pay-as-you-drive features, and infrastructure services. Yet, the use of data comes with inherent challenges: accessibility, ownership, security, and privacy. Unsettled Legal Issues Facing Data in Autonomous, Connected, Electric, and Shared Vehicles examines some of the pressing questions on the minds of both industry and consumers. Who owns the data and how can it be used?
Technical Paper

The Role of Safety Critical Architecture in an Evolving Ecosystem

2021-06-16
2021-01-1000
There are many industries where safety is a major, if not the primary, concern, such as aviation and nuclear power. These industries rely on many layers of standards for designing, developing, and deploying safety critical systems and technologies. While unmanned aircraft system (UAS) operations and UAS Traffic Management (UTM) are often touted as “safety critical”, the systems and technologies are not being held to the same standards as traditional aviation, with its long pedigree of safety. There are multiple reasons for this dichotomy. One such reason is that design assurance standards, such as DO-178 for software, do not fit with modern technology such as web-based communication and machine learning. At the architecture level, the federated approach to UTM has led to a void in the Systems Engineering process. Nobody “owns” the entire system and therefore nobody owns the Systems Engineering process where many safety related design decisions are traditionally made.
Technical Paper

It Takes a Village: A Case Study of Business Development and Innovation in a UAS/AUS Ecosystem to Address Critical Industry Challenges

2021-06-16
2021-01-1002
Entrepreneurial innovation that spurs economic development requires a collaborative cluster of cooperative effort, across a diverse ecosystem of partners. Literature provides resounding evidence to support the notion that an innovative, entrepreneurial ecosystem is critical to both successful economic development and industry sector growth. The UAS/AUS industry sector is a fast-growing sector across the United States, with regional leadership demonstrated in North Dakota, California, North Carolina, New York, Oklahoma, Texas and New Mexico. This case study is focused on investigating how the North Dakota autonomous systems ecosystem continues to evolves and develop mechanisms and partnerships to address industry pain points, facilitate cutting edge research, ensure high-quality UAS/AUS testing, and support an adaptive business development pipeline across the entrepreneurial life cycle.
Research Report

Unsettled Issues Regarding Autonomous Vehicles and Open-source Software

2021-04-21
EPR2021009
Unsettled Issues Regarding Autonomous Vehicles and Open-source Software introduces the impact of software in advanced automotive applications, the role of open-source communities in accelerating innovation, and the important topic of safety and cybersecurity. As electronic functionality is captured in software and a bigger percentage of that software is open-source code, some critical challenges arise concerning security and validation.
Technical Paper

Integrating Fuzz Testing into the Cybersecurity Validation Strategy

2021-04-06
2021-01-0139
Therefore, modern cybersecurity validation is highly stressed for finding security vulnerabilities and robustness issues early and systematically at every stage of the product development process. ...The integration of a sophisticated fuzz testing program within the overall cybersecurity validation strategy allows for accommodating towards these challenging demands. In this paper, we review a general automotive cybersecurity engineering process containing functional testing, vulnerability scanning and penetration testing, and highlight shortcomings that can be complemented by fuzz testing. ...In this paper, we review a general automotive cybersecurity engineering process containing functional testing, vulnerability scanning and penetration testing, and highlight shortcomings that can be complemented by fuzz testing.
Technical Paper

Deep Learning Based Real Time Vulnerability Fixes Verification Mechanism for Automotive Firmware/Software

2021-04-06
2021-01-0183
Software vulnerability management is one of the most critical and crucial security techniques, which analyzes the automotive software/firmware across the digital cockpit, ADAS, V2X, etc. domains for vulnerabilities, and provides security patches for the concerned Common Vulnerabilities and Exposures (CVE). The process of automotive SW/FW vulnerability management system between the OEMs and vendors happen through a channel of fixing a certain number of vulnerabilities by 1st tier supplier which needs to be verified in front of OEMs for the fixed number and type of patches in there deliverable SW/FW. The gap of verification between for the fixed patches between the OEMs and 1st tier supplier requires a reliable human independent intelligent technique to have a trustworthiness of verification.
Technical Paper

xEV Propulsion System Control-Overview and Current Trends

2021-04-06
2021-01-0781
Propulsion system control algorithms covering the functional needs of xEV propulsion (‘x’ donates P0-P4 configurations) systems are presented in this paper. The scope and foundation are based on generic well-established HEV controller architectures. However, unlike conventional HEV (series, parallel and power split) powertrains, the next generation of integrated electric propulsion configurations will utilize a single micro controller that supports multiple control functions ranging from the electric machines, inverters, actuators, clutch solenoids, coolant pumps, etc. This presents a unique challenge to architect control algorithms within the AUTOSAR framework while satisfying the complex timing requirements of motor/generator-inverter (MGi) control and increased interface definitions between software components to realize functional integration between the higher level propulsion system and its sub-systems.
Journal Article

Implementation Methodologies for Simulation as a Service (SaaS) to Develop ADAS Applications

2021-04-06
2021-01-0116
Over the years, the complexity of autonomous vehicle development (and concurrently the verification and validation) has grown tremendously in terms of component-, subsystem- and system-level interactions between autonomy and the human users. Simulation-based testing holds significant promise in helping to identify both problematic interactions between component-, subsystem-, and system-levels as well as overcoming delays typically introduced by the default full-scale on-road testing. Software in Loop (SiL) simulation is utilized as an intermediate step towards software deployment for autonomous vehicles (AV) to make them reliable. SiL efforts can help reduce the resources required for successful deployment by helping to validate the software for millions of road miles. A key enabler for accelerating SiL processes is the ability to use Simulation as a Service (SaaS) rather than just isolated instances of software.
X