0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

sdv, autosar and software factory papers on arxiv and their references

Last updated at Posted at 2025-07-15

sdv, autosar and software factory papers on arxiv and their references
o:original
r: replacement
n:new version
b:bibliography

on s pn rn title author url
407 12 2 eCall in all new cars from April 2018. https://ec.europa.eu/digital-single-market/en/news/ecall-all-new-cars-april-2018
406 r 12 1 Birthday Attack. https://en.wikipedia.org/wiki/Birthday_attack Introduction to Modern Cryptography Mihir Bellare1 Phillip Rogaway2 May 11, 2005 https://web.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf
408 n 12 3 ISO 15765-2:2016. [n. d.]. Road vehicles – Diagnostic communication over Controller Area Network (DoCAN) – Part 2: Transport protocol and network layer services. https://www.iso.org/standard/66574.html ISO 15765-2:2024 https://www.iso.org/standard/84211.html Road vehicles — Diagnostic communication over Controller Area Network (DoCAN) Part 2: Transport protocol and network layer services
431 12 26 Pedro Umbelino. [n. d.]. OBD-II DONGLE ATTACK: STOPPING A MOVING CAR VIA BLUETOOTH. https://hackaday.com/2017/04/14/obd-ii-dongle-attack-stopping-a-moving-car-via-bluetooth/
286 o 8 8 Angelo Brillout, Nannan He, Michele Mazzucchi, Daniel Kroening, Mitra Purandare, Philipp R¨ummer, and Georg Weissenbacher. Mutation-based test case generation for Simulink models. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 6286 LNCS, pages 208–227, 2010. https://qiita.com/kaizen_nagoya/items/5fbfcbf2514f96085fa1
283 8 5 AUTOSAR. Autosar development partnership. http://www.autosar.org, 2018.
280 b 8 2 Bernhard K. Aichernig and Florian Lorber. Towards generation of adaptive test cases from partial models of determinized timed automata. In 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pages 1–6. IEEE, apr 2015. https://qiita.com/kaizen_nagoya/items/63c81caa7271552450f5
279 o 8 1 Bernhard K. Aichernig, Harald Brandl, Elisabeth J¨ obstl, Willibald Krenn, Rupert Schlick, and Stefan Tiran. Killing strategies for model-based mutation testing. Software Testing, Verification and Reliability, 25(8):716–748, dec 2015. https://qiita.com/kaizen_nagoya/items/9729745494a7306c62f1
354 b 10 6 C. Q. Wu, X. Lin, D. Yu, W. Xu and L. Li,"End-to-End Delay Minimization for Scientific Workflows in Clouds under Budget Constraint," in IEEE Transactions on Cloud Computing, vol. 3, no. 2, pp. 169-181, 1 April-June 2015, doi:10.1109/TCC.2014.2358220. https://qiita.com/kaizen_nagoya/items/879af7b81529f1dfc740
358 b 10 10 Cheng, S.; Xu, W.; Mueller, K. RadViz Deluxe: An Attribute-Aware Display for Multivariate Data. Processes 2017, 5, 75. https://doi.org/10.3390/pr5040075 https://qiita.com/kaizen_nagoya/items/d15321c9b24f0fec66fc
293 b 8 15 Cl´ audio Gomes, Romain Franceschini, Nick Battle, Casper Thule, Kenneth Lausdahl, Hans Vangheluwe, and Peter Gorm Larsen. Application of model-based testing to dynamic evaluation of functional mockup units. 2020. https://qiita.com/kaizen_nagoya/items/778e9014c54f6f9ec456
285 b 8 7 Daniel Bouskela, Alberto Falcone, Alfredo Garro, Audrey Jardin, Martin Otter, Nguyen Thuy, and Andrea Tundis. Formal requirements modeling for cyber-physical systems engineering: an integrated solution based on form-l and modelica. Requirements Engineering, pages 1–30, 2021. https://qiita.com/kaizen_nagoya/items/70734f32b6bd19efad78
284 b 8 6 Fevzi Belli, Christof J. Budnik, Axel Hollmann, Tugkan Tuglular, and W. Eric Wong. Model-based mutation testing—Approach and case studies. Science of Computer Programming, 120:25–48, may 2016. https://qiita.com/kaizen_nagoya/items/dc3c287411e2902ee996
357 b 10 9 G. K. L. Tam, H. Fang, A. J. Aubrey, P. W. Grant, P. L. Rosin, D. Marshall, and M. Chen. Visualization of time-series data in parameter space for understanding facial dynamics. Computer Graphics Forum, 30(3):901–910, 2011. https://qiita.com/kaizen_nagoya/items/da8b88ac3c63e0947d2d
350 b 10 2 J. Liu, Z. Wang and L. Zhang, "Integrated Vehicle-Following Control for Four-Wheel-Independent-Drive Electric Vehicles Against Non-Ideal V2X Communication," in IEEE Transactions on Vehicular Technology, vol.71, no. 4, pp. 3648-3659, April 2022, doi:10.1109/TVT.2022.3141732. https://qiita.com/kaizen_nagoya/items/441b58f1840b0a4675b9
352 b 10 4 J. Yang, "Key Technologies and Optimization for Dynamic Migration of Virtual Machines in Cloud Computing," 2012 Second International Conference on Intelligent System Design and Engineering Application, 2012, pp. 643-647, doi:10.1109/ISdea.2012.742. https://qiita.com/kaizen_nagoya/items/9924242f661b487b168b
287 b 8 9 Jian Chen, Manar H Alalfi, Thomas R Dean, and S Ramesh. Modeling autosar implementations in simulink. In European Conference on Modelling Foundations and Applications, pages 279–292. Springer, 2018. https://qiita.com/kaizen_nagoya/items/be28d57ac100d31fa009
363 b 10 15 Li, M. Q., Xiong, A. M., Cheng, S. H., Huang, W. C., Li, Y. C., & Lin, H. (2004). Effects of process parameters on the microstructure during the hot compression of a TC6 titanium alloy. Rare Metals, 23(3), 263-268. https://qiita.com/kaizen_nagoya/items/afc62a4b62e821eb2fb4
351 10 3 Li, R., Cheng, S., Luo, C. et al. Epidemiological Characteristics and Spatial-Temporal Clusters of Mumps in Shandong Province, China, 2005–2014. Sci Rep 7, 46328 (2017). https://qiita.com/kaizen_nagoya/items/93b319b2bc2a663779c3
282 8 4 Rajeev Alur and David L. Dill. A theory of timed automata. Theoretical Computer Science, 126(2):183–235, apr 1994. https://qiita.com/kaizen_nagoya/items/53e57015c12cf76f8d20
349 10 1 S. Cheng and K. Mueller, "The Data Context Map: Fusing Data and Attributes into a Unified Display," in IEEE Transactions on Visualization and Computer Graphics, vol. 22, no. 1, pp. 121-130, 31 Jan. 2016, doi:10.1109/TVCG.2015.2467552. https://qiita.com/kaizen_nagoya/items/59eb304fdd45763ac3da
367 10 19 S. Cheng et al., "Model-driven visual analytics for big data," 2016 New York Scientific Data Summit (NYSDS), 2016, pp.1-2, doi: 10.1109/NYSDS.2016.7747827. https://qiita.com/kaizen_nagoya/items/acb5ccd5f52843dc144d
362 10 14 S. Cheng, K. Mueller and W. Xu, "A framework to visualize temporal behavioral relationships in streaming multivariate data," 2016 New York Scientific Data Summit (NYSDS), 2016, pp. 1-10, doi:10.1109/NYSDS.2016.7747808.
361 10 13 S. Cheng, P. De, S. H. . -C. Jiang and K. Mueller, "TorusVis^ND: Unraveling High-Dimensional Torus Networks for Network Traffic Visualizations," 2014 First Workshop on Visual Performance Analysis, 2014, pp. 9-16, doi: 10.1109/VPA.2014.7.
353 10 5 S. Cheng, W. Xu and K. Mueller, "ColorMapND: A Data-Driven Approach and Tool for Mapping Multivariate Data to Color," in IEEE Transactions on Visualization and Computer Graphics, vol.25, no. 2, pp. 1361-1377, 1 Feb. 2019, doi:10.1109/TVCG.2018.2808489.
360 10 12 S. Cheng, W. Zhong, K. E. Isaacs and K. Mueller, "Visualizing the Topology and Data Traffic of Multi-Dimensional Torus Interconnect Networks," in IEEE Access, vol. 6, pp. 57191-57204, 2018, doi:10.1109/ACCESS.2018.2872344.
365 10 17 S. Cheng, Z. Jiang, Q. Qi, S. Li and X. Meng, "The Polar Parallel Coordinates Method for Time-Series Data Visualization," 2012 Fourth International Conference on Computational and Information Sciences, 2012, pp. 179-182, doi: 10.1109/ICCIS.2012.334.
368 10 20 S. Garc´ıa and F. Herrera. An extension on “statistical comparisons of classifiers over multiple data sets” for all pairwise comparisons. Journal of Machine Learning Research, 9:2677–2694, 2008. https://qiita.com/kaizen_nagoya/items/4e9ad26d597309890d44
355 10 7 Shenghui Cheng and K. Mueller, "Improving the fidelity of contextual data layouts using a Generalized Barycentric Coordinates framework," 2015 IEEE Pacific Visualization July/August 2019 3 Department Head Symposium (PacificVis), 2015, pp. 295-302, doi: 10.1109/PACIFICVIS.2015.7156390. https://qiita.com/kaizen_nagoya/items/c8969d82e9cbaa3a3c38
356 10 8 Yan X, Zhang N, Cheng S, Wang Z, Qin Y. Gender Differences in Vitamin D Status in China. Med Sci Monit. 2019;25:7094-7099. Published 2019 Sep 21. doi:10.12659/MSM.916326 https://qiita.com/kaizen_nagoya/items/cb0a21632f23e98e78ff
366 10 18 Z. Jiang, S. Cheng, X. Meng and Z. Zhang, "Research on time-series data visualization method based on parameterized parallel coordinates and color mapping function," 2012 International Conference on Systems and Informatics (ICSAI2012), 2012, pp. 510-514, doi: 10.1109/ICSAI.2012.6223048.
364 10 16 Z. Zhang, Z. Jiang, X. Meng, S. Cheng and W. Sun, "Research on prediction method of api based on the enhanced moving average method," 2012 International Conference on Systems and Informatics (ICSAI2012), 2012, pp. 2388-2392, doi:10.1109/ICSAI.2012.6223534.
359 10 11 Zhong, Wen, et al. "Evolutionary visual analysis of deep neural networks." ICML Workshop on Visualization for Deep Learning. 2017.
2 1 1 AMD LogiCORE™ CAN IP core ,” https://www.xilinx.com/products/intellectual-property/do-di-can.html, last accessed:26.6.2024.
3 1 2 CAN Injection: Keyless Car Theft,” https://kentindell.github.io/2023/04/03/can-injection/, last accessed: 29.8.2024.
217 6 19 Dependable Real-time Infrastructure for Safery-critical Computer,” https://derisc-project.eu/ . Figure 5: (a) Original CLINT + PLIC interrupt interface. (b) Improved CLIC + PLIC interrupt interface. Figure 6: Worst-case overhead of CVA6 with CLINT and CLIC interrupt controllers against the Cortex-R5. https://github.com/riscv/riscv-plic-spec/blob/master/riscv-plic.adoc , 2022.
239 6 41 micro-ROS,” https://micro.ros.org/.
4 1 3 NXP FlexCAN Controller,” https://www.nxp.com/products/nxp-product-information/ip-block-licensing/flexcan-controller: FLEXCAN-CONTROLLER, last accessed: 26.6.2024.
257 7 13 3rd D. Eastlake, “Domain Name System Security Extensions,” IETF, RFC 2535, Mar. 1999.
467 15 8 A. Biondi and M. Di Natale, “Achieving predictable multicore execution of automotive applications using the LET paradigm,” in 2018 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), Apr. 2018, pp. 240–250.
109 3 34 A. Casparsen, D. G. Sϕrensen, J. N. Andersen, J. I. Christensen, P. Antoniou, R. Krϕyer, T. Madsen, and K. Gjoerup, “Closing the security gaps in some/ip through implementation of a host-based intrusion detection system,” in 2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC). IEEE, 2022, pp. 436–441.
18 1 17 A. de Faveri Tron, S. Longari, M. Carminati, M. Polino, and S. Zanero, “CANflict: Exploiting Peripheral Conflicts for DataLink Layer Attacks on Automotive Networks,” in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022, DOI: 10.1145/3548606.3560618.
187 5 18 A. Ferrari, M. Di Natale, G. Gentile, G. Reggiani, and P. Gai. Time and memory tradeoffs in the implementation of AUTOSAR components. In 2009 Design, Automation & Test in Europe Conference & Exhibition, pages 864–869. IEEE, apr 2009.
149 4 22 A. Fox and M. Myreen: A Trustworthy Monadic Formalization of the ARMv7 Instruction Set Architecture. International Conference on Interactive Theorem Proving, pp.243–258, 2010.
222 6 24 A. Gruin, T. Carle, H. Cass´e, and C. Rochange, “Speculative execution and timing predictability in an open source risc-v core,” in 2021 IEEE Real-Time Systems Symposium (RTSS), 2021, pp. 393–404.
274 7 30 A. Gulbrandsen et al., “A DNS RR for specifying the location of services (DNS SRV),” IETF, RFC 2782, Feb. 2000.
164 4 37 A. Hall: Seven myths of formal methods,IEEE Software, vol. 7, no. 5, pp. 11-19, Sept. 1990.
255 7 11 A. Kampmann et al., “A Dynamic Service-Oriented Software Architecture for Highly Automated Vehicles,” in 2019 IEEE Intelligent Transportation Systems Conference (ITSC). 2019, pp. 2101–2108.
121 3 46 A. Kleyner and R. Knoell, “Calculating probability metric for random hardware failures (pmhf) in the new version of iso 26262 functional safety-methodology and case studies,” SAE Technical Paper, Tech. Rep., 2018.
230 6 32 A. Kurth, B. Forsberg, and L. Benini, “Herov2: Full-stack open-source research platform for heterogeneous computing,” 2022.Online
250 7 6 A. Mart´ınez-Cruz et al., “Security on in-vehicle communication protocols: Issues, challenges, and future research directions,” Computer Communications, vol. 180, pp. 1–20, 2021.
115 3 40 A. R. Javed, S. Ur Rehman, M. U. Khan, M. Alazab, and T. Reddy, “Canintelliids: Detecting in-vehicle intrusion attacks on a controller area network using cnn and attention-based gru,” IEEE transactions on network science and engineering, vol. 8, no. 2, pp. 1456–1466, 2021.
84 3 9 A. S. of Quality (ASQ). Failure Modes and Effects Analysis (FMEA).
113 3 38 A. Taylor, N. Japkowicz, and S. Leblanc, “Frequency-based anomaly detection for the automotive can bus,” in 2015 World Congress on Industrial Control Systems Security (WCICSS). IEEE, 2015, pp. 45–49.
205 6 7 A. Waterman, Y. Lee, R. Avizienis, D. A. Patterson, and K. Asanovi´c, “The risc-v instruction set manual volume ii: Privileged architecture version 1.9,” EECS Department, University of California, Berkeley,Tech. Rep. UCB/EECS-2016-129, Jul 2016. Online
26 2 2 Abdelrahman Ahmed Omar Abdelgawad, Youssief Ahmed Mohamed Anas Morsy, Mohamed Emad Mohamed Mohi, Ahmed Tawfeeq Elsayed, and Mohamed Ahmed Ezzat Tahoon. Shared autonomy steering haptic assistance: A deep reinforcement learning approach, 2024. Supervised by Dr. Haitham El-Hussieny and Dr. Victor Parque.
459 15 0 Achieving Determinism in Adaptive AUTOSAR Christian Menard, Andres Goens, Marten Lohstroh, Jeronimo Castrillon https://arxiv.org/pdf/1912.01367
419 388 12 14 Ahmed Hazem and HA Fahmy. 2012. Lcap-a lightweight can authentication protocol for securing in-vehicle networks. In 10th escar Embedded Security in Cars Conference, Berlin, Germany, Vol. 6.
388 11 19 Ahmed Hazem and HA Fahmy. Lcap-a lightweight can authentication protocol for securing in-vehicle networks. In 10th escar Embedded Security in Cars Conference, Berlin, Germany, volume 6, 2012.
195 5 26 Alessandro Biondi, Paolo Pazzaglia, Alessio Balsini, and Marco Di Natale. Logical execution time implementation and memory optimization issues in autosar applications for multicores. In International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS), 2017.
411 12 6 Alessandro Bruni, Michal Sojka, Flemming Nielson, and Hanne Riis Nielson. 2014. Formal Security Analysis of the MaCAN Protocol. In Integrated Formal Methods, Elvira Albert and Emil Sekerinski (Eds.). Springer International Publishing, Cham, 241–255.
289 8 11 Alessandro Cornaglia, Shakib Hasan, Alexander Viehl, Oliver Bringmann, and Wolfgang Rosenstiel. Modeltime: Fully automated timing exploration of simulink models for embedded processors. In AmE 2019 - Automotive meets Electronics; 10th GMM- Symposium, pages 1–6, 2019.
343 9 21 Alex Oyler, “Software-defined vehicles foreshadow the union of Silicon Valley & the automotive industry,” https://www.sbdautomotive.com/en/software-defined-vehicles
27 2 3 AlveyTech. Alveytech 24v 250w electric motor, 2025. Accessed: 2025-02-05.
28 2 4 AmpFlow. Ampflow s-400-24 power supply, 2025. Accessed: 2025-02-05.
424 12 19 Andreas Mueller, Timo Lothspeich, and Robert Bosch. 2015. Plug-and-Secure Communication for CAN. In CAN Newsletter.
186 5 17 Andreas Naderlinger, Josef Templ, and Wolfgang Pree. Simulating real-time software components based on logical execution time. In Proceedings of the 2009 Summer Computer Simulation Conference, SCSC ’09, pages 148–155, Vista, CA, 2009. Society for Modeling & Simulation International.
192 5 23 Andreas Naderlinger. Simulating preemptive scheduling with timing-aware blocks in Simulink. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, pages 758–763. IEEE, mar 2017.
305 192 8 27 Andreas Naderlinger. Simulating preemptive scheduling with timing-aware blocks in Simulink. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, pages 758–763. IEEE, mar 2017.
427 12 22 Andreea-Ina Radu and Flavio D. Garcia. 2016. LeiA: A Lightweight Authentication Protocol for CAN. In Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II. 283–300. https://doi.org/10.1007/978-3-319-45741-3_15
396 11 27 Andreea-Ina Radu and Flavio D. Garcia. Leia: A lightweight authentication protocol for can. In Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, and Catherine Meadows, editors, Computer Security ESORICS 2016, pages 283–300, Cham, 2016. Springer International Publishing.
33 2 9 Andrew Baker and Sarah Johnson. Real-time communication in automotive networks using can protocols. IEEE Transactions on Vehicular Technology, 68(6):3547–3560, 2019.
48 2 24 Andrew Green and Michelle White. Error detection and correction in controller area network (can). Automotive Safety Journal, 18(2):75–89, 2020.
34 2 10 Andrew J. Baker and Michelle L. Stone. Integrating can and spi protocols for efficient communication in automotive systems. IEEE Transactions on Vehicular Technology, 69(5):4567–4580, 2020.
432 399 12 27 Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. 2011. CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In ECRYPT Workshop on Lightweight Cryptography. Vol. 2011.
399 11 30 Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. Canauth-a simple, backward compatible broadcast authentication protocol for can bus. In ECRYPT Workshop on Lightweight Cryptography. Vol. 2011., 2011.
243 6 45 ARM, “Cortex®-M3 Technical reference manual,” https://developer.arm.com/documentation/ddi0337/latest/ , Tech. Rep., 2008.
371 11 2 ARM. Arm TrustZone Technology, 2020.
403 11 34 Artem Yushev, Mohammed Barghash, Minh Phuong Nguyen, Andreas Walz, and Axel Sikora. Tls-over-can: An experimental study of internet-grade end-to-end communication security for can networks. IFAC- PapersOnLine, 51(6):96 – 101, 2018. 15th IFAC Conference on Programmable Devices and Embedded Systems PDeS 2018.
435 13 1 Atlidakis, V., Andrus, J., Geambasu, R., Mitropoulos, D., Nieh, J., 2016. POSIX abstractions in modern operating systems: the old, the new, and the missing, in: Proceedings of the Eleventh European Conference on Computer Systems. Presented at the EuroSys ’16: Eleventh EuroSys Conference 2016, ACM, London United Kingdom, pp. 1–17. https://doi.org/10.1145/2901318.2901350
244 7 0 Authenticated and Secure Automotive Service Discovery with DNSSEC and DANE Mehmet Mueller, Timo Häckel, Philipp Meyer, Franz Korf, Thomas C. Schmidt https://arxiv.org/pdf/2303.15128
252 77 7 8 AUTomotive Open System ARchitecture Consortium, “SOME/IP Protocol Specification,” AUTOSAR, Tech. Rep. 696, Nov. 2022.
256 101 7 12 AUTomotive Open System ARchitecture Consortium, “SOME/IP Service Discovery Protocol Specification,” AUTOSAR, Tech. Rep. 802, Nov. 2021.
487 16 5 AUTOSAR Consortium (2013): AUTomotive Open System ARchitecture, standard documents. https://autosar.org/.
488 16 6 AUTOSAR Consortium (2014): Acceptance Test Specification of Communication on CAN bus – Release 1.0.0.
44 2 20 AUTOSAR Consortium. Autosar architecture: The cornerstone of scalable automotive software development. AUTOSAR Technical Report, 3:1–15, 2018.
30 2 6 AUTOSAR Development Partnership. AUTOSAR Architecture Overview, 2021.
32 2 8 AUTOSAR Development Partnership. AUTOSAR Specification of Memory Services, 2022.
31 2 7 AUTOSAR Development Partnership. AUTOSAR Specification of Software Update Management, 2021.
211 6 13 AUTOSAR, “Adaptive Platform,” https://www.autosar.org/standards/adaptive-platform/, AUTOSAR, Standard.
119 3 44 AUTOSAR, “AUTOSAR software specification: Diagnostic event manager,” https://www.autosar.org/fileadmin/standards/R20-11/CP/AUTOSAR SWS DiagnosticEventManager.pdf, 2020.
210 6 12 AUTOSAR, “Classic platform,” https://www.autosar.org/standards/classic-platform/, AUTOSAR, Standard.
470 224 15 11 AUTOSAR, “SOME/IP protocol specification,” AUTOSAR FO Release 1.5.0, Oct. 2018.
224 6 26 AUTOSAR, “SOME/IP Protocol Specification,” https://www.autosar.org/fileadmin/user upload/standards/foundation/21-11/AUTOSAR PRS SOMEIPProtocol.pdf.
100 224 3 25 AUTOSAR, “SOME/IP Protocol Specification,” in In AUTOSAR Foundation Release R19-11. Munich, Germany: AUTOSAR, 2019, p. 696.
468 15 9 AUTOSAR, “Specification of communication management,” AUTOSAR AP Release 19-03, Mar. 2019.
473 15 14 AUTOSAR, “Specification of execution management,” AUTOSAR AP Release 19-03, Mar. 2019.
6 1 5 Autosar, “Specification of Secure Onboard Communication Protocol, AUTOSAR FO R20-11,” Standard, 2020, https://www.autosar.org/fileadmin/standards/R20-11/FO/AUTOSAR PRS SecOcProtocol.pdf.
480 15 21 AUTOSAR, “Specification of time synchronization for adaptive platform,” AUTOSAR AP Release 19-03, Mar. 2019.
466 15 7 AUTOSAR, “Specification of timing extensions,” AUTOSAR CP Release 4.4.0, Oct. 2018.
77 3 2 AUTOSAR. (2022) SOME/IP Protocol Specification. Accessed on 20 April 2023.
101 3 26 AUTOSAR. (2022) SOME/IP Service Discovery Protocol Specification. Accessed on 20 April 2023.
409 12 4 AUTOSAR. [n. d.]. “Specification of Module Secure Onboard Communication - AUTOSAR Release 4.2.2.”. https://www.autosar.org/fileadmin/user_upload/standards/classic/4-2/AUTOSAR_SWS_SecureOnboardCommunication.pdf
410 12 5 AUTOSAR. [n. d.]. “Specification of Secure Onboard Communication - AUTOSAR CP Release 4.3.1”. https://www.autosar.org/standards/classic-platform/classic-platform-431/
170 5 1 AUTOSAR. Autosar development partnership. http://www.autosar.org, 2021.
372 11 3 AUTOSAR. Requirements on Secure Onboard Communication, 2019.
373 11 4 AUTOSAR. Specification of Key Manager, 2019.
374 11 5 AUTOSAR. Specification of Secure Onboard Communication AUTOSAR CP R19-11, 2019.
339 9 17 AUTOSAR. Standards. Accessed: Sep. 18, 2021.Online
471 15 12 AYTISAR, “SOME/IP service discovery protocol specification,” AUTOSAR FO Release 1.5.0, Oct. 2018.
417 12 12 B. Groza and P. Murvay. 2018. Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks. IEEE Vehicular Technology Magazine 13, 1 (March 2018), 40–47. https://doi.org/10.1109/MVT.2017.2736344
276 7 32 B. M. Schwartz et al., “Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs),” IETF, Internet-Draft draft-ietf-dnsop-svcb-https-11, Oct. 2022, work in Progress.
272 7 28 B. Ma et al., “An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP,” Sensors, vol. 22, pp. 1–23, Jan. 2022.
108 3 33 B. Ma, S. Yang, Z. Zuo, B. Zou, Y. Cao, X. Yan, S. Zhou, and J. Li, “An authentication and secure communication scheme for in-vehicle networks based on some/ip,” Sensors, vol. 22, no. 2, p. 647, 2022.
328 9 6 Bagloee, S.A., Tavana, M., Asadi, M. et al. Autonomous vehicles: challenges, opportunities, and future implications for transportation policies. J. Mod. Transport. 24, 284–303, 2016. https://doi.org/10.1007/s40534-016-0117-3
375 11 6 BBC. Hack attacks mounted on car control systems. https://www.bbc.com/news/10119492, 2010.
281 8 3 Bernhard K. Aichernig, Florian Lorber, and Dejan Niˇ ckovi´ c. Time for mutants - Model-based mutation testing with timed automata. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 7942 LNCS, pages 20–38. Springer, Berlin, Heidelberg, 2013.
273 7 29 BMW AG, “vsomeip v3.1.20.3,” GitHub repository.Online
418 12 13 Bogdan Groza, Stefan Murvay, Anthony Van Herrewege, and Ingrid Verbauwhede. 2012. Libra-can: a lightweight broadcast authentication protocol for controller area networks. In International Conference on Cryptology and Network Security. Springer, 185–200.
387 11 18 Bogdan Groza, Stefan Murvay, Anthony Van Herrewege, and Ingrid Verbauwhede. Libra-can: a lightweight broadcast authentication protocol for controller area networks. In International Conference on Cryptology and Network Security, pages 185–200, Cham, 2012. Springer.
436 13 2 Bunzel, S., 2011. AUTOSAR – the Standardized Software Architecture. Inform.-Spektrum 34, 79–83. https://doi.org/10.1007/s00287-010-0506-7
141 4 14 C. A. R. Hoare: Communicating sequential processes, Communications of ACM, Vol. 21, No.8, pp.666–677, 1978.
451 14 2 C. Esposito, A. Natale, P. Berardino, G. Palmese, R. Lanari and S. Perna, "AXIS: an airborne X-band interferometric FMCW SAR system,” in Proc. IEEE Int. Geosci. Remote Sensing Symp., Valencia, Spain, Jul. 2018, pp. 5697-5699.
474 15 15 C. Hewitt, “Viewing control structures as patterns of passing messages,” Artificial intelligence, vol. 8, no. 3, pp. 323–364, 1977.
193 5 24 C. L. Liu and James W. Layland. Scheduling Algorithms for Multiprogramming in a Hard- Real-Time Environment Scheduling Algorithms for Multiprogramming. Journal of the Association for Computing Machinery, 20(1):46–61, jan 1973.
465 15 6 C. M. Kirsch and A. Sokolova, “The logical execution time paradigm,” in Advances in Real-Time Systems, S. Chakraborty and J. Ebersp¨ acher, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 103–120.
247 7 3 C. Miller and C. Valasek, , “Remote Exploitation of an Unaltered Passenger Vehicle,” Black Hat USA, vol. 2015, p. 91, 2015.
246 7 2 C. Miller and C. Valasek, “A Survey of Remote Automotive Attack Surfaces,” Black Hat USA, vol. 2014, 2014.
91 3 16 C. Miller and C. Valasek, “Adventures in automotive networks and control units,” Def Con, vol. 21, no. 260-264, pp. 15–31, 2013.
80 3 5 C. Miller and C. Valasek, “Remote exploitation of an unaltered passenger vehicle,” Black Hat USA, vol. 2015, no. S 91, pp. 1–91, 2015.
308 8 30 C. Norstrom, A. Wall, and Wang Yi. Timed automata as task models for event-driven systems. In Proceedings Sixth International Conference on Real-Time Computing Systems and Applications. RTCSA’99 (Cat. No.PR00306), pages 182–189, 1999.
426 12 21 C. Reuber O.Hartkopp and R.Schilling. [n. d.]. "MaCAN-message authenticated CAN", Proc. 10th Int. Conf. Embedded Security in Cars (ESCAR) (Ed.).
87 3 12 C. Schmittner, Z. Ma, and P. Smith, “Fmvea for safety and security analysis of intelligent and cooperative vehicles,” in Computer Safety, Reliability, and Security: SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014. Proceedings 33. Springer, 2014, pp. 282–288.
233 6 35 C. Scordino and G. Lipari, “Linux and real-time: Current approaches and future opportunities,” in IEEE International Congress ANIPLA, 2006.
227 6 29 C. Scordino, A. G. Mari˜no, and F. Fons, “Hardware acceleration of data distribution service (dds) for automotive communication and computing,” IEEE Access, vol. 10, pp. 109 626–109 651, 2022.
241 6 43 C. Scordino, I. M. Savino, L. Cuomo, L. Miccio, A. Tagliavini, M. Bertogna, and M. Solieri, “Real-time virtualization for industrial automation,” in 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), vol. 1. IEEE, 2020, pp.353–360.
1 1 0 CAIBA: Multicast Source Authentication for CAN Through Reactive Bit Flipping Eric Wagner, Frederik Basels, Jan Bauer, Till Zimmermann, Klaus Wehrle, Martin Henze https://arxiv.org/pdf/2504.16695
41 2 17 Canoz Civelek. Lane detection with steering and departure. https://github.com/canozcivelek/lane-detection-with-steer-and-departure, 2021.
191 5 22 Caroline Brandberg and Marco Di Natale. A SimEvents Model for the Analysis of Scheduling and Memory Access Delays in Multicores. In 2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES), pages 1–10. IEEE, jun 2018.
311 8 33 Chanchal K. Roy and James R. Cordy. A mutation / injection-based automatic framework for evaluating code clone detection tools. In IEEE International Conference on Software Testing, Verification, and Validation Workshops, ICSTW 2009, pages 157–166, 2009.
312 8 34 Chanchal K. Roy, James R. Cordy, and Rainer Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of Computer Programming, 74(7):470–495, may 2009.
326 9 4 Chaowei Yang, Qunying Huang, Zhenlong Li, Kai Liu & et al, “Big Data and cloud computing: innovation opportunities and challenges,” International Journal of Digital Earth, vol. 10, no.1, pp 13-53, 2016, DOI: 10.1080/17538947.2016.1239771
412 12 7 Charlie Miller Chris Valasek. 2014. Adventures in Automotive Networks and Control Units. http://illmatics.com/car_hacking.pdf.
381 11 12 Charlie Miller Chris Valasek. Adventures in Automotive Networks and Control Units, 2020.
437 13 3 Choi, D.-K., Jung, J.-H., koh, S.-J., Kim, J.-I., Park, J., 2019. In-Vehicle Infotainment Management System in Internet-of-Things Networks, in: 2019 International Conference on Information Networking (ICOIN). Presented at the 2019 International Conference on Information Networking (ICOIN), IEEE, Kuala Lumpur, Malaysia, pp. 88–92. https://doi.org/10.1109/ICOIN.2019.8718192
398 11 29 Chris Valasek and Charlie Miller. Remote Exploitation of an Unaltered Passenger Vehicle. http://illmatics.com/Remote%20Car%20Hacking. pdf, 2015.
298 8 20 Christopher Henard, Mike Papadakis, Gilles Perrouin, Jacques Klein, and Yves Le Traon. Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing. In 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops, pages 188–197. IEEE, mar 2013.
422 12 17 Chung-Wei Lin and Alberto Sangiovanni-Vincentelli. 2012. Cyber-security for the Controller Area Network (CAN) communication protocol. In Cyber Security (CyberSecurity), 2012 International Conference on. IEEE, 1–7.
369 11 0 CINNAMON: A Module for AUTOSAR Secure Onboard CommunicationGiampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci https://arxiv.org/pdf/2111.12026
379 11 10 Cinzia Bernardeschi, Marco Di Natale, Gianluca Dini, and Dario Varano. Modeling and generation of secure component communications in AUTOSAR. In Proceedings of the Symposium on Applied Computing, SAC ’17, page 1473–1480, New York, NY, USA, 2017. Association for Computing Machinery.
294 8 16 Cl´ audio Gomes, Casper Thule, David Broman, Peter Gorm Larsen, and Hans Vangheluwe. Cosimulation: a survey. ACM Computing Surveys (CSUR), 51(3):1–33, 2018.
434 13 0 Comparison between autosar platforms with functional safety for automotive software architectures Youssef Elkharaz, Saad Motahhir, Abdelaziz Elghzizal https://arxiv.org/pdf/2109.00099
43 2 19 Components101. What is bootloader in microcontroller? why do you need it?, 2023. Accessed: 2025-01-25.
10 1 9 D. Boneh and V. Shoup, A Graduate Course in Applied Cryptography, 2023.
264 7 20 D. Cooper et al., “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile,” IETF, RFC 5280, May 2008.
275 7 31 D. Crocker, “Scoped Interpretation of DNS Resource Records through ’Underscored’ Naming of Attribute Leaves,” IETF, RFC 8552, Mar. 2019.
162 4 35 D. H. Vu, Y. Chiba et al.: Verifying OSEK/VDX OS Design using Its Formal Specification, TASE, pp.81-88, 2016.
450 14 1 D. Jung and S.-O. Park, "Ku-band car-borne FMCW stripmap synthetic aperture radar," in Proc. 2019 Int. Symp. Antennas Propag., Phuket, Thailand, Oct. 2017, pp. 1-2.
454 14 5 D. Jung, D. Kim, M. T. Azim, J. Park and S. Park, "A novel signal processing technique for Ku-band automobile FMCW fully polarimetric SAR system using triangular LFM," IEEE Trans. Instrum. Meas., Early Access, pp. 1-10, Jul. 2020.
453 14 4 D. Jung, H. Kang, C. Kim, J. Park and S.-O. Park, "Sparse scene recovery for high-resolution automobile FMCW SAR via scaled compressed sensing," in IEEE Trans. Geosci. Remote Sens., vol. 57, no. 12, pp.10136-10146, Dec. 2019.
165 4 38 D. Lee. and M. Yannakakis: Principles and methods of testing finite state machines- a survey, in Proceedings of the IEEE, vol. 84, no. 8, pp. 1090-1123, 1996.
107 3 32 D. Ren, S. Du, and H. Zhu, “A novel attack tree based risk assessment approach for location privacy preservation in the vanets,” in 2011 IEEE International Conference on Communications (ICC). IEEE, 2011, pp.1–5.
428 12 23 D. Stabili, L. Ferretti, and M. Marchetti. 2018. Analyses of Secure Automotive Communication Protocols and Their Impact on Vehicles Life-Cycle. In 2018 IEEE International Conference on Smart Computing (SMARTCOMP). 452–457. https://doi.org/10.1109/SMARTCOMP.2018.00045
271 7 27 D. Zelle et al., “Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods,” in The 16th International Conference on Availability, Reliability and Security, ser. ARES 21. ACM, Aug. 2021, pp. 1–20.
78 3 3 D. Zelle, T. Lauser, D. Kern, and C. Krauß, “Analyzing and securing some/ip automotive services with formal and practical methods,” in Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, pp. 1–20.
299 8 21 Dan Henriksson, Anton Cervin, and Karl-Erik ˚ Arz´ en. TrueTime : Real-time Control System Simulation with MATLAB / Simulink. Proceedings of the Nordic MATLAB Conference, 2003.
173 5 4 Dan Henriksson, Anton Cervin, and Karl-Erik Årzén. TrueTime : Real-time Control System Simulation with MATLAB / Simulink. Proceedings of the Nordic MATLAB Conference, 2003.
64 2 40 Daniel Perez and Sarah Martinez. Lane following assist: Enhancing lka through adaptive cruise control integration. Journal of Advanced Vehicle Systems, 11(4):205–218, 2021.
36 2 12 David Black and Emma Green. Implementing fota in electronic control units: Challenges and solutions. In Proceedings of the International Symposium on Vehicle Software, pages 76–84, 2019.
335 9 13 Deloitte, “Software-Defined Vehicles A Forthcoming Industrial Evolution,” Accessed: Sep. 18, 2021.https://www2.deloitte.com/cn/en/pages/consumer-business/articles/software-defined-cars-industrial-revolution-on-the-arrow.html
348 10 0 Diagnostic Communication and Visual System based on Vehicle UDS Protocol Hong Zhang, Ding Li https://arxiv.org/pdf/2206.12653
332 9 10 Dipl. -Ing. (FH) Markus Helmling, “Service-oriented Architectures and Ethernet in Vehicles,” Elektronik automotive, magazine Special issue, Automotive Ethernet, March 2017.
460 15 1 E. A. Lee, “The problem with threads,” Computer, vol. 39, no. 5, pp. 33–42, May 2006.
5 1 4 E. Aliwa, O. Rana, C. Perera, and P. Burnap, “Cyberattacks and Countermeasures for In-Vehicle Networks,” ACM Computing Surveys (CSUR), vol. 54, no. 1, pp. 1–37, 2021, DOI:10.1145/3431233.
158 4 31 E. Bounimova, P. Godefroid, and D. Molnar: Billions and billions of constraints: Whitebox fuzz testing in production, 35th International Conference on Software Engineering pp. 122–131, 2013.
19 1 18 E. C. for Electrotechnical Standardization, “Industrial communications subsystem based on ISO 11898(CAN) for controller-device interfaces – Part 4: CANopen,” Cenelec, Standard, 2002.
140 4 13 E. Cohen, M. Dahlweid et al.: VCC: A practical system for verifying concurrent C, Theorem Proving in Higher Order Logics, pages 23–42. Springer, 2009.
265 7 21 E. Osterweil et al., “From the Beginning: Key Transitions in the First 15 Years of DNSSEC,” Transactions on Network and Service Management (TNSM), vol. 19, pp. 5265–5283, Dec. 2022.
83 3 8 E. Ruijters and M. Stoelinga, “Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools,” Computer science review, vol. 15, pp. 29–62, 2015.
452 14 3 E. Schreiber, A. Heinzel, M. Peichl, M. Engel and W. Wiesbeck, “Advanced buried object detection by multichannel, UAV/Drone carried synthetic aperture radar,” in 13th Eur. Conf. Antennas Propag., Krakow, Poland, Apr. 2019, pp. 1-5.
116 3 41 E. Seo, H. M. Song, and H. K. Kim, “Gids: Gan based intrusion detection system for in-vehicle network,” in 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2018, pp. 1–6.
301 8 23 Edward A. Lee, Stephen Neuendorffer, and Gang Zhou. Synchronous Reactive Models. In Claudius Ptolemaeus, editor, System Design, Modeling, and Simulation using Ptolemy II. Ptolemy.org, 2014.
125 3 50 Egomania. (2016) Some-ip generator.
66 2 42 Elena Roberts and James Smith. Efficient memory management in autosar-compliant systems. Journal of Embedded Systems and Automotive Technology, 15(2):102–115, 2021.
63 2 39 Elon Musk and Tesla Engineering Team. Revolutionizing vehicle software updates: Tesla’s fota system. Automotive Software Innovations Journal, 15(3):101–112, 2020.
370 11 1 Embedded Systems Academy. CANcrypt. https://www.cancrypt.eu/, 2018.
226 6 28 Emilio Guijarro, RTI, “Press release — connectivity at the core: The status of dds in autosar,” https://www.rti.com/blog/status-of-dds-in-autosar, Sep. 2022.
54 2 30 Emily Johnson and Carlos Martinez. Delta updating within the autosar framework. Embedded Systems Journal, 20(4):210–225, 2021.
55 2 31 Emily Johnson and Michael Thompson. Comparing lane departure warning and lane keeping assist systems: A functional overview. Journal of Intelligent Transportation Systems, 29(3):89–101, 2021.
24 2 0 Enhancing AUTOSAR-Based Firmware Over-the-Air Updates in the Automotive Industry with a Practical Implementation on a Steering System Mostafa A. Mostafa, Mohamed K. Mohamed, Radwa W. Ezzat https://arxiv.org/pdf/2503.05839
238 6 40 eProsima, “Micro XRCE-DDS,” https://github.com/eProsima/Micro-XRCE-DDS.
416 12 11 Eric Evenchick. 2015. Hopping On the CAN Bus - Automotive Security and the CANard Toolkit. In Black Hat Asia (Last Access: 27/12/2018). https://www.blackhat.com/docs/asia-15/materials/asia-15-Evenchick-Hopping-On-The-Can-Bus.pdf
179 5 10 ETAS GmbH. RTA-TRACE User Guide, version 2.1.1. https://www.etas.de, 2006.
386 11 17 European Data Protection Board. Guidelines 1/2020 on processing personal data in the context of connected vehicles and mobility related applications. https://edpb.europa.eu/sites/edpb/files/consultation/edpb_guidelines_202001_connectedvehicles.pdf, 2020.
397 11 28 European Union. General Data Protection Regulation(EU Regulation 2016/679). https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL, 2016.
204 6 6 Evidence Srl, “Erika enterprise rtos,” https://github.com/evidence/erika3.
489 16 7 F. Cesarini & S. Thompson (2009): Erlang Programming. O’Reilly.
220 6 22 F. Cosimi, F. Tronci, S. Saponara, and P. Gai, “Analysis, hardware specification and design of a programmable performance monitoring unit (ppmu) for risc-v ecus,” in 2022 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, 2022, pp. 213–218.
248 7 4 F. Kohnh¨auser et al., “Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles,” in 2019 IEEE Security and Privacy Workshops (SPW). 2019, pp. 126–131.
102 3 27 F. Luo, Y. Jiang, Z. Zhang, Y. Ren, and S. Hou, “Threat analysis and risk assessment for connected vehicles: A survey,” Security and Communication Networks, vol. 2021, pp. 1–19, 2021.
97 3 22 F. Luo, Z. Yang, Z. Zhang, Z. Wang, B. Wang, and M. Wu, “A multi-layer intrusion detection system for some/ip-based in-vehicle network,” Sensors, vol. 23, no. 9, p. 4376, 2023.
174 5 5 Fabio Cremona, Matteo Morelli, and Marco Di Natale. TRES: A Modular Representation of Schedulers, Tasks, and Messages to Control Simulations in Simulink. Proceedings of the 30th Annual ACM Symposium on Applied Computing, pages 1940–1947, 2015.
290 8 12 Fabio Cremona, Matteo Morelli, and Marco Di Natale. TRES: A Modular Representation of Schedulers, Tasks, and Messages to Control Simulations in Simulink. Proceedings of the 30th Annual ACM Symposium on Applied Computing, pages 1940–1947, 2015.
449 14 0 FMCW SAR with New Synthesis Method Based on A-SPC Technique Junhyeong Park, Dae-Hwan Jung, Seong-Ook Park https://arxiv.org/pdf/2009.14415
438 13 4 Foundation Release Overview, n.d. 26.
22 1 21 Frenzel+Berg, “CANopen Chip CO4011,” https://www.frenzelberg.de/fileadmin/FrenzelBerg/Datenblaetter/CANopenChip/ds co4011b en.pdf.
439 13 5 Furst and Bechter - 2016 - AUTOSAR for Connected and Autonomous Vehicles The.pdf, n.d.
46 2 22 FUT Electronics. High power motor driver - 10a continuous, 15a peak, 2025. Accessed: 2025-02-05.
475 15 16 G. A. Agha, “Actors: A model of concurrent computation in distributed systems,” MIT Artificial Intelligence Lab, Tech. Rep., 1985.
7 1 6 G. Bella, P. Biondi, G. Costantino, and I. Matteucci, “TOUCAN: A proTocol tO secUre Controller Area Network,” in Proceedings of the ACM Workshop on Automotive Cybersecurity (AutoSec), 2019, DOI: 10.1145/3309171.3309175.
462 15 3 G. Berry and G. Gonthier, “The Esterel synchronous programming language: Design, semantics, implementation,” Science of computer programming, vol. 19, no. 2, pp. 87–152, 1992.
463 15 4 G. Berry, “SCADE: Synchronous design and validation of embedded control software,” in Next Generation Design and Verification Methodologies for Distributed Embedded Control Systems, S. Ramesh and P. Sampath, Eds., Dordrecht: Springer Netherlands, 2007, pp. 19–33.
12 1 11 G. Cena, I. C. Bertolotti, T. Hu, and A. Valenzano, “On a software-defined CAN controller for embedded systems,” Computer Standards & Interfaces, vol. 63, pp. 43–51, 2019, DOI:10.1016/j.csi.2018.11.007.
136 4 9 G. Holzmann: Spin Model Checker: the Primer and Reference Manual, Addison-Wesley, 2003.
147 4 20 G. Klein et al.: Comprehensive formal verification of an OS microkernel ACM Transactions on Computer Systems, Volume 32 Issue 1, pp.1–70, 2014.
146 4 19 G. Klein et.al: seL4: Formal verification of an OS kernel, ACM Symposium on Operating Systems Principles, pp.207–220, 2009.
144 4 17 G. Klein: Operating System Verification - An Overview, S¯ adhan¯ a , 34(1), pp.26–69, 2009.
112 3 37 G. Zhang, Q. Liu, C. Cao, J. Li, and Y. Li, “Bit scanner: Anomaly detection for in-vehicle can bus using binary sequence whitelisting,” Computers & Security, vol. 134, p. 103436, 2023.
345 9 23 Garcia, P., Tiago Gomes, Filipe Salgado, Joao Monteiro, and et al., “Towards Hardware Embedded Virtualization Technology: Architectural Enhancements to an ARM SoC”, ACM SIGBED Review, vol. 11, no. 2, pp 45–47, June 2014, https://doi.org/10.1145/2668138.2668145
377 11 8 Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, and Ilaria Matteucci. Are you secure in your car?: poster. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019, pages 308–309. ACM, 2019.
378 11 9 Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, and Ilaria Matteucci. TOUCAN: A protocol to secure controller area network. In Proceedings of the ACM Workshop on Automotive Cybersecurity, AutoSec@CODASPY 2019, Richardson, TX, USA, March 27, 2019, pages 3–8, 2019.
384 11 15 Gianpiero Costantino and Ilaria Matteucci. CANDY CREAM - hacking infotainment android systems to command instrument cluster via can data frame. In Meikang Qiu, editor, 2019 IEEE International Conference on Computational Science and Engineering, CSE 2019, and IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2019, New York, NY, USA, August 1-3, 2019, pages 476–481. IEEE, 2019.
324 9 2 Glenn Trevor, “Shared Mobility: Consumer Insights and Trends, ” Accessed: Sep. 10, 2021. https://thedigitalmomentum.com/shared-mobility-consumer-insights-and-trends/
440 13 6 Gopu, G.L., Kavitha, K.V., Joy, J., 2016. Service Oriented Architecture based connectivity of automotive ECUs, in: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT). Presented at the 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), IEEE, Nagercoil, India, pp. 1–4. https://doi.org/10.1109/ICCPCT.2016.7530358
267 7 23 H. Khemissa and P. Urien, “Centralized architecture for ECU security management in connected and autonomous vehicles,” in 2022 13th In- ternational Conference on Information and Communication Technology Convergence (ICTC). IEEE, Oct. 2022.
114 3 39 H. M. Song, H. R. Kim, and H. K. Kim, “Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network,” in 2016 international conference on information networking (ICOIN). IEEE, 2016, pp. 63–68.
340 9 18 Häckel, Timo. “Service Classification in Service-Oriented ICT Architectures of Future Vehicles,” Hochschule für Angewandte Wissenschaften Hamburg, 2017.
188 5 19 Haibo Zeng and Marco Di Natale. Mechanisms for guaranteeing data consistency and flow preservation in AUTOSAR software on multi-core platforms. In SIES 2011 - 6th IEEE International Symposium on Industrial Embedded Systems, Conference Proceedings, pages 140–149. IEEE, jun 2011.
338 9 16 Han, S., He, Y., Ding, Y. , “Enable an Open Software Defined Mobility Ecosystem through VEC-OF,” In 2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C) pp. 229-236, 2020.
137 4 10 http://starbed.nict.go.jp/en/index.html
135 4 8 https://plantuml.com/
138 4 11 https://www.esol.com/embedded/lineup_rtos.html
441 13 7 Hussain, R., Zeadally, S., 2019. Autonomous Cars: Research Results, Issues, and Future Challenges. IEEE Commun. Surv. Tutor. 21, 1275–1313. https://doi.org/10.1109/COMST.2018.2869360
442 13 8 Huszak, G., Morita, H., 2019. On the 10BASE-T1S preamble for multidrop, in: 2019 Global Information Infrastructure and Networking Symposium (GIIS). Presented at the 2019 Global Information Infrastructure and Networking Symposium (GIIS), IEEE, Paris, France, pp. 1–6. https://doi.org/10.1109/GIIS48668.2019.9044963
21 1 20 I. Foster, A. Prudhomme, K. Koscher, and S. Savage, “Fast and Vulnerable: A Story of Telematic Failures,” in Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT), 2015, DOI: 10.5555/2831211.2831226.
128 4 1 IEC 61508: Functional safety of electrical/electronic/programmable electronic safety-related systems, 1998. T. Aoki et al.
254 7 10 IEEE 802.1 Working Group, “IEEE Standard for Local and Metropolitan Area Network–Bridges and Bridged Networks,” IEEE, Standard Std 802.1Q-2018 (Revision of IEEE Std 802.1Q-2014), Jul. 2018.
126 3 51 IEEE 802.1 Working Group. (2019) Ieee 802.1 time-sensitive networking task group.Online
212 6 14 IEEE, “Portable Operating System Interface (POSIX(TM)) Base Specifications,” https://standards.ieee.org/ieee/1003.1/7101/, IEEE, Standard.
194 5 25 Ignacio Sanudo, Paolo Burgio, and Marko Bertogna. Schedulability and timing analysis of mixed preemptive-cooperative tasks on a partitioned multi-core system. In Proceedings of the 7th International Workshop on Analysis Tools and Methodologies for Embedded and Real-Time Systems (WATERS’16), in conjuction with the 28th Euromicro Conference on Real-Time Systems (ECRTS 2016), Toulouse, France, 2016.
443 13 9 IISO - Standards [WWW Document], n.d. . ISO. URL https://www.iso.org/standards.html (accessed7.26.21).
444 13 10 IISO 26262-1:2018(en), Road vehicles — Functional safety — Part 1: Vocabulary [WWW Document], n.d. URL https://www.iso.org/obp/ui/#iso:std:iso:26262:thumbsdown:ed-2:v1:en (accessed 7.27.21).
178 5 9 INCHRON GmbH. chronSIM, version 2.9. https://www.inchron.com/tool-suite/chronsim/, 2019.
81 3 6 International Organization for Standardization (ISO), “ISO-26262: Road Vehicles - Functional Safety,” International Organization for Standardization, Tech. Rep., Dec. 2016.
251 7 7 International Organization for Standardization, “Road vehicles – Cyber-security engineering,” Standard ISO/SAE DIS 21434, 2020.
420 12 15 International Organization for Standardization. 2015. Road vehicles — Controller area network (CAN) — Part 1: Data link layer and physical signalling. https://www.iso.org/standard/63648.html.
389 11 20 International Organization for Standardization. ISO/IEC 11889-1:2015 - Trusted Platform Module library. https://www.iso.org/standard/66510.html, 2015.
390 11 21 International Organization for Standardization. Road vehicles — Controller area network (CAN) — Part 1: Data link layer and physical signalling. https://www.iso.org/standard/63648.html, 2015.
25 2 1 Iso 14229: Road vehicles — unified diagnostic services (uds), 2020.
129 4 2 ISO 26262 Road vehicles - functional safety, 2011.
208 6 10 ISO, “ISO 17356 Road vehicles — Open interface for embedded automotive applications — Part 3: OSEK/VDX Operating System (OS),” https://www.iso.org/standard/40079.html, International Organization for Standardization, Standard.
82 3 7 ISO/SAE 21434:Road Vehicles, Cybersecurity Engineering, ISO Std., 2021.
218 6 20 J. Abella, S. Alcaide, J. Anders, F. Bas, S. Becker, E. De Mulder, N. Elhamawy, F. K. G¨urkaynak, H. Handschuh, C. Hernandez et al., “Security, reliability and test aspects of the risc-v ecosystem,” in 2021 IEEE European Test Symposium (ETS). IEEE, 2021, pp. 1–10.
336 9 14 J. Bach, S. Otten, and E. Sax, “A taxonomy and systematic approach for automotive system architectures. from functional chains to functional networks,” in Proceedings of the 3rd International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS2017), Porto, Portugal, April 2017.
143 4 16 J. Bengtsson, K. Larsen et al.: UPPAAL – a Tool Suite for Automatic Verification of Real-time Systems, DIMACS/SYCON Workshop on Hybrid Systems III, pp.232–243, 1996.
160 4 33 J. Chen and T. Aoki: Conformance Testing for OSEK/VDX Operating System Using Model Checking, APSEC, pp.274–281, 2011.
89 3 14 J. Cui and B. Zhang, “Vera: A simplified security risk analysis method for autonomous vehicles,” IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 10 494–10 505, 2020.
124 3 49 J. Gao, L. Gan, F. Buschendorf, L. Zhang, H. Liu, P. Li, X. Dong, and T. Lu, “Omni scada intrusion detection using deep learning algorithms,” IEEE Internet of Things Journal, vol. 8, no. 2, pp. 951–961, 2020.
23 1 22 J. Griffith, “Learn the inner workings of a CAN bus driver and how to debug your system,” Texas Instruments, Technical Article, 2016, https://www.ti.com/lit/ta/ssztbo8/ssztbo8.pdf.
490 16 8 J. Hughes (2007): QuickCheck testing for fun and profit. In: Proceedings of PADL’07, Springer, pp. 1–32, doi:10.1007/978-3-540-69611-7 1.
154 4 27 J. L. Bechennec, M. Briday et al.: Trampoline An Open Source Implementation of the OSEK/VDX RTOS Specification, Emerging Technologies and Factory Automation, pp. 62–69, 2006,
302 8 24 J. Lehoczky, L. Sha, and Y. Ding. The rate monotonic scheduling algorithm: exact characterization and average case behavior. 1989 Proceedings. Real-Time Systems Symposium, pages 0–5, 1989.
182 5 13 J. Lehoczky, L. Sha, and Y. Ding. The rate monotonic scheduling algorithm: exact characterization and average case behavior. 1989 Proceedings. Real-Time Systems Symposium, pages 0–5,1989.
234 6 36 J. Lelli, C. Scordino, L. Abeni, and D. Faggioli, “Deadline scheduling in the linux kernel,” Software: Practice and Experience, vol. 46, no. 6, pp.821–839, 2016.
145 4 18 J. Liedtke: On 𝜇-kernel construction, Symposium on Operating System Principles, Operating System Review 29(5), pp. 237–250, 1995.
457 14 8 J. Park, D.-H. Jung, K.-B. Bae, and S.-O. Park, "Range-Doppler map improvement in FMCW radar for small moving drone detection using the stationary point concentration technique," IEEE Trans. Microw. Theory and Techn., vol. 68, no. 5, pp. 1858-1871, May 2020.
458 14 9 J. Park, J. -S. Park, K.-B. Bae, and S.-O. Park, "Advanced stationary point concentration technique for leakage mitigation and small drone detection with FMCW radar," submitted for publication in IEEE.Online
456 14 7 J. Park, K.-B. Bae, D.-H. Jung, and S.-O. Park, "Micro-drone detection with FMCW radar based on stationary point concentration technique," in Proc. 2019 Int. Symp. Antennas Propag., Xi'an, China, Oct. 2019, pp. 1-3.
455 14 6 J. Park, S. Park, D.-H Kim, and S.-O. Park, "Leakage mitigation in heterodyne FMCW radar for small drone detection with stationary point concentration technique," IEEE Trans. Microw. Theory and Techn., vol. 67, no. 3, pp. 1221-1232, Mar. 2019.
150 4 23 J. Penix et.al: Verifying Time Partitioning in the DEOS Scheduling Kernel, Formal Methods in System Design, Vol.26, No.2, pp.103–135, 2005.
167 4 40 J. Rushby : The Versatile Synchronous Observer, Specification, Algebra, and Software. Lecture Notes in Computer Science, vol 8373. pp.110–128, Springer, 2014.
156 4 29 J. Shi, J. He et al.: ORIENTAIS: formal verified OSEK/VDX real-time operating system, international conference on engineering of complex computer systems, pp.293–301, 2012.
142 4 15 J. Sun, Y. Liu et al.: PAT: Towards Flexible Verification under Fairness, International Conference on Computer Aided Verification, pp.709–714, 2009.
492 16 10 J. Svenningsson, H. Svensson, N. Smallbone, T. Arts, U. Norell & J. Hughes (2014): An Expressive Semantics of Mocking. In: Fundamental Approaches to Software Engineering, LNCS 8411, Springer, pp. 385–399, doi:10.1007/978-3-642-54804-8 27.
493 16 11 J. Tretmans (2011): Model-Based Testing and Some Steps towards Test-Based Modelling. In: Formal Methods for Eternal Networked Software Systems, LNCS 6659, Springer, pp. 297–326, doi:10.1007/978-3-642-21455-4 9.
209 6 11 J.-L. Bechennec, M. Briday, S. Faucou, and Y. Trinquet, “Trampoline an open source implementation of the osek/vdx rtos specification,” in 2006 IEEE Conference on Emerging Technologies and Factory Automation. IEEE, 2006, pp. 62–69.
464 15 5 J.-L. Boulanger, F.-X. Fornari, J.-L. Camus, and B. Dion, SCADE: Language and applications, 1st. Wiley-IEEE Press, 2015.
105 3 30 J.-P. Monteuuis, A. Boudguiga, J. Zhang, H. Labiod, A. Servel, and P. Urien, “Sara: Security automotive risk analysis method,” in Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018, pp. 3–14.
85 3 10 J.-P. Signoret and A. Leroy, “Hazard and operability study (hazop),” Reliability Assessment of Safety and Production Systems: Analysis. Modelling. Calculations and Case Studies, pp. 157–164, 2021.
40 2 16 James Carter and Susan Lee. Implementing lane keeping assist: Hardware and software integration on stm32 microcontrollers. Embedded Systems Review, 15(2):45–56, 2020.
42 2 18 James Collins and Erica Brooks. Efficient data transfer using serial peripheral interface (spi) in embedded systems. Embedded Systems Review, 14(3):140–155, 2019.
29 2 5 James T. Anderson and Emily R. Carter. Challenges in traditional firmware over-the-air updates for automotive systems. Automotive Software Engineering Review, 12(4):345–360, 2021.
72 2 48 James Williams and Laura Thompson. Fota-driven predictive maintenance in modern vehicles. Journal of Automotive Engineering, 23(2):75–89, 2021.
73 2 49 Jane D. Williams and Robert K. Lee. Securing firmware updates: The role of uds 0x27 protocol in modern vehicles. Journal of Automotive Cybersecurity, 7(3):210–225, 2022.
45 2 21 Jane Doe and Mark Smith. Advancements in autosar for scalable automotive systems. Automotive Software Review, 15(2):123–135, 2022.
391 11 22 Jeff Crume. OwnStar: Yet another car hack. https://insideinternetsecurity.wordpress.com/2015/08/05/ownstar-yet-another-car-hack/, 2015.
71 2 47 Jessica Taylor and Robert Morgan. Evaluating patch-based updating techniques for embedded systems. Journal of Embedded System Design, 14(3):176–189, 2020.
175 5 6 Jian Chen, Manar H Alalfi, Thomas R Dean, and S Ramesh. Modeling AUTOSAR implementations in simulink. In European Conference on Modelling Foundations and Applications, pages 279–292. Springer, 2018.
62 2 38 John D. Miller and Sophia K. Chen. The role of lane keeping assist in adas: Bridging ai decision-making with real-time motor control. Journal of Autonomous Vehicle Systems, 29(3):456–472, 2023.
65 2 41 John Richardson and Emily Clark. Advanced security protocols for fota in automotive systems. Journal of Automotive Cybersecurity, 10(4):299–312, 2021.
68 2 44 John Smith and Sarah Doe. The benefits and challenges of fota in modern vehicles. Journal of Automotive Software Engineering, 12(3):45–58, 2020.
313 8 35 Julien Schmaltz and Jan Tretmans. On conformance testing for timed systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 5215 LNCS, pages 250–264. Springer, Berlin, Heidelberg, 2008.
139 4 12 K. L. McMillan: Symbolic Model Checking: An Approach to the State Explosion Problem, Kluwer Academic Publishers, 1993.
253 7 9 K. Matheus and T. K¨onigseder, Automotive Ethernet. Cambridge, United Kingdom: Cambridge University Press, Jan. 2015.
199 6 1 K. Strandberg, T. Olovsson, and E. Jonsson, “Securing the Connected Car: A Security-Enhancement Methodology,” IEEE Vehicular Technology Magazine, vol. 13, no. 1, pp. 56–65, 2018.
153 4 26 K. T. G. Tigori, J-L Béchennec et.al: Formal Model-Based Synthesis of Application- Specific Static RTOS, ACM Trans. Embed. Comput. Syst., vol.16, no.4, pp.97:1–97:25, 2017.
159 4 32 K. Yatake and T. Aoki: Automatic Generation of Model Checking Scripts based on Environment Modeling, SPIN Workshop on Model Checking of Software, pp.58–75, 2010.
161 4 34 K. Yatake and T. Aoki: Model Checking of OSEK/VDX OS Design Model Based on Environment Modeling, ICTAC, pp.183–197, 2012.
93 3 18 K.-T. Cho and K. G. Shin, “Fingerprinting electronic control units for vehicle intrusion detection,” in 25th USENIX Security Symposium (USENIX Security 16), 2016, pp. 911–927.
15 1 14 K.-T. Cho and K. G. Shin, “Fingerprinting Electronic Control Units for Vehicle Intrusion Detection,” in Proceedings of the 25th USENIX Security Symposium (USENIX Sec’16’), 2016, DOI:10.5555/3241094.3241165.
16 1 15 K.-T. Cho and K. G. Shin,, “Viden: Attacker Identification on In-Vehicle Networks,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), 2017, DOI:10.1145/3133956.3134001.
445 13 11 Kassakian, J.G., Perreault, D.J., 2001. The future of electronics in automobiles, in: Proceedings of the 13th International Symposium on Power Semiconductor Devices & ICs. IPSD ’01 (IEEE Cat. No.01CH37216). Presented at the 13th International Symposium on Power Semiconductor Devices & ICs. IPSD ’01, Inst. Electr. Eng. Japan, Osaka, Japan, pp. 15–19. https://doi.org/10.1109/ISPSD.2001.934550
74 2 50 Kevin Wright and Laura Davis. Future directions in fota for advanced automotive applications. Automotive Innovations Quarterly, 18(1):45–58, 2022.
292 8 14 Khaled El-Fakih, Anton Kolomeez, Svetlana Prokopenko, and Nina Yevtushenko. Extended Finite State Machine Based Test Derivation Driven by User Defined Faults. In 2008 International Conference on Software Testing, Verification, and Validation, pages 308–317. IEEE, apr 2008.
331 9 9 L. Deng, J. Offutt, P. Ammann, N. Mirzaei, “Mutation operators for testing android apps,” Inf. Software Technol., 81, pp. 154-168, 2017.
249 7 5 L. Xue et al., “SAID: State-aware Defense Against Injection Attacks on In-vehicle Network,” in 31st USENIX Security Symposium (USENIX Security 22). Aug. 2022, pp. 1921–1938.
118 3 43 L. Xue, Y. Liu, T. Li, K. Zhao, J. Li, L. Yu, X. Luo, Y. Zhou, and G. Gu, “{SAID}: State-aware defense against injection attacks on in-vehicle network,” in 31st USENIX Security Symposium (USENIX Security 22), 2022, pp. 1921–1938.
59 2 35 Lars Kr¨uger and John Smith. The role of uds in the osi model: A standardized approach to automotive diagnostics. Journal of Embedded Systems and Applications, 18(3):87–95, 2020.
296 8 18 Le Thi My Hanh and Nguyen Thanh Binh. Mutation operators for simulink models. In Proceedings - 4th International Conference on Knowledge and Systems Engineering, KSE 2012, pages 54–59. IEEE, aug 2012.
56 2 32 Liam Johnson and Olivia Martin. Delta updates: Enhancing efficiency in fota systems. Journal of Embedded Systems, 8(2):25–36, 2021.
49 2 25 Linda Green and Michael Turner. Efficiency of delta updating for firmware management. Journal of Embedded Computing, 12(5):87–101, 2020.
413 12 8 Luca Dariz, Gianpiero Costantino, Massimiliano Ruggeri, and Fabio Martinelli. 2018. A Joint Safety and Security Analysis of message protection for CAN bus protocol. Advances in Science, Technology and Engineering Systems Journal 3, 1 (2018), 384–393. https://doi.org/10.25046/aj030147
414 12 9 Luca Dariz, Michele Selvatici, Massimiliano Ruggeri, Gianpiero Costantino, and Fabio Martinelli. 2017. Trade-Off Analysis of Safety and Security in CAN bus communication. In The 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS 2017).
385 11 16 Luca Dariz, Michele Selvatici, Massimiliano Ruggeri, Gianpiero Costantino, and Fabio Martinelli. Trade-off analysis of safety and security in CAN bus communication. In 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems, MT-ITS 2017, Naples, Italy, June 26-28, 2017, pages 226–231. IEEE, 2017.
382 11 13 Lucian Constantin. Researchers hack Tesla Model S with remote attack. https://www.pcworld.com/article/3121999/researchers-demonstrate-remote-attack-against-tesla-model-s.html, 2016.
344 9 22 LynuxWorks, “low-level & boot-level rootkits revisited,” White Paper, https://www.slideshare.net/aziv69/whitepaper-lynx-secure-rootkit-detection-protection-by-means-of-secure-virtualization, Accessed: Oct.10, 2021.
269 7 25 M. A. Al-Shareeda et al., “Survey of Authentication and Privacy Schemes in Vehicular ad hoc Networks,” IEEE Sensors Journal, vol. 21, pp. 2422–2433, Jan 2021.
270 7 26 M. Asghar et al., “A Scalable and Efficient PKI Based Authentication Protocol for VANETs,” in 2018 28th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, Nov. 2018.
166 4 39 M. B. Dwyer, G. S. Avrunin, and J. C. Corbett: Patterns in Property Specifications for Finite-state Verification, International Conference on Software Engineering, pp. 411–420, 1999.
8 1 7 M. Bellare, R. Gu´ erin, and P. Rogaway, “XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions,” in Proceedings of the Annual International Cryptology Conference (CRYPTO), 1995, DOI: 10.1007/3-540-44750-4 2.
260 7 16 M. Cakir et al., “A QoS Aware Approach to Service-Oriented Communication in Future Automotive Networks,” in 2019 IEEE Vehicular Networking Conference (VNC). Dec. 2019.
415 12 10 M. Dworkin. 2005. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38B.
20 1 19 M. Foruhandeh, Y. Man, R. Gerdes, M. Li, and T. Chantem, “SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks,” in Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC), 2019, DOI: 10.1145/3359789.3359834.
259 7 15 M. Iorio et al., “Securing SOME/IP for In-Vehicle Service Protection,” IEEE Transactions on Vehicular Technology, vol. 69, pp. 13 450–13 466, 2020.
76 3 1 M. Iorio, A. Buttiglieri, M. Reineri, F. Risso, R. Sisto, and F. Valenza, “Protecting in-vehicle services: Security-enabled some/ip middleware,” IEEE Vehicular Technology Magazine, vol. 15, no. 3, pp. 77–85, 2020.
346 9 24 M. Iorio, M. Reineri, F. Risso, R. Sisto and F. Valenza, "Securing SOME/IP for In-Vehicle Service Protection," in IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp.13450-13466, Nov. 2020, doi: 10.1109/TVT.2020.3028880.
79 3 4 M. Iorio, M. Reineri, F. Risso, R. Sisto, and F. Valenza, “Securing some/ip for in-vehicle service protection,” IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13 450–13 466, 2020.
476 15 17 M. Lohstroh and E. A. Lee, “Deterministic actors,” in 2019 Forum on Specification and Design Languages (FDL), IEEE, 2019.
477 15 18 M. Lohstroh, I. Incer Romeo, A. Goens, et al., “Reactors: A determin- istic model for composable reactive systems,” in Model-Based Design of Cyber Physical Systems (CyPhy’19), 2019, To appear.
469 15 10 M. Lohstroh, M. Schoeberl, A. Goens, et al., “Actors revisited for time-critical systems,” in Proceedings of the 56th Annual Design Automation Conference 2019, ser. DAC ’19, Las Vegas, NV, USA: ACM, 2019, 152:1–152:4.
90 3 15 M. M¨ uter and N. Asaj, “Entropy-based anomaly detection for in-vehicle networks,” in 2011 IEEE Intelligent Vehicles Symposium (IV). IEEE, 2011, pp. 1110–1115.
92 3 17 M. M¨ uter, A. Groll, and F. C. Freiling, “A structured approach to anomaly detection for in-vehicle networks,” in 2010 Sixth International Conference on Information Assurance and Security. IEEE, 2010, pp.92–98.
266 7 22 M. M¨uller et al., “Roll, Roll, Roll Your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover,” in Internet Measurement Conference, ser. IMC ’19. ACM, 2019, p. 1–14.
229 6 31 M. P¨ohnl, A. Tamisier, and T. Blass, “A middleware journey from microcontrollers to microprocessors,” in 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2022, pp. 282–286.
219 6 21 M. Pietzsch, “Risc-v processor for network platforms according to iso 26262,” ATZelectronics worldwide, vol. 16, no. 11, pp. 8–13, 2021.
261 7 17 M. Rumez et al., “An Overview of Automotive Service-Oriented Architectures and Implications for Security Countermeasures,” IEEE Access, vol. 8, pp. 221 852–221 870, 2020.
337 9 15 M. Traub, A. Maier, and K. L. Barbehon,‘‘Future automotive architecture and the impact of IT trends,’’ IEEE Softw., vol. 34, no. 3, pp. 27–32, May 2017.
327 9 5 Mahdi Dibaei, Xi Zheng, Kun Jiang and et al., “An Overview of Attacks and Defences on Intelligent Connected Vehicles,” Digital Communications and Networks, vol.6, no.4, pp 399-421 Nov 2020.
341 9 19 Marc Bellanger, Edward Marmounier, “Service Oriented Architecture: impacts and challenges of an architecture paradigm change,” 10th European Congress on Embedded Real Time Software and Systems (ERTS 2020), Toulouse, France. Jan 2020.
380 11 11 Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, and Francesco Mercaldo. Driver and Path Detection through Time-Series Classification. Journal of Advanced Transportation, 2018:1–20, 2018.
57 2 33 Mark Johnson and Emily White. The role of memory stacks in autosar: A case study in firmware updates. In Proceedings of the International Conference on Automotive Software Systems, pages 145–152, 2020.
319 8 41 Mark Trakhtenbrot. Implementation-Oriented Mutation Testing of Statechart Models. In 2010 Third International Conference on Software Testing, Verification, and Validation Workshops, pages 120–125. IEEE, apr 2010.
53 2 29 Markus Hoffmann and Anna Becker. Unified diagnostic services: Enhancing automotive communication and maintenance. Automotive Engineering Journal, 29(5):123–135, 2021.
197 5 28 MathWorks. Developing S-Functions, r2017b. http://www.mathworks.com, 2017.
181 5 12 MathWorks. Simulink User’s Guide, r2017b. http://www.mathworks.com, 2017.
303 181 8 25 MathWorks. Simulink User’s Guide, r2017b. http://www.mathworks.com, 2017.
183 181 5 14 MathWorks. Stateflow User’s Guide, r2017b. http://www.mathworks.com, 2017.
316 8 38 Matthew Stephan, Manar H Alalfi, and James R Cordy. Towards a taxonomy for Simulink model mutations. In Proceedings - IEEE 7th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2014, pages 206–215, 2014.
315 8 37 Matthew Stephan, Manar H. Alafi, Andrew Stevenson, and James R. Cordy. Using mutation analysis for a model-clone detector comparison framework. In Proceedings - International Conference on Software Engineering, pages 1261–1264, 2013.
314 8 36 Matthew Stephan. Model clone detector evaluation using mutation analysis. In Proceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014, pages 633–638. Institute of Electrical and Electronics Engineers Inc., dec 2014.
325 9 3 McKinsey & Company, “Automotive revolution—perspective towards 2030: How the convergence of disruptive technology-driven trends could transform the auto industry,” January 2016.
200 6 2 McKinsey, “The case for an end-to-end automotive software platform,” https://www.mckinsey.com/industries/automotive-and-assembly/our-insights/the-case
38 2 14 Michael Brown and Anna White. Autosar standards and their role in fota systems. International Conference on Automotive Software Systems, pages 123–130, 2021.
50 2 26 Michael Green and Rachel Adams. Compliance of lane keeping assist systems with iso11270 standards: Enhancing vehicle dynamics control. International Journal of Automotive Engineering, 45(6):789–802, 2021.
310 8 32 Mike Papadakis, Marinos Kintis, Jie Zhang, Yue Jia, Yves Le Traon, and Mark Harman. Mutation Testing Advances: An Analysis and Survey. Advances in Computers, 112:275–378, jan 2019.
309 8 31 Mike Papadakis, Marinos Kintis, Jie Zhang, Yue Jia, Yves Le Traon, and Mark Harman. Mutation testing advances: an analysis and survey. In Advances in Computers, volume 112, pages 275–378. Elsevier, 2019.
393 11 24 Miro Enev, Alex Takakuwa, Karl Koscher, and Tadayoshi Kohno. Automobile Driver Fingerprinting. https://petsymposium.org/2016/files/papers/Automobile Driver Fingerprinting.pdf, 2016.
127 4 0 Model-Checking in the Loop Model-Based Testing for Automotive Operating Systems Toshiaki Aoki, Aritoshi Hata, Kazusato Kanamori, Satoshi Tanaka, Yuta Kawamoto, Yasuhiro Tanase, Masumi Imai, Fumiya Shigemitsu, Masaki Gondo, Tomoji Kishi https://arxiv.org/pdf/2310.00973
482 16 0 Modelling of Autosar Libraries for Large Scale Testing Authors: Wojciech Mostowski, Thomas Arts, John Hughes https://arxiv.org/pdf/1703.06574
320 8 42 Muhammad Nouman Zafar, Wasif Afzal, and Eduard Enoiu. Towards a workflow for model-based testing of embedded systems. In Proceedings of the 12th International Workshop on Automating TEST Case Design, Selection, and Evaluation, pages 33–40, 2021.
96 3 21 N. Alkhatib, H. Ghauch, and J.-L. Danger, “Some/ip intrusion detection using deep learning-based sequential models in automotive ethernet networks,” in 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2021, pp.0954–0962.
98 3 23 N. Alkhatib, M. Mushtag, H. Ghauch et al., “Here comes said: A some/ip attention-based mechanism for intrusion detection,” in Proceedings of the Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2023, pp. 462–467.
86 3 11 N. G. Leveson, Engineering a safer world: Systems thinking applied to safety. The MIT Press, 2016.
168 4 41 N. H. Tran, and T. Aoki: Conformance Testing of Schedulers for DSL-based Model Checking, International Symposium on Model Checking of Software, pp. 208-225, 2019
461 15 2 N. Halbwachs, P. Caspi, P. Raymond, and D. Pilaud, “The synchronous data flow programming language LUSTRE,” Proceedings of the IEEE, vol. 79, no. 9, pp. 1305–1320, 1991.
297 8 19 N. He, P. R¨ ummer, and D. Kroening. Test-case generation for embedded simulink via formal concept analysis. In 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC), pages 224–229, 2011.
216 6 18 N.-J. Wessman, F. Malatesta, J. Andersson, P. Gomez, M. Masmano, V. Nicolau, J. Le Rhun, G. Cabo, F. Bas, R. Lorenzo et al., “De-risc: the first risc-v space-grade platform for safety-critical systems,” in 2021 IEEE Space Computing Conference (SCC). IEEE, 2021, pp. 17–26.
383 11 14 National Instruments Corporation. FlexRay Automotive Communication Bus Overview, 2020.
423 12 18 Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, and Ingrid Verbauwhede. 2014. Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers. In Selected Areas in Cryptography – SAC 2014, Antoine Joux and Amr Youssef (Eds.). Springer International Publishing, Cham, 306–323.
394 11 25 Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, and Ingrid Verbauwhede. Chaskey: An efficient mac algorithm for 32-bit microcontrollers. In Antoine Joux and Amr Youssef, editors, Selected Areas in Cryptography – SAC 2014, pages 306–323, Cham, 2014. Springer International Publishing.
190 5 21 Nicolas Navet, Lionel Havet, Sebastian Altmeyer, and Loïc Fejoz. Lean Model-Driven Development through Model-Interpretation: the CPAL design flow. University of Luxembourg, pages 1–10, jan 2015.
214 6 16 NXP, i.MX Reference Manual, NXP, 2018. Online
215 6 17 O. Alparslan, S. Arakawa, and M. Murata, “Next generation intra-vehicle backbone network architectures,” in 2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR). IEEE, 2021, pp. 1–7.
203 6 5 O. group, “CVA6 RISC-V CPU,” https://github.com/openhwgroup/cva6.
103 3 28 O. Henniger, A. Ruddle, H. Seudi´ e, B. Weyl, M. Wolf, and T. Wollinger, “Securing vehicular on-board it systems: The evita project,” in VDI/VW Automotive Security Conference, 2009, p. 41.
395 11 26 O.Hartkopp, C. Reuber, and R.Schilling. Macan message authenticated can. 2012.
263 7 19 Object Management Group, “DDS Security,” OMG, Standard DDS-SECURITY 1.1, Jul. 2018.
262 7 18 Object Management Group, “Data Distribution Service,” OMG, Standard DDS 1.4, Mar. 2015.
425 12 20 Odzhan. 2018. Chaskey Cripto Lib. https://github.com/odzhan/tinycrypt/tree/master/mac/chaskey.
225 6 27 OMG, “Data Distribution Service (DDS) version 1.4,” https://www.omg.org/spec/DDS/, OMG, Standard.
237 6 39 OMG, “DDS for eXtremely Resource Constrained Environments version 1.0,” https://www.omg.org/spec/DDS-XRCE, Nov. 2019.
207 6 9 OSEK, “OSEK/VDX Operating System Specification 2.2.3,” https://www.osek-vdx.org/index htm.html, Feb. 2005.
131 207 4 4 OSEK/VDX Operating System Specification 2.2.3, 2005.
132 4 5 OSEK/VDX OS Test Plan 2.0, 1999.
213 6 15 P. Burgio, M. Bertogna, N. Capodieci, R. Cavicchioli, M. Sojka, P. Houdek, A. Marongiu, P. Gai, C. Scordino, and B. Morelli, “A software stack for next-generation automotive systems on many-core heterogeneous platforms,” Microprocessors and Microsystems, vol. 52, pp. 299–311, 2017.
479 15 20 P. Derler, T. H. Feng, E. A. Lee, et al., “PTIDES: A programming model for distributed real-time embedded systems,” EECS Department, University of California, Berkeley, Tech. Rep., May 2008.
232 6 34 P. Gai, M. Urbina, E. Guidieri, G. Serano, and N. Serreli, “Autosar university package classic platform,” in 27th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, 2022.
157 4 30 P. Godefroid, M. Y Levin, and D. Molnar: Automated Whitebox Fuzz Testing, Network and Distributed Systems Security, pp. 151–166, 2008.
258 7 14 P. Hoffman and J. Schlyter, “The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA,” IETF, RFC 6698, Aug. 2012.
185 5 16 Patricia Derler, Andreas Naderlinger, Wolfgang Pree, Stefan Resmerita, and Josef Templ. Simulation of LET models in Simulink and Ptolemy. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 6028 LNCS, pages 83–92. Springer, Berlin, Heidelberg, 2010.
240 6 42 R. Balas and L. Benini, “Risc-v for real-time mcus-software optimization and microarchitectural gap analysis,” in 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2021, pp. 874–877.
9 1 8 R. Bhatia, V. Kumar, K. Serag, Z. B. Celik, M. Payer, and D. Xu, “Evading Voltage-Based Intrusion Detection on Automotive CAN,” in Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2021, DOI: 10.14722/ndss.2021.23013.
11 1 10 R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, “Multicast security: A taxonomy and some efficient constructions,” in Proceedings of the 18th Annual Joint Conference on Computer Communications (INFOCOM), vol. 2, 1999, DOI:10.1109/INFCOM.1999.751457.
481 15 22 R. Ernst, L. K¨ ohler, and K.-B. Gemlau, “System level LET: Mastering cause-effect chains in distributed systems,” in 44th Annual Conference of the IEEE Industrial Electronics Society (IECON), Oct. 2018.
472 15 13 R. Gu, G. Jin, L. Song, L. Zhu, and S. Lu, “What change history tells us about thread synchronization,” in Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ser. ESEC/FSE 2015, Bergamo, Italy: ACM, 2015, pp. 426–438.
306 8 28 R. Nilsson, J. Offutt, and S.F. Andler. Mutation-based testing criteria for timeliness. In Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004., pages 306–311. IEEE, 2004.
122 3 47 R. Zhao, Y. Wang, Z. Xue, T. Ohtsuki, B. Adebisi, and G. Gui, “Semi-supervised federated learning based intrusion detection method for internet of things,” IEEE Internet of Things Journal, 2022.
201 6 3 R.-V. International, https://riscv.org.
291 8 13 R.A. DeMillo, R.J. Lipton, and F.G. Sayward. Hints on Test Data Selection: Help for the Practicing Programmer. Computer, 11(4):34–41, apr 1978.
295 8 17 R.G. Hamlet. Testing Programs with the Aid of a Compiler. IEEE Transactions on Software Engineering, SE-3(4):279–290, jul 1977.
323 9 1 Ralf Hannappel, “The impact of global warming on the automotive industry, ” AIP Conference Proceedings 1871, 060001, 2017.
376 11 7 Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers. The simon and speck families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404, 2013. https://eprint.iacr.org/2013/404.
304 8 26 Reza Matinnejad, Shiva Nejati, Lionel C. Briand, and Thomas Bruckmann. Automated test suite generation for time-continuous simulink models. In Proceedings of the 38th International Conference on Software Engineering - ICSE ’16, pages 595–606, New York, New York, USA, 2016. ACM Press.
206 6 8 RISC-V Community, “”Smclic” Core-Local Interrupt Controller (CLIC) RISC-V Privileged Architecture Extension,” https://github.com/riscv/riscv-fast-interrupt/blob/master/clic.adoc, 2022.
231 6 33 RISC-V Community, “RISC-V Platform-Level Interrupt Controller Specification,”
47 2 23 Robert Bosch GmbH. Can specification version 2.0. Technical Standard, 1991.
60 2 36 Robert Lee and Alice Brown. Uds protocol: Strengthening authentication in fota systems. Journal of Automotive Cybersecurity, 9(3):87–102, 2020.
307 8 29 Robert Nilsson and Jeff Offutt. Automated testing of timeliness: A case study. In Proceedings - International Conference on Software Engineering, 2007.
228 6 30 Robot Operating System (ROS), https://www.ros.org.
347 9 25 Rolf Johansson, Rikard Andersson, Markus Dernevik, “Enabling Tomorrow’s Road Vehicles by Service-Oriented Platform Patterns,” ERTS 2018, Toulouse, France, Jan 2018.
333 9 11 Rumez, Marcel & Grimm, Daniel & Kriesten, Reiner & Sax, Eric, “An Overview of Automotive Service-Oriented Architectures and Implications for Security Countermeasures”. IEEE Access. 8. 10.1109/ACCESS, 2020.
421 12 16 Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada, Naoki Adachi, Yukihiro Miyashita, and Satoshi Horihata. 2014. CaCAN-centralized authentication system in CAN (controller area network). In 14th Int. Conf. on Embedded Security in Cars (ESCAR 2014).
392 11 23 Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada, Naoki Adachi, Yukihiro Miyashita, and Satoshi Horihata. Cacan-centralized authentication system in can (controller area network). In 14th Int. Conf. on Embedded Security in Cars (ESCAR 2014), 2014.
245 7 1 S. Checkoway et al., “Comprehensive Experimental Analyses of Automotive Attack Surfaces,” in 20th USENIX Security Symposium, vol. 4.USENIX Association, Aug. 2011, pp. 77–92.
14 1 13 S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, “Comprehensive Experimental Analyses of Automotive Attack Surfaces,” in Proceedings of the 20th USENIX Security Symposium (USENIX Sec’11), 2011, DOI: 10.5555/2028067.2028073.
268 7 24 S. Fassak et al., “A secure protocol for session keys establishment between ECUs in the CAN bus,” in 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM). IEEE, Nov. 2017.
330 9 8 S. Khurshid, C.S. Păsăreanu, W. Visser, “Generalized symbolic execution for model checking and testing,” International Conference On Tools And Algorithms For the Construction And Analysis Of Systems, Springer, pp. 553-568, 2003
106 3 31 S. Kim, R. Shrestha, S. Kim, and R. Shrestha, “Internet of vehicles, vehicular social networks, and cybersecurity,” Automotive cyber security: introduction, challenges, and standardization, pp. 149–181, 2020.
491 16 9 S. Kunze, W. Mostowski, M.R. Mousavi & M. Varshosaz (2016): Generation of Failure Models through Automata Learning. In: Second International Workshop on Automotive Software Architectures (WASA 2016), IEEE Society, pp. 22–25, doi:10.1109/WASA.2016.7.
111 3 36 S. Lee, W. Choi, and D. H. Lee, “Protecting some/ip communication via authentication ticket,” Sensors, vol. 23, no. 14, p. 6293, 2023.
104 3 29 SAE Vehicle Electrical System Security Committee, “SAE J3061 Cybersecurity Guidebook for Cyber-Physical Automotive Systems,” SAE Standard, Warrendale, PA, USA, Work-in-Progress, 2017.
189 5 20 Sakthivel Manikandan Sundharam, Lionel Havet, Sebastian Altmeyer, and Nicolas Navet. A model-based development environment for rapid-prototyping of latency-sensitive automotive control software. In Proceedings - 2016 6th International Symposium on Embedded Computing and System Design, ISED 2016, pages 228–233, 2017.
58 2 34 Samuel P. Johnson and Laura K. Martinez. Delta updating: Enhancing efficiency in automotive firmware over-the-air systems. Journal of Embedded Systems, 18(2):123–135, 2020.
446 13 12 Schafer, J., Klein, D., 2013. Implementing Situation Awareness for Car-to-X Applications Using Domain Specific Languages, in: 2013 IEEE 77th Vehicular Technology Conference (VTC Spring). Presented at the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), IEEE, Dresden, Germany, pp. 1–5. https://doi.org/10.1109/VTCSpring.2013.6692589
202 6 4 Semico, “Risc-v market analysis: The new kid on the block,” Tech. Rep., 2019.
334 9 12 Seon Sim, Seung Jun Lee, “End-to-End Connectivity Design with Automotive Ethernet & Service-Oriented Architecture,” IEEE-SA Ethernet & IP, London, October, 2018.
400 11 31 Serge Vaudenay. Security flaws induced by cbc padding — applications to ssl, ipsec, wtls... In Lars R. Knudsen, editor, Advances in Cryptology — EUROCRYPT 2002, pages 534–545, Berlin, Heidelberg, 2002. Springer Berlin Heidelberg.
172 5 3 Sha L., Rajkumar R., and Lehoczky J. Priority inheritance protocols: An approach to real-time synchronization. IEEE Transactions on Computers, 30(9):1175–1185, Septebmer 1990.
288 8 10 Shafiul Azam Chowdhury, Sohil Lal Shrestha, Taylor T. Johnson, and Christoph Csallner. Slemi: Equivalence modulo input (emi) based mutation of cps models for finding compiler bugs in simulink. In 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE), pages 335–346, 2020.
242 6 44 Siemens, “Jailhouse,” https://github.com/siemens/jailhouse.
223 6 25 SiFive, “Press release — sifive rolls out powerful new risc-v portfolio to address unmet performance and feature needs of rapidly evolving next-gen digital automobiles,” https://www.sifive.com/press/sifive-rolls-out-powerful-new-risc-v-portfolio-to-address, Sep. 2022.
169 5 0 SimSched: A tool for Simulating Autosar Implementaion in Simulink Jian Chen, Manar H. Alalfi, Thomas R. Dean, Ramesh S https://arxiv.org/pdf/2308.14974
75 3 0 SISSA: Real-time Monitoring of Hardware Functional Safety and Cybersecurity with In-vehicle SOME/IP Ethernet Traffic Qi Liu, Xingyu Li, Ke Sun, Yufeng Li, Yanchen Liu https://arxiv.org/pdf/2402.14862
39 2 15 Sophia Brown and Daniel Gray. Layered software architecture in autosar: Enhancing scalability and modularity. Automotive Software Engineering Journal, 18(3):75–89, 2022.
51 2 27 Sophia Green and Michael Roberts. Sustainability benefits of over-the-air updates in the automotive industry. Sustainable Automotive Technology Review, 10(4):210–225, 2019.
61 2 37 Sophia Lee and Daniel Carter. Design and implementation of communication protocols in fota systems. Automotive Technology Journal, 20(1):45–60, 2022.
134 4 7 Specification of Operating System, R20-11, Adaptive Platform, AUTOSAR, 2020.
133 4 6 Specification of Operating System, R20-11, AUTOSAR, 2020.
447 13 13 Specification of UDP Network Management, n.d. 103.
429 12 24 STMicroelectronics. [n. d.]. X-CUBE-CRYPTOLIB. https://www.st.com/en/embedded-software/x-cube-cryptolib.html
430 12 25 STMicroelectronics. 2018. STM32CubeMX. https://www.st.com/en/development-tools/stm32cubemx.html.
69 2 45 STMicroelectronics. STM32F4 Series Reference Manual, 2023. Available online at https://www.st.com/resource/en/reference_manual/dm00031020.pdf.
70 2 46 STMicroelectronics. Stm32f401re nucleo board, 2025. Accessed: 2025-02-05.
163 4 36 T. Aoki, M. Satoh et al.: Combined Model Checking and Testing Create Confidence-A Case on Commercial Automotive Operating System, pp.109-132, Cyber-Physical System Design from an Architecture Analysis Viewpoint, Springer, 2017.
483 16 1 T. Arts & J. Hughes (2016): How Well are Your Requirements Tested? In: 2016 IEEE International Conference on Software Testing, Verification and Validation, pp. 244–254, doi:10.1109/ICST.2016.23.
486 16 4 T. Arts & M.R. Mousavi (2015): Automatic Consequence Analysis of Automotive Standards (AUTO-CAAS). In: First International Workshop on Automotive Software Architectures (WASA 2015), ACM Press, pp.35–38, doi:10.1145/2752489.2752495.
484 16 2 T. Arts, J. Hughes, J. Johansson & U. Wiger (2006): Testing telecoms software with QuviQ QuickCheck. In: Proceedings of ERLANG’06, ACM, pp. 2–10, doi:10.1145/1159789.1159792.
485 16 3 T. Arts, J. Hughes, U. Norell & H. Svensson (2015): Testing AUTOSAR software with QuickCheck. In: Eighth IEEE International Conference on Software Testing, Verification and Validation Workshops, pp. 1–4, doi:10.1109/ICSTW.2015.7107466.
99 3 24 T. Gehrmann and P. Duplys, “Intrusion detection for some/ip: Challenges and opportunities,” in 2020 23rd Euromicro Conference on Digital System Design (DSD). IEEE, 2020, pp. 583–587.
117 3 42 T. He, L. Zhang, F. Kong, and A. Salekin, “Exploring inherent sensor redundancy for automotive anomaly detection,” in 2020 57th ACM/IEEE Design Automation Conference (DAC). IEEE, 2020, pp. 1–6.
110 3 35 T. Koyama, M. Tanaka, A. Miyajima, S. Ukai, T. Sugashima, and M. Egawa, “Some/ip intrusion detection system using real-time and retroactive anomaly detection,” in 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring). IEEE, 2022, pp. 1–7.
148 4 21 T. Nipkow, L. Paulson et al.: Isabelle/HOL – A Proof Assistant for Higher-Order Logic, vol. 2283, LNCS, Springer, 2002.
130 4 3 Technical Assessment of Toyota Electronic Throttle Control Systems, NHTSA, 2011.
180 5 11 The AUTOSAR Consortium. Applying simulink to autosar, r3.1., 2006.
317 180 8 39 The AUTOSAR Consortium. Applying simulink to autosar, r3.1., 2006.
171 5 2 The AUTOSAR Consortium. AUTOSAR Methodology, r4.3., 2018.
196 5 27 The AUTOSAR Consortium. Specification of RTE Software, r4.4., 2018.
177 5 8 The AUTOSAR Consortium. Specification of Timing extensions, r4.4., 2018.
176 5 7 The AUTOSAR Consortium. The AUTOSAR Standard, r4.3., 2018.
318 176 8 40 The AUTOSAR Consortium. The AUTOSAR Standard, r4.3., 2018.
322 9 0 The Digital Foundation Platform -- A Multi-layered SOA Architecture for Intelligent Connected Vehicle Operating System David Yu, Andy Xiao https://arxiv.org/pdf/2210.08818
236 6 38 The Linux Foundation, “Enabling Linux in Safety Applications (ELISA),” https://elisa.tech/.
235 6 37 The Linux Foundation, “The real-time linux collaborative project,” https://wiki.linuxfoundation.org/realtime/.
184 5 15 Thomas A Henzinger, Benjamin Horowitz, and Christoph Meyer Kirsch. Giotto: A time-triggered lan- guage for embedded programming. Emsoft, 91(1):166–184, 2001.
35 2 11 Thomas Becker and Jane Williams. A comprehensive review of lane keeping systems: Advancements and challenges. Automotive Safety Journal, 34(7):125–137, 2022.
37 2 13 Thomas Braun and Julia Mayer. Priority arbitration in can protocols for real-time automotive systems. International Journal of Embedded Systems, 12(4):215–229, 2021.
52 2 28 Thomas Green and Rachel Adams. Applications of can protocols in modern automotive systems. IEEE Communications Surveys and Tutorials, 23(1):98–115, 2021.
278 8 0 Timed Model-Based Mutation Operators for Simulink Models Jian Chen, Manar H. Alalfi, Thomas R. Dean https://arxiv.org/pdf/2301.00efe
404 11 35 Tobias Ziermann, Stefan Wildermann, and J¨ urgen Teich. Can+: A new backward-compatible controller area network (can) protocol with up to16x higher data rates. In Proceedings of the Conference on Design, Automation and Test in Europe, pages 1088–1093. European Design and Automation Association, 2009.
433 12 28 Tobias Ziermann, Stefan Wildermann, and Jürgen Teich. 2009. CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16x higher data rates. In Proceedings of the Conference on Design, Automation and Test in Europe. European Design and Automation Association, 1088–1093.
405 12 0 TOUCAN: A proTocol tO secUre Controller Area Network Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci https://arxiv.org/pdf/2111.10642
198 6 0 Towards a RISC-V Open Platform for Next-generation Automotive ECUs Luca Cuomo, Claudio Scordino, Alessandro Ottaviano, Nils Wistoff, Robert Balas, Luca Benini, Errico Guidieri, Ida Maria Savino https://arxiv.org/pdf/2307.04148
342 9 20 Tsuyoshi Tsumuraya, “The evolution of E/E architecture and Software platform for R-Car/RH850,” Accessed: Sep. 9, 2021. https://www.renesas.com/us/en/blogs/evolution-ee-architecture-and-software-platform-r-carrh850
120 3 45 V. Prasanth, D. Foley, and S. Ravi, “Demystifying automotive safety and security for semiconductor developer,” in 2017 IEEE International Test Conference (ITC). IEEE, 2017, pp. 1–10.
401 11 32 Vector. Solutions for Automotive Ethernet. https://www.vector.com/int/en/know-how/technologies/networks/automotive-ethernet/, 2020.
123 3 48 W. Chen, F. Lyu, F. Wu, P. Yang, and J. Ren, “Flag: Flexible, accurate, and long-time user load prediction in large-scale wifi system using deep rnn,” IEEE Internet of Things Journal, vol. 8, no. 22, pp. 16 510–16 521, 2021.
17 1 16 W. Choi, K. Joo, H. J. Jo, M. C. Park, and D. H. Lee, “VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2114–2129, 2018, DOI:10.1109/TIFS.2018.2812149.
95 17 3 20 W. Choi, K. Joo, H. J. Jo, M. C. Park, and D. H. Lee, “Voltageids: Low-level communication characteristics for automotive intrusion detection system,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2114–2129, 2018.
277 7 33 W. Dai, “Crypto++ library 8.7,”. Website.Online
88 3 13 W. Young and R. Porada, “System-theoretic process analysis for security(stpa-sec): Cyber security and stpa,” in 2017 STAMP Conference, 2017.
67 2 43 William Scott and Patricia Reed. Practical applications of fota in automotive maintenance. Automotive Software and Maintenance Journal, 19(2):233–245, 2021.
448 13 14 Xie, G., Li, Y., Han, Y., Xie, Y., Zeng, G., Li, R., 2020. Recent Advances and Future Trends for Automotive Functional Safety Design Methodologies. IEEE Trans. Ind. Inform. 16, 5629–5642. https://doi.org/10.1109/TII.2020.2978889
221 6 23 Xilinx, “Zcu102,” https://www.xilinx.com/products/boards-and-kits/ek-u1-zcu102-g.html.
402 11 33 Xuhang Ying, Giuseppe Bernieri, Mauro Conti, and Radha Poovendran. TACAN: transmitter authentication through covert channels in controller area networks. CoRR, abs/1903.05231, 2019.
13 1 12 Y. Challal, H. Bettahar, and A. Bouabdallah, “A taxonomy of multicast data origin authentication: Issues and solutions,” IEEE Communications Surveys & Tutorials, vol. 6, no. 3, pp. 34–57, 2004, DOI: 10.1109/COMST.2004.5342292.
152 4 25 Y. Choi and T. Byun: Constraint-based test generation for automotive operating systems, Software & Systems Modeling, vol.16, no.1, pp.7–24, 2017.
151 4 24 Y. Choi: Model checking trampoline OS: a case study on safety analysis for automotive software. Softw. Test. Verif. Reliab. 24(1), pp.38–60, 2014.
155 4 28 Y. Huang, Y. Zhao et al.: Modeling and verifying the code-level OSEK/VDX operating system with CSP, TASE, pp. 142–149, 2011.
94 3 19 Y. Xun, Y. Zhao, and J. Liu, “Vehicleeids: A novel external intrusion detection system based on vehicle voltage signals,” IEEE Internet of Things Journal, vol. 9, no. 3, pp. 2124–2133, 2021.
478 15 19 Y. Zhao, J. Liu, and E. A. Lee, “A programming model for time- synchronized distributed real-time systems,” in 13th IEEE Real Time and Embedded Technology and Applications Symposium (RTAS’07), Apr. 2007, pp. 259–268.
321 8 43 Yuan Zhan and John A. Clark. Search-based mutation testing for simulink models. In GECCO 2005 - Genetic and Evolutionary Computation Conference, pages 1061–1068, New York, New York, USA, 2005. ACM Press.
300 8 22 Yue Jia and Mark Harman. An Analysis and Survey of the Development of Mutation Testing. IEEE Transactions on Software Engineering, 37(5):649–678, sep 2011.
329 9 7 Zhu, D., Kumar, V., Ravi, V. et al., "Detection method for Cybersecurity attack on Connected vehicles," SAE Technical Paper 2021-01-1249, 2021.

Related Notes

Strategy to some summary and propose to AUTOSAR, SDV and Software Factory.
https://qiita.com/kaizen_nagoya/items/d36a9eba629022276918

AUTOSAR paper on arXiv
https://qiita.com/kaizen_nagoya/items/7c2355275ec53dbdc7a2

sdv, autosar and software factory papers on arxiv and their references
https://qiita.com/kaizen_nagoya/items/0eb7e74d049133ae4bfe

AUTOSAR on arXiv reference paper summary
https://qiita.com/kaizen_nagoya/items/aa639a268aaa56c5a501

Yet another strategy for papers on Software Engineering.
https://qiita.com/kaizen_nagoya/items/d186dfcb4d4f7cd1dcf1

0
1
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?