Refine Your Search




Search Results

Training / Education

Practical NVH Signal Processing Methods

Signal processing has become a critical tool in optimizing vehicle noise. This seminar will help you to understand the foundation common to all NVH data acquisition equipment including digitizing, windows, aliasing, averaging techniques, and common analysis functions such as the power spectrum, transfer function and coherence. Fundamental concepts such as filtering, modulation, convolution, and correlation, as well as specialized techniques used in rotating machinery such as adaptive re-sampling and order tracking, will be covered.
Training / Education

Vehicle Crash Reconstruction Principles and Technology

Crash reconstruction is a scientific process that utilizes principles of physics and empirical data to analyze the physical, electronic, video, audio, and testimonial evidence from a crash to determine how and why the crash occurred. This course will introduce this reconstruction process as it gets applied to various crash types - in-line and intersection collisions, pedestrian collisions, motorcycle crashes, rollover crashes, and heavy truck crashes. Methods of evidence documentation will be covered. Analysis methods will also be presented for electronic data from event data recorders and for video.
Training / Education

Formal Methods for Functional Safety and Security in Cyber-Physical Systems

Cybersecurity is a critical concern in the development of modern vehicle systems and is becoming increasingly important as demonstrated by recent vulnerabilities in the field. With the increasing integration of communications interfaces, such as through vehicle-to-smartphone infotainment systems, vehicle-to-vehicle (V2V) / vehicle-to-infrastructure (V2I)/etc. (V2X), controller area network (CAN) dongles, and others, the attack surfaces for modern vehicles have grown substantially.
Training / Education

Introduction to Car Hacking with CANbus

Vehicle cybersecurity vulnerabilities could impact a vehicle's safe operation. Therefore, engineers should ensure that systems are designed free of unreasonable risks to motor vehicle safety, including those that may result due to existence of potential cybersecurity vulnerabilities. The automotive industry is making vehicle cybersecurity an organizational priority.
Training / Education

Introduction to Cyber Security for Commercial Aviation

Despite the advantages of electronic flight bags (EFB), passenger entertainment and email access during flights, and the ability to access aircraft repair manuals electronically, computer interconnectivity throughout aviation has opened the aviation sector to cyber-attacks that could impact flights, data, and safety. This two-day seminar is intended to introduce aviation professionals to the need to implement cyber security throughout commercial aviation including the supply chain.
Training / Education

Cybersecurity An Introduction for the Automotive Sector

The automotive industry is the new "battleground" for cybersecurity. Following the path of desktops/laptops, tablets, and mobile phones, the automotive industry is now the "hot" area for both academic researchers and hackers. This will transform the automotive industry just as it transformed traditional information technology and the mobile markets; it is inescapable, but it can be beneficial and a well prepared company can find significant benefit in being a market leader. What does cybersecurity mean? Who is attacking and why? What must we change? What can stay the same? What is the larger organization's role in cyber?
Training / Education

Problem Solving and Root Cause Analysis

Problems arise in all facets of life. This is particularly true in the business world. Problems impact all aspects of an organization’s operations such as; product development, product quality, process efficiency, marketing efforts, human relations, leadership efforts, financial execution and ultimate profitability. If these problems are not addressed, they inhibit the operation of the business and can eventually result in total failure. The ways in which problems are addressed, and the methodologies employed, determine the probability of successful problem resolution.
Training / Education

Introduction to the Secure Microkernel, seL4

Security continues to be an ever-growing concern in more and more design spaces. There are daily articles about security breaches and there is a need for much higher security through the entire system stack. Thorough testing of systems can lead to stronger security in systems, but testing can only expose so many vulnerabilities. Formal methods is another solution that ensures specific behaviors will not occur. seL4 is the first formally proven microkernel and it is open-source. This makes it a great solution for systems that need strong security.
Training / Education

Big Data Analytics for Connected, Autonomous Vehicles and Smart Cities

There is growing interest in the concept of a smart city and how these advanced technologies will improve the quality of living and make a city more attractive to visitors, commerce and industry. This course fills an unmet need for defining and explaining the relationship between connected and autonomous vehicles (CAVs) and smart city transportation. It is apparent that CAVs will achieve the best results when integrated with current and emerging urban infrastructure for transportation. This course addresses such integration from technology, organizational, policy and business model perspectives.
Training / Education

Validating Requirements and Improving Specifications with Telematics Data

Field failures cause high warranty expenses, perhaps the highest quality cost. Failures occur when new designs are introduced, existing products are sold in new markets, and product specifications don’t reflect actual product usage. Any mistake in product specifications affects the entire product development process and cascades through the supply chain. New product requirements are developed using prior requirements, rely on customer surveys, use “expert” opinion, or are the result of compromises to meet timing or management direction. The resulting requirements may be excessive or insufficient.
Training / Education

Overview of the Role of Connected and Autonomous Vehicles in Smart Cities

There is been tremendous progress in the application of technology and artificial intelligence to connected and autonomous vehicles. At the same time, there have been considerable advances in data science and data analysis that allows large data sets to be managed for results. This course introduces big data and analytics, focusing on how these will be applied to data generated by autonomous and connected vehicles. These technologies will be explained within the context of a smart city.
Training / Education

Keys to Creating a Cybersecurity Process from the J3061 Process Framework

Connected vehicles are increasingly seen as a potential target for cybersecurity attacks. A key differentiator for the automotive industry is the use of cyber-physical systems, where a successful cybersecurity attack could affect physical entities. Often involving embedded electronics and real time control, these systems require different solutions in addition to established IT security principles and reactive responses to threats. Cybersecurity needs to be designed and built into cyber-physical systems throughout the development lifecycle to provide defense in depth.
Training / Education

Design Considerations for Secure Embedded Systems

Embedded hardware is everywhere you look today from your vehicle’s infotainment system to refrigerator to medical devices and everything else in-between. With so much exposure one would think that such devices are secure against attack; however, sadly for many devices this is not the case. For proof, just look no further than your local news reports. They are full of reports on devices being hacked. So, as engineers, how do we go about first identifying and mitigating (or capitalizing) the potential security vulnerabilities within these devices?
Training / Education

Photogrammetry and Analysis of Digital Media

Photographs and video recordings of vehicle crashes and accident sites are more prevalent than ever, with dash mounted cameras, surveillance footage, and personal cell phones now ubiquitous. The information contained in these pictures and video provide critical information to understanding how crashes occurred, and in analyzing physical evidence. This course teaches the theory and techniques for getting the most out of digital media, including correctly processing raw video and photographs, correcting for lens distortion, and using photogrammetric techniques to convert the information in digital media to usable scaled three-dimensional data.
Training / Education

Intelligent Vehicles From Functional Framework to Vehicle Architecture

Considering the increasing demand for vehicle intelligence, more and more students, engineers and researchers are involved in this field. It can be challenging, however, to gain an understanding of the growing variety of intelligent vehicle technologies and how they must function together effectively as a system. This course provides an overview of state-of-the-art intelligent vehicles, presents a systematic framework for intelligent technologies and vehicle-level architecture, and introduces testing methodologies to evaluate individual and integrated intelligent functions.
Training / Education

Introduction to Automotive Cybersecurity

Cybersecurity has become one of the most critical issues in developing autonomous and connected vehicles including vehicle to vehicle (V2V), vehicle to infrastructure (V2I), and vehicle to passenger (V2P) communications. This course has been developed for the Chinese auto industry to provide engineers and software developers involved in V2X and related industries with important knowledge about vehicle cybersecurity, including basic cybersecurity practices, interpretation of SAE J3061 standards, connected vehicle attack & defense approaches and the Security Development Lifecycle (SDL).

Automotive Cybersecurity Integrity Level (ACsIL)

Review existing classification schemes from other industries and existing ideas that were presented at SAE or that may be being proposed or used in other organizations. Determine to use either an existing scheme or create a new classification scheme specific for the automotive industry from the existing or proposed methods or ideas (an integration or merging of the ideas). A Threat Analysis and Risk Assessment Method that would work with the classification scheme or from which we could map into a specific level in the cybersecurity integrity classification scheme a. This will require reviewing existing TARA methods and deciding on one or a tailored version of one Determine how to relate the ACSIL for safety-related threats to the ASIL from ISO 26262

Model Based Functional Safety

Provides standard guidance on major tasks and activities and how to implement and manage Functional Safety and software system safety aspects of Model Based System Engineering (MBSE). Process focus is on safety-critical functions (SCF) of complex software intensive systems being modeled and depicted graphically as part of MBSE and software engineering to ensure safety engineering aspects are tracked and captured as part of models to enhance safety documentation and produce objective safety evidence.

Security Testing Methods

This document serves as the initial framework for defining the subject. The document serves as a detailed breakdown of security testing methods related to software and hardware testing. it is to remain vendor agnostic and focus on the type of testing available at the time of release. This is not a comprehensive list and is intended to be updated on a yet to be defined timeline.