Refine Your Search


Search Results

Viewing 1 to 9 of 9
Training / Education

Introduction to the Secure Microkernel, seL4

Security continues to be an ever-growing concern in more and more design spaces. There are daily articles about security breaches and there is a need for much higher security through the entire system stack. Thorough testing of systems can lead to stronger security in systems, but testing can only expose so many vulnerabilities. Formal methods is another solution that ensures specific behaviors will not occur. seL4 is the first formally proven microkernel and it is open-source. This makes it a great solution for systems that need strong security.
Journal Article

A Centrally Managed Identity-Anonymized CAN Communication System*

Abstract Identity-Anonymized CAN (IA-CAN) protocol is a secure CAN protocol, which provides the sender authentication by inserting a secret sequence of anonymous IDs (A-IDs) shared among the communication nodes. To prevent malicious attacks from the IA-CAN protocol, a secure and robust system error recovery mechanism is required. This article presents a central management method of IA-CAN, named the IA-CAN with a global A-ID, where a gateway plays a central role in the session initiation and system error recovery. Each ECU self-diagnoses the system errors, and (if an error happens) it automatically resynchronizes its A-ID generation by acquiring the recovery information from the gateway. We prototype both a hardware version of an IA-CAN controller and a system for the IA-CAN with a global A-ID using the controller to verify our concept.
SAE MOBILUS Subscription

Wiley Cyber Security Collection Add-On

As an annual subscription, the Wiley Cyber Security Collection Add-On is available for purchase along with one or both of the following: Wiley Aerospace Collection Wiley Automotive Collection The titles from the Wiley Cyber Security Collection are included in the SAE MOBILUS® eBook Package. Titles: Network Forensics Penetration Testing Essentials Security in Fixed and Wireless Networks, 2nd Edition The Network Security Test Lab: A Step-by-Step Guide Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition Computer Security Handbook, Set, 6th Edition Threat Modeling: Designing for Security Other available Wiley collections: Wiley SAE MOBILUS eBook Package Wiley Aerospace Collection Wiley Automotive Collection Wiley Computer Systems Collection Add-On (purchasable with the Wiley Aerospace Collection and/or the Wiley Automotive Collection)

SAE Off-Highway Engineering: October 7, 2015

HMIs extend beyond the cab Telematics functions are being integrated into multi-function user interfaces. Standards step forward in design of off-highway electronics Functional safety standards are starting to impact many development projects, while the auto industry's AUTOSAR standard is being deployed to help enable software reuse and simplify designs. Leveraging automotive lightweighting techniques to improve off-highway emissions Where systems engineers can gain efficiencies in off-highway equipment is agnostic, they'll take it anywhere, and so they should, but one of the ways, often underestimated, is through the use of strong and lightweight advanced materials. Waste heat recovery for the long haul A WHR system based on an organic Rankine cycle has been developed for a long-haul Iveco Stralis truck.

SAE Off-Highway Engineering: April 8, 2015

Hydraulics still in control of off-highway needs Engineers continue to master electronic controllers and software to help systems manage engine speeds and boost efficiency, to the ultimate benefit of both OEMs and end-users. Off-highway calibration challenges-big and complex As the final set of Tier 4 regulations kick in for engines greater than 750 hp (560 kW), calibration efforts must contend with complex engine and aftertreatment systems. Engine manufacturers and service providers deal with this complexity, but does it need to be so? DEF delivery modelling for SCR systems Researchers characterize a 0-D model of a urea delivery module, oriented to model-based control and to the simulation of the system response to fault injections finalized to diagnosis validation.

Software needs security, and security needs software: a scientific overview

Software needs security. That's a consequence of using software to control critical systems. It's difficult because software is inherently a complex artifact, even when the code just consists of a single sequential program in a single programming language, with well-defined inputs and outputs. Of course, actual software rarely if ever has such a simple structure. Security needs software. That's a consequence of the complexity just mentioned. No process can ensure security at scale unless it is automated by using software itself: programming languages, verification tools, software platforms.

SAE Off-Highway Engineering 2009-10-01

Heavy-duty issues Top industry insiders provide their perspectives on critical issues such as sustainability, workforce development, and future growth at this year's Commercial Vehicle Engineering Congress and Exhibition. Autonomouse vehicles go off-highway Advances in sensors, CPUs, and software help in the druve to eliminate drivers. Power and precision Hydraulic motors and actuators evolve along two paths, both relying on advanced controls.