Refine Your Search

Topic

Search Results

Viewing 1 to 18 of 18
Technical Paper

Cyber-security for Engine ECUs: Past, Present and Future

2015-09-01
2015-01-1998
In this paper, we outline past, present and future applications of automotive security for engine ECUs. Electronic immobilizers and anti-tuning countermeasures have been used for several years. Recently, OEMs and suppliers are facing more and more powerful attackers, and as a result, have introduced stronger countermeasures based on hardware security. Finally, with the advent of connected cars, it is expected that many things that currently require a physical connection will be done remotely in a near future. This includes remote diagnostics, reprogramming and engine calibration.
Journal Article

(R)evolution of E/E Architectures

2015-04-14
2015-01-0196
Functionalities such as automated driving, connectivity and cyber-security have gained increasing importance over the past few years. The importance of these functionalities will continue to grow as these cutting-edge technologies mature and market acceptance increases.
Technical Paper

Hypervisor Implementation in Vehicle Networks

2020-04-14
2020-01-1334
The hypervisor offers many benefits to the vehicle architecture, both operationally and with cybersecurity. The proposed mitigant provides the structure to partition the various VMs. This allows for the different functions to be managed within their own distinct VM. ...While the cybersecurity applications are numerous, there are also the operational benefits. The hypervisor is designed to not only manage the VMs, but also to increase the efficiency of these via resource management.
Technical Paper

Secure Deterministic L2/L3 Ethernet Networking for Integrated Architectures

2017-09-19
2017-01-2103
Cybersecurity attacks exploit vulnerabilities related to the increased complexity and connectivity of critical infrastructure systems. ...Network security is a core component of the overall cyber-security and defense-in-depth capability for distributed architectures. Protection mechanism for information, interface and system integrity, communication availability, and data confidentiality are required for design of safe and secure integrated embedded infrastructure.
Technical Paper

Cyber Security in the Automotive Domain – An Overview

2017-03-28
2017-01-1652
Driven by the growing internet and remote connectivity of automobiles, combined with the emerging trend to automated driving, the importance of security for automotive systems is massively increasing. Although cyber security is a common part of daily routines in the traditional IT domain, necessary security mechanisms are not yet widely applied in the vehicles. At first glance, this may not appear to be a problem as there are lots of solutions from other domains, which potentially could be re-used. But substantial differences compared to an automotive environment have to be taken into account, drastically reducing the possibilities for simple reuse. Our contribution is to address automotive electronics engineers who are confronted with security requirements. Therefore, it will firstly provide some basic knowledge about IT security and subsequently present a selection of automotive specific security use cases.
Technical Paper

Test Method for the SAE J3138 Automotive Cyber Security Standard

2020-04-14
2020-01-0142
This paper will provide an Overview of Automotive Cyber Security Standards related to the Vehicle OBD-II Data Link. The OBD-II Connector Attack Tree is described with respect to the SAE J3138 requirements for Intrusive vs. non-Intrusive Services. A proposed test method for SAE J3138 is described including hardware and software scripting. Finally, example test results are reviewed and compared with a potential threat boundary.
Technical Paper

Securing J1939 Communications Using Strong Encryption with FIPS 140-2

2017-03-28
2017-01-0020
Since 2001, all sensitive information of U.S. Federal Agencies has been protected by strong encryption mandated by the Federal Information Processing Standards (FIPS) 140-2 Security Requirements. The requirements specify a formal certification process. The process ensures that validated encryption modules have implemented the standard, and have passed a rigorous testing and review processes. Today, this same strong security protection has become possible for vehicle networks using modern, cost-effective encryption in hardware. This paper introduces the motivation and context for the encryption diagnostics security in terms of all vehicles in general, not just trucks which use SAE J1939 communications. Several practical scenarios for using such encryption hardware and the advantages of using hardware compared to software private-key encryption and public-key encryption are described.
Technical Paper

Investigation of Vehicular Networks and its Main Security Issues

2014-04-01
2014-01-0336
Vehicular Network is an emerging and developing technology to improve traffic management and safety issues, and enable a wide range of value-added services such as collision warning/avoidance. Many applications have been designed to provide safety and comfort for passengers. This technology is a prolific area for attackers who will attempt to challenge the network with their malicious or rational attacks. In this paper we elaborate what a vehicular network is, different kinds of communication in this field, main mechanism and related parts and how vehicular networks work then we introduce some of its applications. After primary familiarity with this system we investigate to different type of attacker, more important security issues, How to secure vehicular networks (security requirements and some tools and methods to achieve secure vehicular networks), difficulties and providing viable security solutions, and at the end briefly explanation of related standards.
Technical Paper

Vehicle E/E Architecture and Its Adaptation to New Technical Trends

2019-04-02
2019-01-0862
With the ever-increasing requirements on vehicle performance, as well as the trend of vehicle becoming an integral part of a much bigger ecosystem involving automated driving, intelligent transportation and smart city, more and more electrical/electronic (E/E) systems are integrated in vehicles. Vehicle E/E architecture being the fundamental organization of E/E components, the relationship among the components and with the environment, as well as the principles guiding the design and evolution, has essential influences on vehicle E/E system functions and performance. This paper gives the definition of vehicle E/E architecture and provides different views. The guidelines, contents and process of E/E architecture design are discussed. The evolution of E/E architecture, influence of the latest technical trends including electrification, automated driving, and connectivity functions on E/E architecture, and how vehicle E/E architecture adapts to the technical trends are studied.
Technical Paper

Challenges in the Regulatory Framework of Automated Driving

2019-01-09
2019-26-0097
Automated Driving (AD) is foreseen to be one of the major social and technological challenges in the coming years. Many manufacturers are developing new models with cutting-edge functionalities, which are not included in the scope of the current regulatory framework. Apart from demonstrating their know-how and expertise about AD, their willingness to sell their AD models in the European market is accelerating the rule-making system. However, which is the roadmap for the European regulatory framework? Policy makers and regulatory bodies are pushing their boundaries at all levels (national and international) in order to introduce modifications in existing regulations. These regulations will enable the introduction of these new functionalities into the market. Without decreasing the standards of safety and security, the implementation of a clear and harmonized regulatory framework and approval process is extremely needed.
Technical Paper

Transformational Technologies Reshaping Transportation - An Academia Perspective

2019-10-14
2019-01-2620
This paper and the associated lecture present an overview of technology trends and of market and business opportunities created by technology, as well as of the challenges posed by environmental and economic considerations. Commercial vehicles are one of the engines of our economy. Moving goods and people efficiently and economically is a key to continued industrial development and to strong employment. Trucks are responsible for nearly 70% of the movement of goods in the USA (by value) and represent approximately 300 billion of the 3.21 trillion annual vehicle miles travelled by all vehicles in the USA while public transit enables mobility and access to jobs for millions of people, with over 10 billion trips annually in the USA creating and sustaining employment opportunities.
Research Report

Unsettled Technology Opportunities for Vehicle Health Management and the Role for Health-Ready Components

2020-03-17
EPR2020003
Game-changing opportunities abound for the application of vehicle health management (VHM) across multiple transportation-related sectors, but key unresolved issues continue to impede progress. VHM technology is based upon the broader field of advanced analytics. Much of traditional analytics efforts to date have been largely descriptive in nature and offer somewhat limited value for large-scale enterprises. Analytics technology becomes increasingly valuable when it offers predictive results or, even better, prescriptive results, which can be used to identify specific courses of action. It is this focus on action which takes analytics to a higher level of impact, and which imbues it with the potential to materially impact the success of the enterprise. Artificial intelligence (AI), specifically machine learning technology, shows future promise in the VHM space, but it is not currently adequate by itself for high-accuracy analytics.
Research Report

Unsettled Topics Concerning Adopting Blockchain Technology in Aerospace

2020-10-30
EPR2020021
Aerospace is an industry where competition is high and the need to ensure safety and security while managing costs is foremost. Stakeholders, who gain the most by working together, do not necessarily trust each other. Changing backbone technologies that drive enterprise systems and secure historical records does not happen quickly (if at all). At best, businesses adapt incrementally, building customized applications on top of legacy systems. The complexity of these legacy systems leads to duplication of efforts and data storage, making them very inefficient. Technology that augments, rather than replaces, is needed to transform these complex systems into efficient, digital processes. Blockchain technology offers collaborative opportunities for solving some of the data problems that have long challenged the aerospace industry.
Research Report

Unsettled Impacts of Integrating Automated Electric Vehicles into a Mobility-as-a-Service Ecosystem and Effects on Traditional Transportation and Ownership

2019-12-20
EPR2019004
The current business model of the automotive industry is based on individual car ownership, yet new ridesharing companies such as Uber and Lyft are well capitalized to invest in large, commercially operated, on-demand mobility service vehicle fleets. Car manufacturers like Tesla want to incorporate personal car owners into part-time fleet operation by utilizing the company’s fleet service. These robotaxi fleets can be operated profitably when the technology works in a reliable manner and regulators allow driverless operation. Although Mobility-as-a-Service (MaaS) models of private and commercial vehicle fleets can complement public transportation models, they may contribute to lower public transportation ridership and thus higher subsidies per ride. This can lead to inefficiencies in the utilization of existing public transportation infrastructure.
Journal Article

Chip and Board Level Digital Forensics of Cummins Heavy Vehicle Event Data Recorders

2020-04-14
2020-01-1326
Crashes involving Cummins powered heavy vehicles can damage the electronic control module (ECM) containing heavy vehicle event data recorder (HVEDR) records. When ECMs are broken and data cannot be extracted using vehicle diagnostics tools, more invasive and low-level techniques are needed to forensically preserve and decode HVEDR data. A technique for extracting non-volatile memory contents using non-destructive board level techniques through the available in-circuit debugging port is presented. Additional chip level data extraction techniques can also provide access to the HVEDR data. Once the data is obtained and preserved in a forensically sound manner, the binary record is decoded to reveal typical HVDER data like engine speed, vehicle speed, accelerator pedal position, and other status data. The memory contents from the ECM can be written to a surrogate and decoded with traditional maintenance and diagnostic software.
Technical Paper

Analyze This! Sound Static Analysis for Integration Verification of Large-Scale Automotive Software

2019-04-02
2019-01-1246
Safety-critical embedded software has to satisfy stringent quality requirements. One such requirement, imposed by all contemporary safety standards, is that no critical run-time errors must occur. Runtime errors can be caused by undefined or unspecified behavior of the programming language; examples are buffer overflows or data races. They may cause erroneous or erratic behavior, induce system failures, and constitute security vulnerabilities. A sound static analyzer reports all such defects in the code, or proves their absence. Sound static program analysis is a verification technique recommended by ISO/FDIS 26262 for software unit verification and for the verification of software integration. In this article we propose an analysis methodology that has been implemented with the static analyzer Astrée. It supports quick turn-around times and gives highly precise whole-program results.
Technical Paper

Modelify: Semi-Automatic Conversion of Control Systems C Code to Simulink Models

2016-04-05
2016-01-0020
Over the last decade, the automotive industry has embraced model-based development for control systems. Many of these companies have chosen Simulink from MathWorks to design and simulate these models. However, a remaining issue is the fact that many control systems were initially written in C and are still being used. Some companies have attempted to manually convert these C systems to Simulink models but have found this method to be too costly, error-prone, and time consuming. EnSoft decided to tackle this problem by providing a semi-automated conversion using our Atlas for C tool. Atlas is a tool that maps software and creates a relation map for all parts of the program. It then offers the developer tools to query and visualize this graph. We have developed Modelify, a tool built on this framework that performs the necessary queries on a C project and creates equivalent Simulink models and subsystems.
X