Refine Your Search


Search Results

Viewing 1 to 13 of 13
Technical Paper

Information Security Risk Management of Vehicles

The results of this work is allowed to identify a number of cybersecurity threats of the automated security-critical automotive systems, which reduces the efficiency of operation, road safety and system safety. ...According to the evaluating criterion of board electronics, the presence of poorly-protected communication channels, the 75% of the researched modern vehicles do not meet the minimum requirements of cybersecurity due to the danger of external blocking of vital systems. The revealed vulnerabilities of the security-critical automotive systems lead to the necessity of developing methods for mechanical and electronic protection of the modern vehicle. ...The law of normal distribution of the mid-points of the expert evaluation of the cyber-security of a modern vehicle has been determined. Based on the system approach, ranking of the main cybersecurity treats is performed.

Unmanned Systems (UxS) Control Segment (UCS) Architecture: Architecture Description

This document is the Architecture Description (AD) for the SAE Unmanned Systems (UxS) Control Segment (UCS) Architecture Library Revision A or, simply, the UCS Architecture. The architecture is expressed by a library of SAE publications as referenced herein. The other publications in the UCS Architecture Library Revision A are: AS6513A, AS6518A, AS6522A, and AS6969A.
SAE MOBILUS Subscription

Wiley Cyber Security Collection Add-On

As an annual subscription, the Wiley Cyber Security Collection Add-On is available for purchase along with one or both of the following: Wiley Aerospace Collection Wiley Automotive Collection The titles from the Wiley Cyber Security Collection are included in the SAE MOBILUS® eBook Package. Titles: Network Forensics Penetration Testing Essentials Security in Fixed and Wireless Networks, 2nd Edition The Network Security Test Lab: A Step-by-Step Guide Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition Computer Security Handbook, Set, 6th Edition Threat Modeling: Designing for Security Other available Wiley collections: Wiley SAE MOBILUS eBook Package Wiley Aerospace Collection Wiley Automotive Collection Wiley Computer Systems Collection Add-On (purchasable with the Wiley Aerospace Collection and/or the Wiley Automotive Collection)

Addressing configuration controls in an era of multiple security frameworks

Sometimes mandatory, often voluntary, security frameworks are created to provide federal and commercial organizations with an effective roadmap for securing information technology (IT) systems. The goal is to reduce risk levels and prevent or mitigate cyberattacks. To accomplish this task, security frameworks typically provide a series of documented, agreed upon, and understood policies, procedures, and processes necessary to secure the confidentiality, integrity, and availability of information systems and data.

New university-led Air Force Center of Excellence focuses on securing autonomous systems operating in contested environments

The researchers at the COE for Assured Autonomy in Contested Environments – all of which histories of innovation for Department of Defense problems of interest – will focus on the availability, integrity, and effective use of information by leveraging its diverse expertise in dynamics, mathematics, control theory, information theory, communications, and computer science.


Focus on advanced safety systems and human-factor interventions The impact of REACH on the aviation sector Considered the most comprehensive chemical-regulation legislation to date, REACH presents serious ramifications for the aircraft industry. Lightweighting: What's Next? Experts weigh in on the challenges and future enablers in the battle to reduce vehicle mass. The best of COMVEC 2016 Autonomous vehicles and improved fuel efficiency via advanced powertrain solutions are pressing topics detailed in this select group of technical papers from the SAE Commercial Vehicle Engineering Congress. Optimizing waste heat recovery for long-haul trucks Autonomous solutions in agriculture Downsizing a HD diesel engine for off-highway applications Zero-emissions electric aircraft: Theory vs. reality

Software needs security, and security needs software: a scientific overview

Software needs security. That's a consequence of using software to control critical systems. It's difficult because software is inherently a complex artifact, even when the code just consists of a single sequential program in a single programming language, with well-defined inputs and outputs. Of course, actual software rarely if ever has such a simple structure. Security needs software. That's a consequence of the complexity just mentioned. No process can ensure security at scale unless it is automated by using software itself: programming languages, verification tools, software platforms.

Autonomous Technologies: Applications That Matter

Over the years, the DARPA Challenges in the United States have galvanized interest in autonomous cars, making them a real possibility in the mind of the public, but autonomous and unmanned vehicles have been increasingly employed in many roles on land, in the water, and in the air. Military applications have received a great deal of attention, with weaponized unmanned aircraft (drones) being the most prominent. However, unmanned vehicles with varying degrees of autonomy already have many civilian applications. Some of these are quite familiar (such as the Roomba autonomous vacuum cleaner), while others remain largely out of the public eye (such as autonomous farm equipment). Additional applications and more capable vehicles are rapidly coming to the markets in the years ahead. This book examines a number of economically important areas in which unmanned and autonomous vehicles, also understood here as autonomous technologies, are already used or soon will be.

Nvidia partners with AdaCore to secure self-driving firmware

As mobility software becomes increasingly complex and connected, so does the risk of human error and system safety. To combat this, New York-based software company AdaCore will work with Nvidia Corporation of Santa Clara, California to apply open-source Ada and SPARK programming languages for select software security firmware elements in highly-complex, safety-critical systems like Nvidia’s DRIVE AGX automated and autonomous vehicle solutions.

SAE International anti-counterfeit standards integral to obsolescence management

Counterfeit parts prevention is integral to an effective obsolescence management plan, and the focus of anti-counterfeit standards – including Counterfeit Avoidance Standard (AS5553) and Counterfeit Detection Standard (AS6081) – from SAE International in Warrendale, Pa. SAE International officials are bringing the anti-counterfeit discussion and sharing best practices, which include adherence to critical standards, to the Future of Obsolescence Management (FOM) event on October 10 and 11 in Washington.

AIA predicts flying air taxis, supersonic air travel, and space industry for 2050

In the “What’s Next for Aerospace and Defense: A Vision for 2050” study, AIA, New York City-based McKinsey & Company, and other industry partners reveal a comprehensive 30-year, Industry 4.0 forecast of air travel and spaceflight based on improvements in automation and digitization, next-generation materials, alternative energy sources and storage, and increased data throughput.