AUTOSAR
We search "AUTOSAR " on the arXiv at 12 July 2025.
There are 16 papers on the www.arxiv.org.
Specifications and Requirements
It is proposed that the Specification and the Requirements be integrated into a single document. If possible, it is recommended that only the Specification be published, with the assumption that the Requirements will be automatically generated from the Specification.
Abstract Platform
It would be good to unify the source code of the Classic Platform and the Adaptive Platform. This is assuming that the source code of OSEK/VDX OS and POSIX are unified.
Module Integration
The Interface Module and MCAL of the Classic Platform may be integrated. It is advisable to increase the granularity of the Classic Platform Module and reduce the total number of modules to half or less.
arXiv
The 14th paper is not same as others. In the paper AUTOSAR mean automotive synthetic aperture radar.
1 CAIBA: Multicast Source Authentication for CAN Through Reactive Bit Flipping
Eric Wagner, Frederik Basels, Jan Bauer, Till Zimmermann, Klaus Wehrle, Martin Henze
https://arxiv.org/pdf/2504.16695
References
[1] “AMD LogiCORE™ CAN IP core ,” https://www.xilinx.com/products/intellectual-property/do-di-can.html, last accessed:26.6.2024.
[2] “CAN Injection: Keyless Car Theft,” https://kentindell.github.io/2023/04/03/can-injection/, last accessed: 29.8.2024.
[3] “NXP FlexCAN Controller,” https://www.nxp.com/products/nxp-product-information/ip-block-licensing/flexcan-controller: FLEXCAN-CONTROLLER, last accessed: 26.6.2024.
[4] E. Aliwa, O. Rana, C. Perera, and P. Burnap, “Cyberattacks and Countermeasures for In-Vehicle Networks,” ACM Computing Surveys (CSUR), vol. 54, no. 1, pp. 1–37, 2021, DOI:10.1145/3431233.
[5] Autosar, “Specification of Secure Onboard Communication Protocol, AUTOSAR FO R20-11,” Standard, 2020, https://www.autosar.org/fileadmin/standards/R20-11/FO/AUTOSAR PRS SecOcProtocol.pdf.
[6] G. Bella, P. Biondi, G. Costantino, and I. Matteucci, “TOUCAN: A proTocol tO secUre Controller Area Network,” in Proceedings of the ACM Workshop on Automotive Cybersecurity (AutoSec), 2019, DOI: 10.1145/3309171.3309175.
[7] M. Bellare, R. Gu´ erin, and P. Rogaway, “XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions,” in Proceedings of the Annual International Cryptology Conference (CRYPTO), 1995, DOI: 10.1007/3-540-44750-4 2.
[8] R. Bhatia, V. Kumar, K. Serag, Z. B. Celik, M. Payer, and D. Xu, “Evading Voltage-Based Intrusion Detection on Automotive CAN,” in Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2021, DOI: 10.14722/ndss.2021.23013.
[9] D. Boneh and V. Shoup, A Graduate Course in Applied Cryptography, 2023.
[10] R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, “Multicast security: A taxonomy and some efficient constructions,” in Proceedings of the 18th Annual Joint Conference on Computer Communications (INFOCOM), vol. 2, 1999, DOI:10.1109/INFCOM.1999.751457.
[11] G. Cena, I. C. Bertolotti, T. Hu, and A. Valenzano, “On a software-defined CAN controller for embedded systems,” Computer Standards & Interfaces, vol. 63, pp. 43–51, 2019, DOI:10.1016/j.csi.2018.11.007.
[12] Y. Challal, H. Bettahar, and A. Bouabdallah, “A taxonomy of multicast data origin authentication: Issues and solutions,” IEEE Communications Surveys & Tutorials, vol. 6, no. 3, pp. 34–57, 2004, DOI: 10.1109/COMST.2004.5342292.
[13] S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, “Comprehensive Experimental Analyses of Automotive Attack Surfaces,” in Proceedings of the 20th USENIX Security Symposium (USENIX Sec’11), 2011, DOI: 10.5555/2028067.2028073.
[14] K.-T. Cho and K. G. Shin, “Fingerprinting Electronic Control Units for Vehicle Intrusion Detection,” in Proceedings of the 25th USENIX Security Symposium (USENIX Sec’16’), 2016, DOI:10.5555/3241094.3241165.
[15] ——, “Viden: Attacker Identification on In-Vehicle Networks,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), 2017, DOI:10.1145/3133956.3134001.
[16] W. Choi, K. Joo, H. J. Jo, M. C. Park, and D. H. Lee, “VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2114–2129, 2018, DOI:10.1109/TIFS.2018.2812149.
[17] A. de Faveri Tron, S. Longari, M. Carminati, M. Polino, and S. Zanero, “CANflict: Exploiting Peripheral Conflicts for DataLink Layer Attacks on Automotive Networks,” in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022, DOI: 10.1145/3548606.3560618.
[18] E. C. for Electrotechnical Standardization, “Industrial communications subsystem based on ISO 11898(CAN) for controller-device interfaces – Part 4: CANopen,” Cenelec, Standard, 2002.
[19] M. Foruhandeh, Y. Man, R. Gerdes, M. Li, and T. Chantem, “SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks,” in Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC), 2019, DOI: 10.1145/3359789.3359834.
[20] I. Foster, A. Prudhomme, K. Koscher, and S. Savage, “Fast and Vulnerable: A Story of Telematic Failures,” in Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT), 2015, DOI: 10.5555/2831211.2831226.
[21] Frenzel+Berg, “CANopen Chip CO4011,” https://www.frenzelberg.de/fileadmin/FrenzelBerg/Datenblaetter/CANopenChip/ds co4011b en.pdf.
[22] J. Griffith, “Learn the inner workings of a CAN bus driver and how to debug your system,” Texas Instruments, Technical Article, 2016, https://www.ti.com/lit/ta/ssztbo8/ssztbo8.pdf.
2 Enhancing AUTOSAR-Based Firmware Over-the-Air Updates in the Automotive Industry with a Practical Implementation on a Steering System Mostafa
A. Mostafa, Mohamed K. Mohamed, Radwa W. Ezzat
https://arxiv.org/pdf/2503.05839
Bibliography
[1] Iso 14229: Road vehicles — unified diagnostic services (uds), 2020.
[2] Abdelrahman Ahmed Omar Abdelgawad, Youssief Ahmed Mohamed Anas Morsy, Mohamed Emad Mohamed Mohi, Ahmed Tawfeeq Elsayed, and Mohamed Ahmed Ezzat Tahoon. Shared autonomy steering haptic assistance: A deep reinforcement learning approach, 2024. Supervised by Dr. Haitham El-Hussieny and Dr. Victor Parque.
[3] AlveyTech. Alveytech 24v 250w electric motor, 2025. Accessed: 2025-02-05.
[4] AmpFlow. Ampflow s-400-24 power supply, 2025. Accessed: 2025-02-05.
[5] James T. Anderson and Emily R. Carter. Challenges in traditional firmware over-the-air updates for automotive systems. Automotive Software Engineering Review, 12(4):345–360, 2021.
[6] AUTOSAR Development Partnership. AUTOSAR Architecture Overview, 2021.
[7] AUTOSAR Development Partnership. AUTOSAR Specification of Software Update Management, 2021.
[8] AUTOSAR Development Partnership. AUTOSAR Specification of Memory Services, 2022.
[9] Andrew Baker and Sarah Johnson. Real-time communication in automotive networks using can protocols. IEEE Transactions on Vehicular Technology, 68(6):3547–3560, 2019.
[10] Andrew J. Baker and Michelle L. Stone. Integrating can and spi protocols for efficient communication in automotive systems. IEEE Transactions on Vehicular Technology, 69(5):4567–4580, 2020.
[11] Thomas Becker and Jane Williams. A comprehensive review of lane keeping systems: Advancements and challenges. Automotive Safety Journal, 34(7):125–137, 2022.
[12] David Black and Emma Green. Implementing fota in electronic control units: Challenges and solutions. In Proceedings of the International Symposium on Vehicle Software, pages 76–84, 2019.
[13] Thomas Braun and Julia Mayer. Priority arbitration in can protocols for real-time automotive systems. International Journal of Embedded Systems, 12(4):215–229, 2021.
[14] Michael Brown and Anna White. Autosar standards and their role in fota systems. International Conference on Automotive Software Systems, pages 123–130, 2021.
[15] Sophia Brown and Daniel Gray. Layered software architecture in autosar: Enhancing scalability and modularity. Automotive Software Engineering Journal, 18(3):75–89, 2022.
[16] James Carter and Susan Lee. Implementing lane keeping assist: Hardware and software integration on stm32 microcontrollers. Embedded Systems Review, 15(2):45–56, 2020.
[17] Canoz Civelek. Lane detection with steering and departure. https://github.com/canozcivelek/lane-detection-with-steer-and-departure, 2021.
[18] James Collins and Erica Brooks. Efficient data transfer using serial peripheral interface (spi) in embedded systems. Embedded Systems Review, 14(3):140–155, 2019.
[19] Components101. What is bootloader in microcontroller? why do you need it?, 2023. Accessed: 2025-01-25.
[20] AUTOSAR Consortium. Autosar architecture: The cornerstone of scalable automotive software development. AUTOSAR Technical Report, 3:1–15, 2018.
[21] Jane Doe and Mark Smith. Advancements in autosar for scalable automotive systems. Automotive Software Review, 15(2):123–135, 2022.
[22] FUT Electronics. High power motor driver - 10a continuous, 15a peak, 2025. Accessed: 2025-02-05.
[23] Robert Bosch GmbH. Can specification version 2.0. Technical Standard, 1991.
[24] Andrew Green and Michelle White. Error detection and correction in controller area network (can). Automotive Safety Journal, 18(2):75–89, 2020.
[25] Linda Green and Michael Turner. Efficiency of delta updating for firmware management. Journal of Embedded Computing, 12(5):87–101, 2020.
[26] Michael Green and Rachel Adams. Compliance of lane keeping assist systems with iso11270 standards: Enhancing vehicle dynamics control. International Journal of Automotive Engineering, 45(6):789–802, 2021.
[27] Sophia Green and Michael Roberts. Sustainability benefits of over-the-air updates in the automotive industry. Sustainable Automotive Technology Review, 10(4):210–225, 2019.
[28] Thomas Green and Rachel Adams. Applications of can protocols in modern automotive systems. IEEE Communications Surveys and Tutorials, 23(1):98–115, 2021.
[29] Markus Hoffmann and Anna Becker. Unified diagnostic services: Enhancing automotive communication and maintenance. Automotive Engineering Journal, 29(5):123–135, 2021.
[30] Emily Johnson and Carlos Martinez. Delta updating within the autosar framework. Embedded Systems Journal, 20(4):210–225, 2021.
[31] Emily Johnson and Michael Thompson. Comparing lane departure warning and lane keeping assist systems: A functional overview. Journal of Intelligent Transportation Systems, 29(3):89–101, 2021.
[32] Liam Johnson and Olivia Martin. Delta updates: Enhancing efficiency in fota systems. Journal of Embedded Systems, 8(2):25–36, 2021.
[33] Mark Johnson and Emily White. The role of memory stacks in autosar: A case study in firmware updates. In Proceedings of the International Conference on Automotive Software Systems, pages 145–152, 2020.
[34] Samuel P. Johnson and Laura K. Martinez. Delta updating: Enhancing efficiency in automotive firmware over-the-air systems. Journal of Embedded Systems, 18(2):123–135, 2020.
[35] Lars Kr¨uger and John Smith. The role of uds in the osi model: A standardized approach to automotive diagnostics. Journal of Embedded Systems and Applications, 18(3):87–95, 2020.
[36] Robert Lee and Alice Brown. Uds protocol: Strengthening authentication in fota systems. Journal of Automotive Cybersecurity, 9(3):87–102, 2020.
[37] Sophia Lee and Daniel Carter. Design and implementation of communication protocols in fota systems. Automotive Technology Journal, 20(1):45–60, 2022.
[38] John D. Miller and Sophia K. Chen. The role of lane keeping assist in adas: Bridging ai decision-making with real-time motor control. Journal of Autonomous Vehicle Systems, 29(3):456–472, 2023.
[39] Elon Musk and Tesla Engineering Team. Revolutionizing vehicle software updates: Tesla’s fota system. Automotive Software Innovations Journal, 15(3):101–112, 2020.
[40] Daniel Perez and Sarah Martinez. Lane following assist: Enhancing lka through adaptive cruise control integration. Journal of Advanced Vehicle Systems, 11(4):205–218, 2021.
[41] John Richardson and Emily Clark. Advanced security protocols for fota in automotive systems. Journal of Automotive Cybersecurity, 10(4):299–312, 2021.
[42] Elena Roberts and James Smith. Efficient memory management in autosar-compliant systems. Journal of Embedded Systems and Automotive Technology, 15(2):102–115, 2021.
[43] William Scott and Patricia Reed. Practical applications of fota in automotive maintenance. Automotive Software and Maintenance Journal, 19(2):233–245, 2021.
[44] John Smith and Sarah Doe. The benefits and challenges of fota in modern vehicles. Journal of Automotive Software Engineering, 12(3):45–58, 2020.
[45] STMicroelectronics. STM32F4 Series Reference Manual, 2023. Available online at https://www.st.com/resource/en/reference_manual/dm00031020.pdf.
[46] STMicroelectronics. Stm32f401re nucleo board, 2025. Accessed: 2025-02-05.
[47] Jessica Taylor and Robert Morgan. Evaluating patch-based updating techniques for embedded systems. Journal of Embedded System Design, 14(3):176–189, 2020.
[48] James Williams and Laura Thompson. Fota-driven predictive maintenance in modern vehicles. Journal of Automotive Engineering, 23(2):75–89, 2021.
[49] Jane D. Williams and Robert K. Lee. Securing firmware updates: The role of uds 0x27 protocol in modern vehicles. Journal of Automotive Cybersecurity, 7(3):210–225, 2022.
[50] Kevin Wright and Laura Davis. Future directions in fota for advanced automotive applications. Automotive Innovations Quarterly, 18(1):45–58, 2022.
3 SISSA: Real-time Monitoring of Hardware Functional Safety and Cybersecurity with In-vehicle SOME/IP Ethernet Traffic
Qi Liu, Xingyu Li, Ke Sun, Yufeng Li, Yanchen Liu
https://arxiv.org/pdf/2402.14862
REFERENCES
[1] M. Iorio, A. Buttiglieri, M. Reineri, F. Risso, R. Sisto, and F. Valenza, “Protecting in-vehicle services: Security-enabled some/ip middleware,” IEEE Vehicular Technology Magazine, vol. 15, no. 3, pp. 77–85, 2020.
[2] AUTOSAR. (2022) SOME/IP Protocol Specification. Accessed on 20 April 2023. [Online]. Available: https://www.autosar.org/fifleadmin/standards/R22-11/FO/AUTOSAR PRS SOMEIPProtocol.pdf
[3] D. Zelle, T. Lauser, D. Kern, and C. Krauß, “Analyzing and securing some/ip automotive services with formal and practical methods,” in Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, pp. 1–20.
[4] M. Iorio, M. Reineri, F. Risso, R. Sisto, and F. Valenza, “Securing some/ip for in-vehicle service protection,” IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13 450–13 466, 2020.
[5] C. Miller and C. Valasek, “Remote exploitation of an unaltered passenger vehicle,” Black Hat USA, vol. 2015, no. S 91, pp. 1–91, 2015.
[6] International Organization for Standardization (ISO), “ISO-26262: Road Vehicles - Functional Safety,” International Organization for Standardization, Tech. Rep., Dec. 2016.
[7] ISO/SAE 21434:Road Vehicles, Cybersecurity Engineering, ISO Std., 2021.
[8] E. Ruijters and M. Stoelinga, “Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools,” Computer science review, vol. 15, pp. 29–62, 2015.
[9] A. S. of Quality (ASQ). Failure Modes and Effects Analysis (FMEA). [Online]. Available: http://asq.org/learn-aboutquality/process-analysis-tools/overview/fmea.html
[10] J.-P. Signoret and A. Leroy, “Hazard and operability study (hazop),” Reliability Assessment of Safety and Production Systems: Analysis. Modelling. Calculations and Case Studies, pp. 157–164, 2021.
[11] N. G. Leveson, Engineering a safer world: Systems thinking applied to safety. The MIT Press, 2016.
[12] C. Schmittner, Z. Ma, and P. Smith, “Fmvea for safety and security analysis of intelligent and cooperative vehicles,” in Computer Safety, Reliability, and Security: SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014. Proceedings 33. Springer, 2014, pp. 282–288.
[13] W. Young and R. Porada, “System-theoretic process analysis for security(stpa-sec): Cyber security and stpa,” in 2017 STAMP Conference, 2017.
[14] J. Cui and B. Zhang, “Vera: A simplified security risk analysis method for autonomous vehicles,” IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 10 494–10 505, 2020.
[15] M. M¨ uter and N. Asaj, “Entropy-based anomaly detection for in-vehicle networks,” in 2011 IEEE Intelligent Vehicles Symposium (IV). IEEE, 2011, pp. 1110–1115.
[16] C. Miller and C. Valasek, “Adventures in automotive networks and control units,” Def Con, vol. 21, no. 260-264, pp. 15–31, 2013.
[17] M. M¨ uter, A. Groll, and F. C. Freiling, “A structured approach to anomaly detection for in-vehicle networks,” in 2010 Sixth International Conference on Information Assurance and Security. IEEE, 2010, pp.92–98.
[18] K.-T. Cho and K. G. Shin, “Fingerprinting electronic control units for vehicle intrusion detection,” in 25th USENIX Security Symposium (USENIX Security 16), 2016, pp. 911–927.
[19] Y. Xun, Y. Zhao, and J. Liu, “Vehicleeids: A novel external intrusion detection system based on vehicle voltage signals,” IEEE Internet of Things Journal, vol. 9, no. 3, pp. 2124–2133, 2021.
[20] W. Choi, K. Joo, H. J. Jo, M. C. Park, and D. H. Lee, “Voltageids: Low-level communication characteristics for automotive intrusion detection system,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2114–2129, 2018.
[21] N. Alkhatib, H. Ghauch, and J.-L. Danger, “Some/ip intrusion detection using deep learning-based sequential models in automotive ethernet networks,” in 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2021, pp.0954–0962.
[22] F. Luo, Z. Yang, Z. Zhang, Z. Wang, B. Wang, and M. Wu, “A multi-layer intrusion detection system for some/ip-based in-vehicle network,” Sensors, vol. 23, no. 9, p. 4376, 2023.
[23] N. Alkhatib, M. Mushtag, H. Ghauch et al., “Here comes said: A some/ip attention-based mechanism for intrusion detection,” in Proceedings of the Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2023, pp. 462–467.
[24] T. Gehrmann and P. Duplys, “Intrusion detection for some/ip: Challenges and opportunities,” in 2020 23rd Euromicro Conference on Digital System Design (DSD). IEEE, 2020, pp. 583–587.
[25] AUTOSAR, “SOME/IP Protocol Specification,” in In AUTOSAR Foundation Release R19-11. Munich, Germany: AUTOSAR, 2019, p. 696.
[26] AUTOSAR. (2022) SOME/IP Service Discovery Protocol Specification. Accessed on 20 April 2023. [Online]. Available: https://www.autosar.org/fifileadmin/standards/R22-11/FO/AUTOSAR PRS SOMEIPServiceDiscoveryProtocol.pdf
[27] F. Luo, Y. Jiang, Z. Zhang, Y. Ren, and S. Hou, “Threat analysis and risk assessment for connected vehicles: A survey,” Security and Communication Networks, vol. 2021, pp. 1–19, 2021.
[28] O. Henniger, A. Ruddle, H. Seudi´ e, B. Weyl, M. Wolf, and T. Wollinger, “Securing vehicular on-board it systems: The evita project,” in VDI/VW Automotive Security Conference, 2009, p. 41.
[29] SAE Vehicle Electrical System Security Committee, “SAE J3061 Cybersecurity Guidebook for Cyber-Physical Automotive Systems,” SAE Standard, Warrendale, PA, USA, Work-in-Progress, 2017.
[30] J.-P. Monteuuis, A. Boudguiga, J. Zhang, H. Labiod, A. Servel, and P. Urien, “Sara: Security automotive risk analysis method,” in Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018, pp. 3–14.
[31] S. Kim, R. Shrestha, S. Kim, and R. Shrestha, “Internet of vehicles, vehicular social networks, and cybersecurity,” Automotive cyber security: introduction, challenges, and standardization, pp. 149–181, 2020.
[32] D. Ren, S. Du, and H. Zhu, “A novel attack tree based risk assessment approach for location privacy preservation in the vanets,” in 2011 IEEE International Conference on Communications (ICC). IEEE, 2011, pp.1–5.
[33] B. Ma, S. Yang, Z. Zuo, B. Zou, Y. Cao, X. Yan, S. Zhou, and J. Li, “An authentication and secure communication scheme for in-vehicle networks based on some/ip,” Sensors, vol. 22, no. 2, p. 647, 2022.
[34] A. Casparsen, D. G. Sϕrensen, J. N. Andersen, J. I. Christensen, P. Antoniou, R. Krϕyer, T. Madsen, and K. Gjoerup, “Closing the security gaps in some/ip through implementation of a host-based intrusion detection system,” in 2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC). IEEE, 2022, pp. 436–441.
[35] T. Koyama, M. Tanaka, A. Miyajima, S. Ukai, T. Sugashima, and M. Egawa, “Some/ip intrusion detection system using real-time and retroactive anomaly detection,” in 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring). IEEE, 2022, pp. 1–7.
[36] S. Lee, W. Choi, and D. H. Lee, “Protecting some/ip communication via authentication ticket,” Sensors, vol. 23, no. 14, p. 6293, 2023.
[37] G. Zhang, Q. Liu, C. Cao, J. Li, and Y. Li, “Bit scanner: Anomaly detection for in-vehicle can bus using binary sequence whitelisting,” Computers & Security, vol. 134, p. 103436, 2023.
[38] A. Taylor, N. Japkowicz, and S. Leblanc, “Frequency-based anomaly detection for the automotive can bus,” in 2015 World Congress on Industrial Control Systems Security (WCICSS). IEEE, 2015, pp. 45–49.
[39] H. M. Song, H. R. Kim, and H. K. Kim, “Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network,” in 2016 international conference on information networking (ICOIN). IEEE, 2016, pp. 63–68.
[40] A. R. Javed, S. Ur Rehman, M. U. Khan, M. Alazab, and T. Reddy, “Canintelliids: Detecting in-vehicle intrusion attacks on a controller area network using cnn and attention-based gru,” IEEE transactions on network science and engineering, vol. 8, no. 2, pp. 1456–1466, 2021.
[41] E. Seo, H. M. Song, and H. K. Kim, “Gids: Gan based intrusion detection system for in-vehicle network,” in 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2018, pp. 1–6.
[42] T. He, L. Zhang, F. Kong, and A. Salekin, “Exploring inherent sensor redundancy for automotive anomaly detection,” in 2020 57th ACM/IEEE Design Automation Conference (DAC). IEEE, 2020, pp. 1–6.
[43] L. Xue, Y. Liu, T. Li, K. Zhao, J. Li, L. Yu, X. Luo, Y. Zhou, and G. Gu, “{SAID}: State-aware defense against injection attacks on in-vehicle network,” in 31st USENIX Security Symposium (USENIX Security 22), 2022, pp. 1921–1938.
[44] AUTOSAR, “AUTOSAR software specification: Diagnostic event manager,” https://www.autosar.org/fileadmin/standards/R20-11/CP/AUTOSAR SWS DiagnosticEventManager.pdf, 2020.
[45] V. Prasanth, D. Foley, and S. Ravi, “Demystifying automotive safety and security for semiconductor developer,” in 2017 IEEE International Test Conference (ITC). IEEE, 2017, pp. 1–10.
[46] A. Kleyner and R. Knoell, “Calculating probability metric for random hardware failures (pmhf) in the new version of iso 26262 functional safety-methodology and case studies,” SAE Technical Paper, Tech. Rep., 2018.
[47] R. Zhao, Y. Wang, Z. Xue, T. Ohtsuki, B. Adebisi, and G. Gui, “Semi-supervised federated learning based intrusion detection method for internet of things,” IEEE Internet of Things Journal, 2022.
[48] W. Chen, F. Lyu, F. Wu, P. Yang, and J. Ren, “Flag: Flexible, accurate, and long-time user load prediction in large-scale wifi system using deep rnn,” IEEE Internet of Things Journal, vol. 8, no. 22, pp. 16 510–16 521, 2021.
[49] J. Gao, L. Gan, F. Buschendorf, L. Zhang, H. Liu, P. Li, X. Dong, and T. Lu, “Omni scada intrusion detection using deep learning algorithms,” IEEE Internet of Things Journal, vol. 8, no. 2, pp. 951–961, 2020.
[50] Egomania. (2016) Some-ip generator. [Online]. Available: https://github.com/Egomania/SOME-IP Generator
[51] IEEE 802.1 Working Group. (2019) Ieee 802.1 time-sensitive networking task group. [Online]. Available: https://1.ieee802.org/tsn/802-1dg
4 Model-Checking in the Loop Model-Based Testing for Automotive Operating Systems
Toshiaki Aoki, Aritoshi Hata, Kazusato Kanamori, Satoshi Tanaka, Yuta Kawamoto, Yasuhiro Tanase, Masumi Imai, Fumiya Shigemitsu, Masaki Gondo, Tomoji Kishi
https://arxiv.org/pdf/2310.00973
REFERENCES
[1] IEC 61508: Functional safety of electrical/electronic/programmable electronic safety-related systems, 1998. T. Aoki et al.
[2] ISO 26262 Road vehicles - functional safety, 2011.
[3] Technical Assessment of Toyota Electronic Throttle Control Systems, NHTSA, 2011.
[4] OSEK/VDX Operating System Specification 2.2.3, 2005.
[5] OSEK/VDX OS Test Plan 2.0, 1999.
[6] Specification of Operating System, R20-11, AUTOSAR, 2020.
[7] Specification of Operating System, R20-11, Adaptive Platform, AUTOSAR, 2020.
[8] https://plantuml.com/
[9] G. Holzmann: Spin Model Checker: the Primer and Reference Manual, Addison-Wesley, 2003.
[10] http://starbed.nict.go.jp/en/index.html
[11] https://www.esol.com/embedded/lineup_rtos.html
[12] K. L. McMillan: Symbolic Model Checking: An Approach to the State Explosion Problem, Kluwer Academic Publishers, 1993.
[13] E. Cohen, M. Dahlweid et al.: VCC: A practical system for verifying concurrent C, Theorem Proving in Higher Order Logics, pages 23–42. Springer, 2009.
[14] C. A. R. Hoare: Communicating sequential processes, Communications of ACM, Vol. 21, No.8, pp.666–677, 1978.
[15] J. Sun, Y. Liu et al.: PAT: Towards Flexible Verification under Fairness, International Conference on Computer Aided Verification, pp.709–714, 2009.
[16] J. Bengtsson, K. Larsen et al.: UPPAAL – a Tool Suite for Automatic Verification of Real-time Systems, DIMACS/SYCON Workshop on Hybrid Systems III, pp.232–243, 1996.
[17] G. Klein: Operating System Verification - An Overview, S¯ adhan¯ a , 34(1), pp.26–69, 2009.
[18] J. Liedtke: On 𝜇-kernel construction, Symposium on Operating System Principles, Operating System Review 29(5), pp. 237–250, 1995.
[19] G. Klein et.al: seL4: Formal verification of an OS kernel, ACM Symposium on Operating Systems Principles, pp.207–220, 2009.
[20] G. Klein et al.: Comprehensive formal verification of an OS microkernel ACM Transactions on Computer Systems, Volume 32 Issue 1, pp.1–70, 2014.
[21] T. Nipkow, L. Paulson et al.: Isabelle/HOL – A Proof Assistant for Higher-Order Logic, vol. 2283, LNCS, Springer, 2002.
[22] A. Fox and M. Myreen: A Trustworthy Monadic Formalization of the ARMv7 Instruction Set Architecture. International Conference on Interactive Theorem Proving, pp.243–258, 2010.
[23] J. Penix et.al: Verifying Time Partitioning in the DEOS Scheduling Kernel, Formal Methods in System Design, Vol.26, No.2, pp.103–135, 2005.
[24] Y. Choi: Model checking trampoline OS: a case study on safety analysis for automotive software. Softw. Test. Verif. Reliab. 24(1), pp.38–60, 2014.
[25] Y. Choi and T. Byun: Constraint-based test generation for automotive operating systems, Software & Systems Modeling, vol.16, no.1, pp.7–24, 2017.
[26] K. T. G. Tigori, J-L Béchennec et.al: Formal Model-Based Synthesis of Application- Specific Static RTOS, ACM Trans. Embed. Comput. Syst., vol.16, no.4, pp.97:1–97:25, 2017.
[27] J. L. Bechennec, M. Briday et al.: Trampoline An Open Source Implementation of the OSEK/VDX RTOS Specification, Emerging Technologies and Factory Automation, pp. 62–69, 2006,
[28] Y. Huang, Y. Zhao et al.: Modeling and verifying the code-level OSEK/VDX operating system with CSP, TASE, pp. 142–149, 2011.
[29] J. Shi, J. He et al.: ORIENTAIS: formal verified OSEK/VDX real-time operating system, international conference on engineering of complex computer systems, pp.293–301, 2012.
[30] P. Godefroid, M. Y Levin, and D. Molnar: Automated Whitebox Fuzz Testing, Network and Distributed Systems Security, pp. 151–166, 2008.
[31] E. Bounimova, P. Godefroid, and D. Molnar: Billions and billions of constraints: Whitebox fuzz testing in production, 35th International Conference on Software Engineering pp. 122–131, 2013.
[32] K. Yatake and T. Aoki: Automatic Generation of Model Checking Scripts based on Environment Modeling, SPIN Workshop on Model Checking of Software, pp.58–75, 2010.
[33] J. Chen and T. Aoki: Conformance Testing for OSEK/VDX Operating System Using Model Checking, APSEC, pp.274–281, 2011.
[34] K. Yatake and T. Aoki: Model Checking of OSEK/VDX OS Design Model Based on Environment Modeling, ICTAC, pp.183–197, 2012.
[35] D. H. Vu, Y. Chiba et al.: Verifying OSEK/VDX OS Design using Its Formal Specification, TASE, pp.81-88, 2016.
[36] T. Aoki, M. Satoh et al.: Combined Model Checking and Testing Create Confidence-A Case on Commercial Automotive Operating System, pp.109-132, Cyber-Physical System Design from an Architecture Analysis Viewpoint, Springer, 2017.
[37] A. Hall: Seven myths of formal methods,IEEE Software, vol. 7, no. 5, pp. 11-19, Sept. 1990.
[38] D. Lee. and M. Yannakakis: Principles and methods of testing finite state machines- a survey, in Proceedings of the IEEE, vol. 84, no. 8, pp. 1090-1123, 1996.
[39] M. B. Dwyer, G. S. Avrunin, and J. C. Corbett: Patterns in Property Specifications for Finite-state Verification, International Conference on Software Engineering, pp. 411–420, 1999.
[40] J. Rushby : The Versatile Synchronous Observer, Specification, Algebra, and Software. Lecture Notes in Computer Science, vol 8373. pp.110–128, Springer, 2014.
[41] N. H. Tran, and T. Aoki: Conformance Testing of Schedulers for DSL-based Model Checking, International Symposium on Model Checking of Software, pp. 208-225, 2019
5 SimSched: A tool for Simulating Autosar Implementaion in Simulink
Jian Chen, Manar H. Alalfi, Thomas R. Dean, Ramesh S
https://arxiv.org/pdf/2308.14974
References
[1] AUTOSAR. Autosar development partnership. http://www.autosar.org, 2021.
[2] The AUTOSAR Consortium. AUTOSAR Methodology, r4.3., 2018.
[3] Sha L., Rajkumar R., and Lehoczky J. Priority inheritance protocols: An approach to real-time synchronization. IEEE Transactions on Computers, 30(9):1175–1185, Septebmer 1990.
[4] Dan Henriksson, Anton Cervin, and Karl-Erik Årzén. TrueTime : Real-time Control System Simulation with MATLAB / Simulink. Proceedings of the Nordic MATLAB Conference, 2003.
[5] Fabio Cremona, Matteo Morelli, and Marco Di Natale. TRES: A Modular Representation of Schedulers, Tasks, and Messages to Control Simulations in Simulink. Proceedings of the 30th Annual ACM Symposium on Applied Computing, pages 1940–1947, 2015.
[6] Jian Chen, Manar H Alalfi, Thomas R Dean, and S Ramesh. Modeling AUTOSAR implementations in simulink. In European Conference on Modelling Foundations and Applications, pages 279–292. Springer, 2018.
[7] The AUTOSAR Consortium. The AUTOSAR Standard, r4.3., 2018.
[8] The AUTOSAR Consortium. Specification of Timing extensions, r4.4., 2018.
[9] INCHRON GmbH. chronSIM, version 2.9. https://www.inchron.com/tool-suite/chronsim/, 2019.
[10] ETAS GmbH. RTA-TRACE User Guide, version 2.1.1. https://www.etas.de, 2006.
[11] The AUTOSAR Consortium. Applying simulink to autosar, r3.1., 2006.
[12] MathWorks. Simulink User’s Guide, r2017b. http://www.mathworks.com, 2017.
[13] J. Lehoczky, L. Sha, and Y. Ding. The rate monotonic scheduling algorithm: exact characterization and average case behavior. [1989] Proceedings. Real-Time Systems Symposium, pages 0–5, 1989.
[14] MathWorks. Stateflow User’s Guide, r2017b. http://www.mathworks.com, 2017.
[15] Thomas A Henzinger, Benjamin Horowitz, and Christoph Meyer Kirsch. Giotto: A time-triggered lan- guage for embedded programming. Emsoft, 91(1):166–184, 2001.
[16] Patricia Derler, Andreas Naderlinger, Wolfgang Pree, Stefan Resmerita, and Josef Templ. Simulation of LET models in Simulink and Ptolemy. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 6028 LNCS, pages 83–92. Springer, Berlin, Heidelberg, 2010.
[17] Andreas Naderlinger, Josef Templ, and Wolfgang Pree. Simulating real-time software components based on logical execution time. In Proceedings of the 2009 Summer Computer Simulation Conference, SCSC ’09, pages 148–155, Vista, CA, 2009. Society for Modeling & Simulation International.
[18] A. Ferrari, M. Di Natale, G. Gentile, G. Reggiani, and P. Gai. Time and memory tradeoffs in the implementation of AUTOSAR components. In 2009 Design, Automation & Test in Europe Conference & Exhibition, pages 864–869. IEEE, apr 2009.
[19] Haibo Zeng and Marco Di Natale. Mechanisms for guaranteeing data consistency and flow preservation in AUTOSAR software on multi-core platforms. In SIES 2011 - 6th IEEE International Symposium on Industrial Embedded Systems, Conference Proceedings, pages 140–149. IEEE, jun 2011.
[20] Sakthivel Manikandan Sundharam, Lionel Havet, Sebastian Altmeyer, and Nicolas Navet. A model-based development environment for rapid-prototyping of latency-sensitive automotive control software. In Proceedings - 2016 6th International Symposium on Embedded Computing and System Design, ISED 2016, pages 228–233, 2017.
[21] Nicolas Navet, Lionel Havet, Sebastian Altmeyer, and Loïc Fejoz. Lean Model-Driven Development through Model-Interpretation: the CPAL design flow. University of Luxembourg, pages 1–10, jan 2015.
[22] Caroline Brandberg and Marco Di Natale. A SimEvents Model for the Analysis of Scheduling and Memory Access Delays in Multicores. In 2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES), pages 1–10. IEEE, jun 2018.
[23] Andreas Naderlinger. Simulating preemptive scheduling with timing-aware blocks in Simulink. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, pages 758–763. IEEE, mar 2017.
[24] C. L. Liu and James W. Layland. Scheduling Algorithms for Multiprogramming in a Hard- Real-Time Environment Scheduling Algorithms for Multiprogramming. Journal of the Association for Computing Machinery, 20(1):46–61, jan 1973.
[25] Ignacio Sanudo, Paolo Burgio, and Marko Bertogna. Schedulability and timing analysis of mixed preemptive-cooperative tasks on a partitioned multi-core system. In Proceedings of the 7th International Workshop on Analysis Tools and Methodologies for Embedded and Real-Time Systems (WATERS’16), in conjuction with the 28th Euromicro Conference on Real-Time Systems (ECRTS 2016), Toulouse, France, 2016.
[26] Alessandro Biondi, Paolo Pazzaglia, Alessio Balsini, and Marco Di Natale. Logical execution time implementation and memory optimization issues in autosar applications for multicores. In International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS), 2017.
[27] The AUTOSAR Consortium. Specification of RTE Software, r4.4., 2018.
[28] MathWorks. Developing S-Functions, r2017b. http://www.mathworks.com, 2017.
6 Towards a RISC-V Open Platform for Next-generation Automotive ECUs
Luca Cuomo, Claudio Scordino, Alessandro Ottaviano, Nils Wistoff, Robert Balas, Luca Benini, Errico Guidieri, Ida Maria Savino
https://arxiv.org/pdf/2307.04148
REFERENCES
[1] K. Strandberg, T. Olovsson, and E. Jonsson, “Securing the Connected Car: A Security-Enhancement Methodology,” IEEE Vehicular Technology Magazine, vol. 13, no. 1, pp. 56–65, 2018.
[2] McKinsey, “The case for an end-to-end automotive software platform,” https://www.mckinsey.com/industries/automotive-and-assembly/our-insights/the-case
[3] R.-V. International, https://riscv.org.
[4] Semico, “Risc-v market analysis: The new kid on the block,” Tech. Rep., 2019.
[5] O. group, “CVA6 RISC-V CPU,” https://github.com/openhwgroup/cva6.
[6] Evidence Srl, “Erika enterprise rtos,” https://github.com/evidence/erika3.
[7] A. Waterman, Y. Lee, R. Avizienis, D. A. Patterson, and K. Asanovi´c, “The risc-v instruction set manual volume ii: Privileged architecture version 1.9,” EECS Department, University of California, Berkeley, Tech. Rep. UCB/EECS-2016-129, Jul 2016. [Online]. Available: http://www2.eecs.berkeley.edu/Pubs/TechRpts/2016/EECS-2016-129.html
[8] RISC-V Community, “”Smclic” Core-Local Interrupt Controller (CLIC) RISC-V Privileged Architecture Extension,” https://github.com/riscv/riscv-fast-interrupt/blob/master/clic.adoc, 2022.
[9] OSEK, “OSEK/VDX Operating System Specification 2.2.3,” https://www.osek-vdx.org/index htm.html, Feb. 2005.
[10] ISO, “ISO 17356 Road vehicles — Open interface for embedded automotive applications — Part 3: OSEK/VDX Operating System (OS),” https://www.iso.org/standard/40079.html, International Organization for Standardization, Standard.
[11] J.-L. Bechennec, M. Briday, S. Faucou, and Y. Trinquet, “Trampoline an open source implementation of the osek/vdx rtos specification,” in 2006 IEEE Conference on Emerging Technologies and Factory Automation. IEEE, 2006, pp. 62–69.
[12] AUTOSAR, “Classic platform,” https://www.autosar.org/standards/classic-platform/, AUTOSAR, Standard.
[13] ——, “Adaptive Platform,” https://www.autosar.org/standards/adaptive-platform/, AUTOSAR, Standard.
[14] IEEE, “Portable Operating System Interface (POSIX(TM)) Base Specifications,” https://standards.ieee.org/ieee/1003.1/7101/, IEEE, Standard.
[15] P. Burgio, M. Bertogna, N. Capodieci, R. Cavicchioli, M. Sojka, P. Houdek, A. Marongiu, P. Gai, C. Scordino, and B. Morelli, “A software stack for next-generation automotive systems on many-core heterogeneous platforms,” Microprocessors and Microsystems, vol. 52, pp. 299–311, 2017.
[16] NXP, i.MX Reference Manual, NXP, 2018. [Online]. Available: https://www.nxp.com/docs/en/reference-manual/i.MX Reference Manual Linux.pdf
[17] O. Alparslan, S. Arakawa, and M. Murata, “Next generation intra-vehicle backbone network architectures,” in 2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR). IEEE, 2021, pp. 1–7.
[18] N.-J. Wessman, F. Malatesta, J. Andersson, P. Gomez, M. Masmano, V. Nicolau, J. Le Rhun, G. Cabo, F. Bas, R. Lorenzo et al., “De-risc: the first risc-v space-grade platform for safety-critical systems,” in 2021 IEEE Space Computing Conference (SCC). IEEE, 2021, pp. 17–26.
[19] “Dependable Real-time Infrastructure for Safery-critical Computer,” https://derisc-project.eu/ . Figure 5: (a) Original CLINT + PLIC interrupt interface. (b) Improved CLIC + PLIC interrupt interface. Figure 6: Worst-case overhead of CVA6 with CLINT and CLIC interrupt controllers against the Cortex-R5. https://github.com/riscv/riscv-plic-spec/blob/master/riscv-plic.adoc , 2022.
[20] J. Abella, S. Alcaide, J. Anders, F. Bas, S. Becker, E. De Mulder, N. Elhamawy, F. K. G¨urkaynak, H. Handschuh, C. Hernandez et al., “Security, reliability and test aspects of the risc-v ecosystem,” in 2021 IEEE European Test Symposium (ETS). IEEE, 2021, pp. 1–10.
[21] M. Pietzsch, “Risc-v processor for network platforms according to iso 26262,” ATZelectronics worldwide, vol. 16, no. 11, pp. 8–13, 2021.
[22] F. Cosimi, F. Tronci, S. Saponara, and P. Gai, “Analysis, hardware specification and design of a programmable performance monitoring unit (ppmu) for risc-v ecus,” in 2022 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, 2022, pp. 213–218.
[23] Xilinx, “Zcu102,” https://www.xilinx.com/products/boards-and-kits/ek-u1-zcu102-g.html.
[24] A. Gruin, T. Carle, H. Cass´e, and C. Rochange, “Speculative execution and timing predictability in an open source risc-v core,” in 2021 IEEE Real-Time Systems Symposium (RTSS), 2021, pp. 393–404.
[25] SiFive, “Press release — sifive rolls out powerful new risc-v portfolio to address unmet performance and feature needs of rapidly evolving next-gen digital automobiles,” https://www.sifive.com/press/sifive-rolls-out-powerful-new-risc-v-portfolio-to-address, Sep. 2022.
[26] AUTOSAR, “SOME/IP Protocol Specification,” https://www.autosar.org/fileadmin/user upload/standards/foundation/21-11/AUTOSAR PRS SOMEIPProtocol.pdf.
[27] OMG, “Data Distribution Service (DDS) version 1.4,” https://www.omg.org/spec/DDS/, OMG, Standard.
[28] Emilio Guijarro, RTI, “Press release — connectivity at the core: The status of dds in autosar,” https://www.rti.com/blog/status-of-dds-in-autosar, Sep. 2022.
[29] C. Scordino, A. G. Mari˜no, and F. Fons, “Hardware acceleration of data distribution service (dds) for automotive communication and computing,” IEEE Access, vol. 10, pp. 109 626–109 651, 2022.
[30] Robot Operating System (ROS), https://www.ros.org.
[31] M. P¨ohnl, A. Tamisier, and T. Blass, “A middleware journey from microcontrollers to microprocessors,” in 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2022, pp. 282–286.
[32] A. Kurth, B. Forsberg, and L. Benini, “Herov2: Full-stack open-source research platform for heterogeneous computing,” 2022. [Online]. Available: https://arxiv.org/abs/2201.03861
[33] RISC-V Community, “RISC-V Platform-Level Interrupt Controller Specification,”
[34] P. Gai, M. Urbina, E. Guidieri, G. Serano, and N. Serreli, “Autosar university package classic platform,” in 27th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, 2022.
[35] C. Scordino and G. Lipari, “Linux and real-time: Current approaches and future opportunities,” in IEEE International Congress ANIPLA, 2006.
[36] J. Lelli, C. Scordino, L. Abeni, and D. Faggioli, “Deadline scheduling in the linux kernel,” Software: Practice and Experience, vol. 46, no. 6, pp.821–839, 2016.
[37] The Linux Foundation, “The real-time linux collaborative project,” https://wiki.linuxfoundation.org/realtime/.
[38] ——, “Enabling Linux in Safety Applications (ELISA),” https://elisa.tech/.
[39] OMG, “DDS for eXtremely Resource Constrained Environments version 1.0,” https://www.omg.org/spec/DDS-XRCE, Nov. 2019.
[40] eProsima, “Micro XRCE-DDS,” https://github.com/eProsima/Micro-XRCE-DDS.
[41] “micro-ROS,” https://micro.ros.org/.
[42] R. Balas and L. Benini, “Risc-v for real-time mcus-software optimization and microarchitectural gap analysis,” in 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2021, pp. 874–877.
[43] C. Scordino, I. M. Savino, L. Cuomo, L. Miccio, A. Tagliavini, M. Bertogna, and M. Solieri, “Real-time virtualization for industrial automation,” in 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), vol. 1. IEEE, 2020, pp.353–360.
[44] Siemens, “Jailhouse,” https://github.com/siemens/jailhouse.
[45] ARM, “Cortex®-M3 Technical reference manual,” https://developer.arm.com/documentation/ddi0337/latest/ , Tech. Rep., 2008.
7 Authenticated and Secure Automotive Service Discovery with DNSSEC and DANE
Mehmet Mueller, Timo Häckel, Philipp Meyer, Franz Korf, Thomas C. Schmidt
https://arxiv.org/pdf/2303.15128
REFERENCES
[1] S. Checkoway et al., “Comprehensive Experimental Analyses of Automotive Attack Surfaces,” in 20th USENIX Security Symposium, vol. 4.USENIX Association, Aug. 2011, pp. 77–92.
[2] C. Miller and C. Valasek, “A Survey of Remote Automotive Attack Surfaces,” Black Hat USA, vol. 2014, 2014.
[3] ——, “Remote Exploitation of an Unaltered Passenger Vehicle,” Black Hat USA, vol. 2015, p. 91, 2015.
[4] F. Kohnh¨auser et al., “Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles,” in 2019 IEEE Security and Privacy Workshops (SPW). 2019, pp. 126–131.
[5] L. Xue et al., “SAID: State-aware Defense Against Injection Attacks on In-vehicle Network,” in 31st USENIX Security Symposium (USENIX Security 22). Aug. 2022, pp. 1921–1938.
[6] A. Mart´ınez-Cruz et al., “Security on in-vehicle communication protocols: Issues, challenges, and future research directions,” Computer Communications, vol. 180, pp. 1–20, 2021.
[7] International Organization for Standardization, “Road vehicles – Cyber-security engineering,” Standard ISO/SAE DIS 21434, 2020.
[8] AUTomotive Open System ARchitecture Consortium, “SOME/IP Protocol Specification,” AUTOSAR, Tech. Rep. 696, Nov. 2022.
[9] K. Matheus and T. K¨onigseder, Automotive Ethernet. Cambridge, United Kingdom: Cambridge University Press, Jan. 2015.
[10] IEEE 802.1 Working Group, “IEEE Standard for Local and Metropolitan Area Network–Bridges and Bridged Networks,” IEEE, Standard Std 802.1Q-2018 (Revision of IEEE Std 802.1Q-2014), Jul. 2018.
[11] A. Kampmann et al., “A Dynamic Service-Oriented Software Architecture for Highly Automated Vehicles,” in 2019 IEEE Intelligent Transportation Systems Conference (ITSC). 2019, pp. 2101–2108.
[12] AUTomotive Open System ARchitecture Consortium, “SOME/IP Service Discovery Protocol Specification,” AUTOSAR, Tech. Rep. 802, Nov. 2021.
[13] 3rd D. Eastlake, “Domain Name System Security Extensions,” IETF, RFC 2535, Mar. 1999.
[14] P. Hoffman and J. Schlyter, “The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA,” IETF, RFC 6698, Aug. 2012.
[15] M. Iorio et al., “Securing SOME/IP for In-Vehicle Service Protection,” IEEE Transactions on Vehicular Technology, vol. 69, pp. 13 450–13 466, 2020.
[16] M. Cakir et al., “A QoS Aware Approach to Service-Oriented Communication in Future Automotive Networks,” in 2019 IEEE Vehicular Networking Conference (VNC). Dec. 2019.
[17] M. Rumez et al., “An Overview of Automotive Service-Oriented Architectures and Implications for Security Countermeasures,” IEEE Access, vol. 8, pp. 221 852–221 870, 2020.
[18] Object Management Group, “Data Distribution Service,” OMG, Standard DDS 1.4, Mar. 2015.
[19] ——, “DDS Security,” OMG, Standard DDS-SECURITY 1.1, Jul. 2018.
[20] D. Cooper et al., “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile,” IETF, RFC 5280, May 2008.
[21] E. Osterweil et al., “From the Beginning: Key Transitions in the First 15 Years of DNSSEC,” Transactions on Network and Service Management (TNSM), vol. 19, pp. 5265–5283, Dec. 2022.
[22] M. M¨uller et al., “Roll, Roll, Roll Your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover,” in Internet Measurement Conference, ser. IMC ’19. ACM, 2019, p. 1–14.
[23] H. Khemissa and P. Urien, “Centralized architecture for ECU security management in connected and autonomous vehicles,” in 2022 13th In- ternational Conference on Information and Communication Technology Convergence (ICTC). IEEE, Oct. 2022.
[24] S. Fassak et al., “A secure protocol for session keys establishment between ECUs in the CAN bus,” in 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM). IEEE, Nov. 2017.
[25] M. A. Al-Shareeda et al., “Survey of Authentication and Privacy Schemes in Vehicular ad hoc Networks,” IEEE Sensors Journal, vol. 21, pp. 2422–2433, Jan 2021.
[26] M. Asghar et al., “A Scalable and Efficient PKI Based Authentication Protocol for VANETs,” in 2018 28th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, Nov. 2018.
[27] D. Zelle et al., “Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods,” in The 16th International Conference on Availability, Reliability and Security, ser. ARES 21. ACM, Aug. 2021, pp. 1–20.
[28] B. Ma et al., “An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP,” Sensors, vol. 22, pp. 1–23, Jan. 2022.
[29] BMW AG, “vsomeip v3.1.20.3,” GitHub repository. [Online]. Available: https://github.com/COVESA/vsomeip
[30] A. Gulbrandsen et al., “A DNS RR for specifying the location of services (DNS SRV),” IETF, RFC 2782, Feb. 2000.
[31] D. Crocker, “Scoped Interpretation of DNS Resource Records through ’Underscored’ Naming of Attribute Leaves,” IETF, RFC 8552, Mar. 2019.
[32] B. M. Schwartz et al., “Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs),” IETF, Internet-Draft draft-ietf-dnsop-svcb-https-11, Oct. 2022, work in Progress.
[33] W. Dai, “Crypto++ library 8.7,”. Website. [Online]. Available: https://www.cryptopp.com/
8 Timed Model-Based Mutation Operators for Simulink Models
Jian Chen, Manar H. Alalfi, Thomas R. Dean
https://arxiv.org/pdf/2301.00efe
Reference
- Bernhard K. Aichernig, Harald Brandl, Elisabeth J¨ obstl, Willibald Krenn, Rupert Schlick, and Stefan Tiran. Killing strategies for model-based mutation testing. Software Testing, Verification and Reliability, 25(8):716–748, dec 2015.
- Bernhard K. Aichernig and Florian Lorber. Towards generation of adaptive test cases from partial models of determinized timed automata. In 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pages 1–6. IEEE, apr 2015.
- Bernhard K. Aichernig, Florian Lorber, and Dejan Niˇ ckovi´ c. Time for mutants - Model-based mutation testing with timed automata. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 7942 LNCS, pages 20–38. Springer, Berlin, Heidelberg, 2013.
- Rajeev Alur and David L. Dill. A theory of timed automata. Theoretical Computer Science, 126(2):183–235, apr 1994.
- AUTOSAR. Autosar development partnership. http://www.autosar.org, 2018.
- Fevzi Belli, Christof J. Budnik, Axel Hollmann, Tugkan Tuglular, and W. Eric Wong. Model-based mutation testing—Approach and case studies. Science of Computer Programming, 120:25–48, may 2016.
- Daniel Bouskela, Alberto Falcone, Alfredo Garro, Audrey Jardin, Martin Otter, Nguyen Thuy, and Andrea Tundis. Formal requirements modeling for cyber-physical systems engineering: an integrated solution based on form-l and modelica. Requirements Engineering, pages 1–30, 2021.
- Angelo Brillout, Nannan He, Michele Mazzucchi, Daniel Kroening, Mitra Purandare, Philipp R¨ummer, and Georg Weissenbacher. Mutation-based test case generation for Simulink models. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 6286 LNCS, pages 208–227, 2010.
- Jian Chen, Manar H Alalfi, Thomas R Dean, and S Ramesh. Modeling autosar implementations in simulink. In European Conference on Modelling Foundations and Applications, pages 279–292. Springer, 2018.
- Shafiul Azam Chowdhury, Sohil Lal Shrestha, Taylor T. Johnson, and Christoph Csallner. Slemi: Equivalence modulo input (emi) based mutation of cps models for finding compiler bugs in simulink. In 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE), pages 335–346, 2020.
- Alessandro Cornaglia, Shakib Hasan, Alexander Viehl, Oliver Bringmann, and Wolfgang Rosenstiel. Modeltime: Fully automated timing exploration of simulink models for embedded processors. In AmE 2019 - Automotive meets Electronics; 10th GMM- Symposium, pages 1–6, 2019.
- Fabio Cremona, Matteo Morelli, and Marco Di Natale. TRES: A Modular Representation of Schedulers, Tasks, and Messages to Control Simulations in Simulink. Proceedings of the 30th Annual ACM Symposium on Applied Computing, pages 1940–1947, 2015.
- R.A. DeMillo, R.J. Lipton, and F.G. Sayward. Hints on Test Data Selection: Help for the Practicing Programmer. Computer, 11(4):34–41, apr 1978.
- Khaled El-Fakih, Anton Kolomeez, Svetlana Prokopenko, and Nina Yevtushenko. Extended Finite State Machine Based Test Derivation Driven by User Defined Faults. In 2008 International Conference on Software Testing, Verification, and Validation, pages 308–317. IEEE, apr 2008.
-
- Cl´ audio Gomes, Romain Franceschini, Nick Battle, Casper Thule, Kenneth Lausdahl, Hans Vangheluwe, and Peter Gorm Larsen. Application of model-based testing to dynamic evaluation of functional mockup units. 2020.
- Cl´ audio Gomes, Casper Thule, David Broman, Peter Gorm Larsen, and Hans Vangheluwe. Cosimulation: a survey. ACM Computing Surveys (CSUR), 51(3):1–33, 2018.
- R.G. Hamlet. Testing Programs with the Aid of a Compiler. IEEE Transactions on Software Engineering, SE-3(4):279–290, jul 1977.
- Le Thi My Hanh and Nguyen Thanh Binh. Mutation operators for simulink models. In Proceedings - 4th International Conference on Knowledge and Systems Engineering, KSE 2012, pages 54–59. IEEE, aug 2012.
- N. He, P. R¨ ummer, and D. Kroening. Test-case generation for embedded simulink via formal concept analysis. In 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC), pages 224–229, 2011.
- Christopher Henard, Mike Papadakis, Gilles Perrouin, Jacques Klein, and Yves Le Traon. Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing. In 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops, pages 188–197. IEEE, mar 2013.
- Dan Henriksson, Anton Cervin, and Karl-Erik ˚ Arz´ en. TrueTime : Real-time Control System Simulation with MATLAB / Simulink. Proceedings of the Nordic MATLAB Conference, 2003.
- Yue Jia and Mark Harman. An Analysis and Survey of the Development of Mutation Testing. IEEE Transactions on Software Engineering, 37(5):649–678, sep 2011.
- Edward A. Lee, Stephen Neuendorffer, and Gang Zhou. Synchronous Reactive Models. In Claudius Ptolemaeus, editor, System Design, Modeling, and Simulation using Ptolemy II. Ptolemy.org, 2014.
- J. Lehoczky, L. Sha, and Y. Ding. The rate monotonic scheduling algorithm: exact characterization and average case behavior. [1989] Proceedings. Real-Time Systems Symposium, pages 0–5, 1989.
- MathWorks. Simulink User’s Guide, r2017b. http://www.mathworks.com, 2017.
- Reza Matinnejad, Shiva Nejati, Lionel C. Briand, and Thomas Bruckmann. Automated test suite generation for time-continuous simulink models. In Proceedings of the 38th International Conference on Software Engineering - ICSE ’16, pages 595–606, New York, New York, USA, 2016. ACM Press.
- Andreas Naderlinger. Simulating preemptive scheduling with timing-aware blocks in Simulink. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, pages 758–763. IEEE, mar 2017.
- R. Nilsson, J. Offutt, and S.F. Andler. Mutation-based testing criteria for timeliness. In Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004., pages 306–311. IEEE, 2004.
- Robert Nilsson and Jeff Offutt. Automated testing of timeliness: A case study. In Proceedings - International Conference on Software Engineering, 2007.
- C. Norstrom, A. Wall, and Wang Yi. Timed automata as task models for event-driven systems. In Proceedings Sixth International Conference on Real-Time Computing Systems and Applications. RTCSA’99 (Cat. No.PR00306), pages 182–189, 1999.
- Mike Papadakis, Marinos Kintis, Jie Zhang, Yue Jia, Yves Le Traon, and Mark Harman. Mutation testing advances: an analysis and survey. In Advances in Computers, volume 112, pages 275–378. Elsevier, 2019.
- Mike Papadakis, Marinos Kintis, Jie Zhang, Yue Jia, Yves Le Traon, and Mark Harman. Mutation Testing Advances: An Analysis and Survey. Advances in Computers, 112:275–378, jan 2019.
- Chanchal K. Roy and James R. Cordy. A mutation / injection-based automatic framework for evaluating code clone detection tools. In IEEE International Conference on Software Testing, Verification, and Validation Workshops, ICSTW 2009, pages 157–
166, 2009. - Chanchal K. Roy, James R. Cordy, and Rainer Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of Computer Programming, 74(7):470–495, may 2009.
- Julien Schmaltz and Jan Tretmans. On conformance testing for timed systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 5215 LNCS, pages 250–264. Springer, Berlin, Heidelberg, 2008.
- Matthew Stephan. Model clone detector evaluation using mutation analysis. In Proceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014, pages 633–638. Institute of Electrical and Electronics Engineers Inc., dec 2014.
- Matthew Stephan, Manar H. Alafi, Andrew Stevenson, and James R. Cordy. Using mutation analysis for a model-clone detector comparison framework. In Proceedings - International Conference on Software Engineering, pages 1261–1264, 2013.
- Matthew Stephan, Manar H Alalfi, and James R Cordy. Towards a taxonomy for Simulink model mutations. In Proceedings - IEEE 7th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2014, pages 206–215, 2014.
- The AUTOSAR Consortium. Applying simulink to autosar, r3.1., 2006.
- The AUTOSAR Consortium. The AUTOSAR Standard, r4.3., 2018.
- Mark Trakhtenbrot. Implementation-Oriented Mutation Testing of Statechart Models. In 2010 Third International Conference on Software Testing, Verification, and Validation Workshops, pages 120–125. IEEE, apr 2010.
- Muhammad Nouman Zafar, Wasif Afzal, and Eduard Enoiu. Towards a workflow for model-based testing of embedded systems. In Proceedings of the 12th International Workshop on Automating TEST Case Design, Selection, and Evaluation, pages 33–40, 2021.
- Yuan Zhan and John A. Clark. Search-based mutation testing for simulink models. In GECCO 2005 - Genetic and Evolutionary Computation Conference, pages 1061–1068, New York, New York, USA, 2005. ACM Press.
9 The Digital Foundation Platform -- A Multi-layered SOA Architecture for Intelligent Connected Vehicle Operating System
David Yu, Andy Xiao
https://arxiv.org/pdf/2210.08818
References
- Ralf Hannappel, “The impact of global warming on the automotive industry, ” AIP Conference Proceedings 1871, 060001, 2017.
- Glenn Trevor, “Shared Mobility: Consumer Insights and Trends, ” Accessed: Sep. 10, 2021. https://thedigitalmomentum.com/shared-mobility-consumer-insights-and-trends/
- McKinsey & Company, “Automotive revolution—perspective towards 2030: How the convergence of disruptive technology-driven trends could transform the auto industry,” January 2016.
- Chaowei Yang, Qunying Huang, Zhenlong Li, Kai Liu & et al, “Big Data and cloud computing: innovation opportunities and challenges,” International Journal of Digital Earth, vol. 10, no.1, pp 13-53, 2016, DOI: 10.1080/17538947.2016.1239771
- Mahdi Dibaei, Xi Zheng, Kun Jiang and et al., “An Overview of Attacks and Defences on Intelligent Connected Vehicles,” Digital Communications and Networks, vol.6, no.4, pp 399-421 Nov 2020.
- Bagloee, S.A., Tavana, M., Asadi, M. et al. Autonomous vehicles: challenges, opportunities, and future implications for transportation policies. J. Mod. Transport. 24, 284–303, 2016. https://doi.org/10.1007/s40534-016-0117-3
- Zhu, D., Kumar, V., Ravi, V. et al., "Detection method for Cybersecurity attack on Connected vehicles," SAE Technical Paper 2021-01-1249, 2021.
- S. Khurshid, C.S. Păsăreanu, W. Visser, “Generalized symbolic execution for model checking and testing,” International Conference On Tools And Algorithms For the Construction And Analysis Of Systems, Springer, pp. 553-568, 2003
- L. Deng, J. Offutt, P. Ammann, N. Mirzaei, “Mutation operators for testing android apps,” Inf. Software Technol., 81, pp. 154-168, 2017.
- Dipl. -Ing. (FH) Markus Helmling, “Service-oriented Architectures and Ethernet in Vehicles,” Elektronik automotive, magazine Special issue, Automotive Ethernet, March 2017.
- Rumez, Marcel & Grimm, Daniel & Kriesten, Reiner & Sax, Eric, “An Overview of Automotive Service-Oriented Architectures and Implications for Security Countermeasures”. IEEE Access. 8. 10.1109/ACCESS, 2020.
- Seon Sim, Seung Jun Lee, “End-to-End Connectivity Design with Automotive Ethernet & Service-Oriented Architecture,” IEEE-SA Ethernet & IP, London, October, 2018.
- Deloitte, “Software-Defined Vehicles A Forthcoming Industrial
Evolution,” Accessed: Sep. 18, 2021.https://www2.deloitte.com/cn/en/pages/consumer-business/articles/software-defined-cars-industrial-revolution-on-the-arrow.html - J. Bach, S. Otten, and E. Sax, “A taxonomy and systematic approach for automotive system architectures. from functional chains to functional networks,” in Proceedings of the 3rd
International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS2017), Porto, Portugal, April 2017. - M. Traub, A. Maier, and K. L. Barbehon,‘‘Future automotive architecture and the impact of IT trends,’’ IEEE Softw., vol. 34, no. 3, pp. 27–32, May 2017.
- Han, S., He, Y., Ding, Y. , “Enable an Open Software Defined Mobility Ecosystem through VEC-OF,” In 2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C) pp. 229-236, 2020.
17, AUTOSAR. Standards. Accessed: Sep. 18, 2021. [Online]. Available: https://www.autosar.org/standards/ - Häckel, Timo. “Service Classification in Service-Oriented ICT Architectures of Future Vehicles,” Hochschule für Angewandte Wissenschaften Hamburg, 2017.
- Marc Bellanger, Edward Marmounier, “Service Oriented Architecture: impacts and challenges of an architecture paradigm change,” 10th European Congress on Embedded Real Time Software and Systems (ERTS 2020), Toulouse, France. Jan 2020.
- Tsuyoshi Tsumuraya, “The evolution of E/E architecture and Software platform for R-Car/RH850,” Accessed: Sep. 9, 2021. https://www.renesas.com/us/en/blogs/evolution-ee-architecture-and-software-platform-r-carrh850
- Alex Oyler, “Software-defined vehicles foreshadow the union of Silicon Valley & the automotive industry,” https://www.sbdautomotive.com/en/software-defined-vehicles
- LynuxWorks, “low-level & boot-level rootkits revisited,” White Paper, https://www.slideshare.net/aziv69/whitepaper-lynx-secure-rootkit-detection-protection-by-means-of-secure-virtualization, Accessed: Oct.10, 2021.
- Garcia, P., Tiago Gomes, Filipe Salgado, Joao Monteiro, and et al., “Towards Hardware Embedded Virtualization Technology: Architectural Enhancements to an ARM SoC”, ACM SIGBED Review, vol. 11, no. 2, pp 45–47, June 2014, https://doi.org/10.1145/2668138.2668145
- M. Iorio, M. Reineri, F. Risso, R. Sisto and F. Valenza, "Securing SOME/IP for In-Vehicle Service Protection," in IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp.13450-13466, Nov. 2020, doi: 10.1109/TVT.2020.3028880.
- Rolf Johansson, Rikard Andersson, Markus Dernevik, “Enabling Tomorrow’s Road Vehicles by Service-Oriented Platform Patterns,” ERTS 2018, Toulouse, France, Jan 2018.
10 Diagnostic Communication and Visual System based on Vehicle UDS Protocol
Hong Zhang, Ding Li
https://arxiv.org/pdf/2206.12653
REFERENCES
[1]. S. Cheng and K. Mueller, "The Data Context Map: Fusing Data and Attributes into a Unified Display," in IEEE Transactions on Visualization and Computer Graphics, vol. 22, no. 1, pp. 121-130, 31 Jan. 2016, doi:10.1109/TVCG.2015.2467552.
[2]. J. Liu, Z. Wang and L. Zhang, "Integrated Vehicle-Following Control for Four-Wheel-Independent-Drive Electric Vehicles Against Non-Ideal V2X Communication," in IEEE Transactions on Vehicular Technology, vol.71, no. 4, pp. 3648-3659, April 2022, doi:10.1109/TVT.2022.3141732.
[3]. Li, R., Cheng, S., Luo, C. et al. Epidemiological Characteristics and Spatial-Temporal Clusters of Mumps in Shandong Province, China, 2005–2014. Sci Rep 7, 46328 (2017).
[4]. J. Yang, "Key Technologies and Optimization for Dynamic Migration of Virtual Machines in Cloud Computing," 2012 Second International Conference on Intelligent System Design and Engineering Application, 2012, pp. 643-647, doi:10.1109/ISdea.2012.742.
[5]. S. Cheng, W. Xu and K. Mueller, "ColorMapND: A Data-Driven Approach and Tool for Mapping Multivariate Data to Color," in IEEE Transactions on Visualization and Computer Graphics, vol.25, no. 2, pp. 1361-1377, 1 Feb. 2019, doi:10.1109/TVCG.2018.2808489.
[6]. C. Q. Wu, X. Lin, D. Yu, W. Xu and L. Li,"End-to-End Delay Minimization for Scientific Workflows in Clouds under Budget Constraint," in IEEE Transactions on Cloud Computing, vol. 3, no. 2, pp. 169-181, 1 April-June 2015, doi:10.1109/TCC.2014.2358220.
[7]. Shenghui Cheng and K. Mueller, "Improving the fidelity of contextual data layouts using a Generalized Barycentric Coordinates framework," 2015 IEEE Pacific Visualization
July/August 2019 3 Department Head Symposium (PacificVis), 2015, pp. 295-302, doi: 10.1109/PACIFICVIS.2015.7156390.
[8]. Yan X, Zhang N, Cheng S, Wang Z, Qin Y. Gender Differences in Vitamin D Status in
China. Med Sci Monit. 2019;25:7094-7099. Published 2019 Sep 21. doi:10.12659/MSM.916326
[9]. G. K. L. Tam, H. Fang, A. J. Aubrey, P. W. Grant, P. L. Rosin, D. Marshall, and M. Chen. Visualization of time-series data in parameter space for understanding facial
dynamics. Computer Graphics Forum, 30(3):901–910, 2011.
[10]. Cheng, S.; Xu, W.; Mueller, K. RadViz Deluxe: An Attribute-Aware Display for Multivariate Data. Processes 2017, 5, 75. https://doi.org/10.3390/pr5040075
[11]. Zhong, Wen, et al. "Evolutionary visual analysis of deep neural networks." ICML Workshop on Visualization for Deep Learning. 2017.
[12]. S. Cheng, W. Zhong, K. E. Isaacs and K. Mueller, "Visualizing the Topology and Data Traffic of Multi-Dimensional Torus Interconnect Networks," in IEEE Access, vol. 6, pp. 57191-57204, 2018, doi:10.1109/ACCESS.2018.2872344.
[13]. S. Cheng, P. De, S. H. . -C. Jiang and K. Mueller, "TorusVis^ND: Unraveling High-Dimensional Torus Networks for Network Traffic Visualizations," 2014 First Workshop on Visual Performance Analysis, 2014, pp. 9-16, doi: 10.1109/VPA.2014.7.
[14]. S. Cheng, K. Mueller and W. Xu, "A framework to visualize temporal behavioral relationships in streaming multivariate data," 2016 New York Scientific Data Summit (NYSDS), 2016, pp. 1-10, doi:10.1109/NYSDS.2016.7747808.
[15]. Li, M. Q., Xiong, A. M., Cheng, S. H., Huang, W. C., Li, Y. C., & Lin, H. (2004). Effects of process parameters on the microstructure during the hot compression of a TC6 titanium alloy. Rare Metals, 23(3), 263-268.
[16]. Z. Zhang, Z. Jiang, X. Meng, S. Cheng and W. Sun, "Research on prediction method of api based on the enhanced moving average method," 2012 International Conference on Systems and Informatics (ICSAI2012), 2012, pp. 2388-2392, doi:10.1109/ICSAI.2012.6223534.
[17]. S. Cheng, Z. Jiang, Q. Qi, S. Li and X. Meng, "The Polar Parallel Coordinates Method for Time-Series Data Visualization," 2012 Fourth International Conference on Computational and Information Sciences, 2012, pp. 179-182, doi: 10.1109/ICCIS.2012.334.
[18]. Z. Jiang, S. Cheng, X. Meng and Z. Zhang, "Research on time-series data visualization method based on parameterized parallel coordinates and color mapping function," 2012 International Conference on Systems and Informatics (ICSAI2012), 2012, pp. 510-514, doi: 10.1109/ICSAI.2012.6223048.
[19]. S. Cheng et al., "Model-driven visual analytics for big data," 2016 New York Scientific Data Summit (NYSDS), 2016, pp.1-2, doi: 10.1109/NYSDS.2016.7747827.
[20]. S. Garc´ıa and F. Herrera. An extension on “statistical comparisons of classifiers over multiple data sets” for all pairwise comparisons. Journal of Machine Learning Research, 9:2677–2694, 2008.
11 CINNAMON: A Module for AUTOSAR Secure Onboard Communication
Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci
https://arxiv.org/pdf/2111.12026
REFERENCES
[1] Embedded Systems Academy. CANcrypt. https://www.cancrypt.eu/, 2018.
[2] ARM. Arm TrustZone Technology, 2020.
[3] AUTOSAR. Requirements on Secure Onboard Communication, 2019.
[4] AUTOSAR. Specification of Key Manager, 2019.
[5] AUTOSAR. Specification of Secure Onboard Communication AUTOSAR CP R19-11, 2019.
[6] BBC. Hack attacks mounted on car control systems. https://www.bbc.com/news/10119492, 2010.
[7] Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers. The simon and speck families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404, 2013. https://eprint.iacr.org/2013/404.
[8] Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, and Ilaria Matteucci. Are you secure in your car?: poster. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019, pages 308–309. ACM, 2019.
[9] Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, and Ilaria Matteucci. TOUCAN: A protocol to secure controller area network. In Proceedings of the ACM Workshop on Automotive Cybersecurity, AutoSec@CODASPY 2019, Richardson, TX, USA, March 27, 2019, pages 3–8, 2019.
[10] Cinzia Bernardeschi, Marco Di Natale, Gianluca Dini, and Dario Varano. Modeling and generation of secure component communications in AUTOSAR. In Proceedings of the Symposium on Applied Computing, SAC ’17, page 1473–1480, New York, NY, USA, 2017. Association for Computing Machinery.
[11] Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, and Francesco Mercaldo. Driver and Path Detection through Time-Series Classification. Journal of Advanced Transportation, 2018:1–20, 2018.
[12] Charlie Miller Chris Valasek. Adventures in Automotive Networks and Control Units, 2020.
[13] Lucian Constantin. Researchers hack Tesla Model S with remote attack. https://www.pcworld.com/article/3121999/researchers-demonstrate-remote-attack-against-tesla-model-s.html, 2016.
[14] National Instruments Corporation. FlexRay Automotive Communication Bus Overview, 2020.
[15] Gianpiero Costantino and Ilaria Matteucci. CANDY CREAM - hacking infotainment android systems to command instrument cluster via can data frame. In Meikang Qiu, editor, 2019 IEEE International Conference on Computational Science and Engineering, CSE 2019, and IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2019, New York, NY, USA, August 1-3, 2019, pages 476–481. IEEE, 2019.
[16] Luca Dariz, Michele Selvatici, Massimiliano Ruggeri, Gianpiero Costantino, and Fabio Martinelli. Trade-off analysis of safety and security in CAN bus communication. In 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems, MT-ITS 2017, Naples, Italy, June 26-28, 2017, pages 226–231.
IEEE, 2017.
[17] European Data Protection Board. Guidelines 1/2020 on processing personal data in the context of connected vehicles and mobility related applications. https://edpb.europa.eu/sites/edpb/files/consultation/edpb_guidelines_202001_connectedvehicles.pdf, 2020.
[18] Bogdan Groza, Stefan Murvay, Anthony Van Herrewege, and Ingrid Verbauwhede. Libra-can: a lightweight broadcast authentication protocol for controller area networks. In International Conference on Cryptology and Network Security, pages 185–200, Cham, 2012. Springer.
[19] Ahmed Hazem and HA Fahmy. Lcap-a lightweight can authentication protocol for securing in-vehicle networks. In 10th escar Embedded Security in Cars Conference, Berlin, Germany, volume 6, 2012.
[20] International Organization for Standardization. ISO/IEC 11889-1:2015 - Trusted Platform Module library. https://www.iso.org/standard/66510.html, 2015.
[21] International Organization for Standardization. Road vehicles — Controller area network (CAN) — Part 1: Data link layer and physical signalling. https://www.iso.org/standard/63648.html, 2015.
[22] Jeff Crume. OwnStar: Yet another car hack. https://insideinternetsecurity.wordpress.com/2015/08/05/ownstar-yet-another-car-hack/, 2015.
[23] Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada, Naoki Adachi, Yukihiro Miyashita, and Satoshi Horihata. Cacan-centralized authentication system in can (controller area network). In 14th Int. Conf. on Embedded Security in Cars (ESCAR 2014), 2014.
[24] Miro Enev, Alex Takakuwa, Karl Koscher, and Tadayoshi Kohno. Automobile Driver Fingerprinting. https://petsymposium.org/2016/files/papers/Automobile Driver Fingerprinting.pdf, 2016.
[25] Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, and Ingrid Verbauwhede. Chaskey: An efficient mac algorithm for 32-bit microcontrollers. In Antoine Joux and Amr Youssef, editors, Selected Areas in Cryptography – SAC 2014, pages 306–323, Cham, 2014. Springer International Publishing.
[26] O.Hartkopp, C. Reuber, and R.Schilling. Macan message authenticated can. 2012.
[27] Andreea-Ina Radu and Flavio D. Garcia. Leia: A lightweight authentication protocol for can. In Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, and Catherine Meadows, editors, Computer Security – ESORICS 2016, pages 283–300, Cham, 2016. Springer International Publishing.
[28] European Union. General Data Protection Regulation(EU Regulation 2016/679). https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL, 2016.
[29] Chris Valasek and Charlie Miller. Remote Exploitation of an Unaltered Passenger Vehicle. http://illmatics.com/Remote%20Car%20Hacking. pdf, 2015.
[30] Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. Canauth-a simple, backward compatible broadcast authentication protocol for can bus. In ECRYPT Workshop on Lightweight Cryptography. Vol. 2011., 2011.
[31] Serge Vaudenay. Security flaws induced by cbc padding — applications to ssl, ipsec, wtls... In Lars R. Knudsen, editor, Advances in Cryptology — EUROCRYPT 2002, pages 534–545, Berlin, Heidelberg, 2002. Springer Berlin Heidelberg.
[32] Vector. Solutions for Automotive Ethernet. https://www.vector.com/int/en/know-how/technologies/networks/automotive-ethernet/, 2020.
[33] Xuhang Ying, Giuseppe Bernieri, Mauro Conti, and Radha Poovendran. TACAN: transmitter authentication through covert channels in controller area networks. CoRR, abs/1903.05231, 2019.
[34] Artem Yushev, Mohammed Barghash, Minh Phuong Nguyen, Andreas Walz, and Axel Sikora. Tls-over-can: An experimental study of internet-grade end-to-end communication security for can networks. IFAC- PapersOnLine, 51(6):96 – 101, 2018. 15th IFAC Conference on Programmable Devices and Embedded Systems PDeS 2018.
[35] Tobias Ziermann, Stefan Wildermann, and J¨ urgen Teich. Can+: A new backward-compatible controller area network (can) protocol with up to16x higher data rates. In Proceedings of the Conference on Design, Automation and Test in Europe, pages 1088–1093. European Design and Automation Association, 2009.
12 TOUCAN: A proTocol tO secUre Controller Area Network
Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci
https://arxiv.org/pdf/2111.10642
REFERENCES
[1] [n. d.]. Birthday Attack. https://en.wikipedia.org/wiki/Birthday_attack
[2] [n. d.]. eCall in all new cars from April 2018. https://ec.europa.eu/digital-single-market/en/news/ecall-all-new-cars-april-2018
[3] ISO 15765-2:2016. [n. d.]. Road vehicles – Diagnostic communication over Controller Area Network (DoCAN) – Part 2: Transport protocol and network layer services. https://www.iso.org/standard/66574.html
[4] AUTOSAR. [n. d.]. “Specification of Module Secure Onboard Communication - AUTOSAR Release 4.2.2.”. https://www.autosar.org/fileadmin/user_upload/standards/classic/4-2/AUTOSAR_SWS_SecureOnboardCommunication.pdf
[5] AUTOSAR. [n. d.]. “Specification of Secure Onboard Communication - AUTOSAR CP Release 4.3.1”. https://www.autosar.org/standards/classic-platform/classic-platform-431/
[6] Alessandro Bruni, Michal Sojka, Flemming Nielson, and Hanne Riis Nielson. 2014. Formal Security Analysis of the MaCAN Protocol. In Integrated Formal Methods, Elvira Albert and Emil Sekerinski (Eds.). Springer International Publishing, Cham, 241–255.
[7] Charlie Miller Chris Valasek. 2014. Adventures in Automotive Networks and Control Units. http://illmatics.com/car_hacking.pdf.
[8] Luca Dariz, Gianpiero Costantino, Massimiliano Ruggeri, and Fabio Martinelli. 2018. A Joint Safety and Security Analysis of message protection for CAN bus protocol. Advances in Science, Technology and Engineering Systems Journal 3, 1 (2018), 384–393. https://doi.org/10.25046/aj030147
[9] Luca Dariz, Michele Selvatici, Massimiliano Ruggeri, Gianpiero Costantino, and Fabio Martinelli. 2017. Trade-Off Analysis of Safety and Security in CAN bus communication. In The 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS 2017).
[10] M. Dworkin. 2005. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38B.
[11] Eric Evenchick. 2015. Hopping On the CAN Bus - Automotive Security and the CANard Toolkit. In Black Hat Asia (Last Access: 27/12/2018). https://www.blackhat.com/docs/asia-15/materials/asia-15-Evenchick-Hopping-On-The-Can-Bus.pdf
[12] B. Groza and P. Murvay. 2018. Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks. IEEE Vehicular Technology Magazine 13, 1 (March 2018), 40–47. https://doi.org/10.1109/MVT.2017.2736344
[13] Bogdan Groza, Stefan Murvay, Anthony Van Herrewege, and Ingrid Verbauwhede. 2012. Libra-can: a lightweight broadcast authentication protocol for controller area networks. In International Conference on Cryptology and Network Security. Springer, 185–200.
[14] Ahmed Hazem and HA Fahmy. 2012. Lcap-a lightweight can authentication protocol for securing in-vehicle networks. In 10th escar Embedded Security in Cars Conference, Berlin, Germany, Vol. 6.
[15] International Organization for Standardization. 2015. Road vehicles — Controller area network (CAN) — Part 1: Data link layer and physical signalling. https://www.iso.org/standard/63648.html.
[16] Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada, Naoki Adachi, Yukihiro Miyashita, and Satoshi Horihata. 2014. CaCAN-centralized authentication system in CAN (controller area network). In 14th Int. Conf. on Embedded Security in Cars (ESCAR 2014).
[17] Chung-Wei Lin and Alberto Sangiovanni-Vincentelli. 2012. Cyber-security for the Controller Area Network (CAN) communication protocol. In Cyber Security (CyberSecurity), 2012 International Conference on. IEEE, 1–7.
[18] Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, and Ingrid Verbauwhede. 2014. Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers. In Selected Areas in Cryptography – SAC 2014, Antoine Joux and Amr Youssef (Eds.). Springer International Publishing, Cham, 306–323.
[19] Andreas Mueller, Timo Lothspeich, and Robert Bosch. 2015. Plug-and-Secure Communication for CAN. In CAN Newsletter.
[20] Odzhan. 2018. Chaskey Cripto Lib. https://github.com/odzhan/tinycrypt/tree/master/mac/chaskey.
[21] C. Reuber O.Hartkopp and R.Schilling. [n. d.]. "MaCAN-message authenticated CAN", Proc. 10th Int. Conf. Embedded Security in Cars (ESCAR) (Ed.).
[22] Andreea-Ina Radu and Flavio D. Garcia. 2016. LeiA: A Lightweight Authentication Protocol for CAN. In Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II. 283–300. https://doi.org/10.1007/978-3-319-45741-3_15
[23] D. Stabili, L. Ferretti, and M. Marchetti. 2018. Analyses of Secure Automotive Communication Protocols and Their Impact on Vehicles Life-Cycle. In 2018 IEEE International Conference on Smart Computing (SMARTCOMP). 452–457. https://doi.org/10.1109/SMARTCOMP.2018.00045
[24] STMicroelectronics. [n. d.]. X-CUBE-CRYPTOLIB. https://www.st.com/en/embedded-software/x-cube-cryptolib.html
[25] STMicroelectronics. 2018. STM32CubeMX. https://www.st.com/en/development-tools/stm32cubemx.html.
[26] Pedro Umbelino. [n. d.]. OBD-II DONGLE ATTACK: STOPPING A MOVING CAR VIA BLUETOOTH. https://hackaday.com/2017/04/14/obd-ii-dongle-attack-stopping-a-moving-car-via-bluetooth/
[27] Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. 2011. CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In ECRYPT Workshop on Lightweight Cryptography. Vol. 2011.
[28] Tobias Ziermann, Stefan Wildermann, and Jürgen Teich. 2009. CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16x higher data rates. In Proceedings of the Conference on Design, Automation and Test in Europe. European Design and Automation Association, 1088–1093. A A PRIMER ON THE CAN BUS CAN frames are standardised as ISO 11898-1:2015 [15] to contain various fields, as pictured in Figure 4, and described below. • Start Of Frame (SOF) is a dominant bit indicating the beginning of a frame. • Arbitration field consists in: Identifier, 11 bits, to signify the priority of the message, with a lower value indicating higher priority, and Remote Transmission Request (RTR), 1 bit, which is low for a Data Frame and high for a Remote Frame (one whose Data Field is empty). • Control field, includes the IDE field, 1 bit, to identify whether the payload is of standard length, then r0, 1 bit, reserved for later use, and the Data Length Code (DLC) field, 4 bits, indicating the length of the Data Field. • Data spans over up to 64 bits of data, and carries the payload of the frame. • CRC, 15 bits, is for a cyclic redundancy check code and a recessive bit as a delimiter. • Ack, 2 bits, with the first one being recessive, hence overwritten with a dominant bit by every node that receives it, and the second bit working as a delimiter. • EOF, 7 bits, all recessive, indicates the end-of-frame. • IFS, 7 bits, indicates the time for the controller to move a correct frame into the buffer. The mapping between the messages in the payload and the vehicles functionality is up to the car manufacturer and are normally kept confidential. Each mapping enables the ECUs of a specific vehicle to correctly interpret the messages and translate them into signals that carry out the expected functionality.
13 Comparison between autosar platforms with functional safety for automotive software architectures
Youssef Elkharaz, Saad Motahhir, Abdelaziz Elghzizal
https://arxiv.org/pdf/2109.00099
REFERENCES
- Atlidakis, V., Andrus, J., Geambasu, R., Mitropoulos, D., Nieh, J., 2016. POSIX abstractions in modern operating systems: the old, the new, and the missing, in: Proceedings of the Eleventh European Conference on Computer Systems. Presented at the EuroSys ’16: Eleventh EuroSys Conference 2016, ACM, London United Kingdom, pp. 1–17. https://doi.org/10.1145/2901318.2901350
- Bunzel, S., 2011. AUTOSAR – the Standardized Software Architecture. Inform.-Spektrum 34, 79–83. https://doi.org/10.1007/s00287-010-0506-7
- Choi, D.-K., Jung, J.-H., koh, S.-J., Kim, J.-I., Park, J., 2019. In-Vehicle Infotainment Management System in Internet-of-Things Networks, in: 2019 International Conference on Information Networking (ICOIN). Presented at the 2019 International Conference on Information Networking (ICOIN), IEEE, Kuala Lumpur, Malaysia, pp. 88–92. https://doi.org/10.1109/ICOIN.2019.8718192
- Foundation Release Overview, n.d. 26.
- Furst and Bechter - 2016 - AUTOSAR for Connected and Autonomous Vehicles The.pdf, n.d.
- Gopu, G.L., Kavitha, K.V., Joy, J., 2016. Service Oriented Architecture based connectivity of automotive ECUs, in: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT). Presented at the 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), IEEE, Nagercoil, India, pp. 1–4. https://doi.org/10.1109/ICCPCT.2016.7530358
- Hussain, R., Zeadally, S., 2019. Autonomous Cars: Research Results, Issues, and Future Challenges. IEEE Commun. Surv. Tutor. 21, 1275–1313. https://doi.org/10.1109/COMST.2018.2869360
- Huszak, G., Morita, H., 2019. On the 10BASE-T1S preamble for multidrop, in: 2019 Global Information Infrastructure and Networking Symposium (GIIS). Presented at the 2019 Global Information Infrastructure and Networking Symposium (GIIS), IEEE, Paris, France, pp. 1–6. https://doi.org/10.1109/GIIS48668.2019.9044963
- ISO - Standards [WWW Document], n.d. . ISO. URL https://www.iso.org/standards.html (accessed7.26.21).
- ISO 26262-1:2018(en), Road vehicles — Functional safety — Part 1: Vocabulary [WWW Document], n.d. URL https://www.iso.org/obp/ui/#iso:std:iso:26262
ed-2:v1:en (accessed 7.27.21).
- Kassakian, J.G., Perreault, D.J., 2001. The future of electronics in automobiles, in: Proceedings of the 13th International Symposium on Power Semiconductor Devices & ICs. IPSD ’01 (IEEE Cat. No.01CH37216). Presented at the 13th International Symposium on Power Semiconductor Devices & ICs. IPSD ’01, Inst. Electr. Eng. Japan, Osaka, Japan, pp. 15–19. https://doi.org/10.1109/ISPSD.2001.934550
- Schafer, J., Klein, D., 2013. Implementing Situation Awareness for Car-to-X Applications Using Domain Specific Languages, in: 2013 IEEE 77th Vehicular Technology Conference (VTC Spring). Presented at the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), IEEE, Dresden, Germany, pp. 1–5. https://doi.org/10.1109/VTCSpring.2013.6692589
- Specification of UDP Network Management, n.d. 103.
- Xie, G., Li, Y., Han, Y., Xie, Y., Zeng, G., Li, R., 2020. Recent Advances and Future Trends for Automotive Functional Safety Design Methodologies. IEEE Trans. Ind. Inform. 16, 5629–5642. https://doi.org/10.1109/TII.2020.2978889
14 FMCW SAR with New Synthesis Method Based on A-SPC Technique
Junhyeong Park, Dae-Hwan Jung, Seong-Ook Park
https://arxiv.org/pdf/2009.14415
REFERENCES
[1] D. Jung and S.-O. Park, "Ku-band car-borne FMCW stripmap synthetic aperture radar," in Proc. 2019 Int. Symp. Antennas Propag., Phuket, Thailand, Oct. 2017, pp. 1-2.
[2] C. Esposito, A. Natale, P. Berardino, G. Palmese, R. Lanari and S. Perna, "AXIS: an airborne X-band interferometric FMCW SAR system,” in Proc. IEEE Int. Geosci. Remote Sensing Symp., Valencia, Spain, Jul. 2018, pp. 5697-5699.
[3] E. Schreiber, A. Heinzel, M. Peichl, M. Engel and W. Wiesbeck, “Advanced buried object detection by multichannel, UAV/Drone carried synthetic aperture radar,” in 13th Eur. Conf. Antennas Propag., Krakow, Poland, Apr. 2019, pp. 1-5.
[4] D. Jung, H. Kang, C. Kim, J. Park and S.-O. Park, "Sparse scene recovery for high-resolution automobile FMCW SAR via scaled compressed sensing," in IEEE Trans. Geosci. Remote Sens., vol. 57, no. 12, pp.10136-10146, Dec. 2019.
[5] D. Jung, D. Kim, M. T. Azim, J. Park and S. Park, "A novel signal processing technique for Ku-band automobile FMCW fully polarimetric SAR system using triangular LFM," IEEE Trans. Instrum. Meas., Early Access, pp. 1-10, Jul. 2020.
[6] J. Park, S. Park, D.-H Kim, and S.-O. Park, "Leakage mitigation in heterodyne FMCW radar for small drone detection with stationary point concentration technique," IEEE Trans. Microw. Theory and Techn., vol. 67, no. 3, pp. 1221-1232, Mar. 2019.
[7] J. Park, K.-B. Bae, D.-H. Jung, and S.-O. Park, "Micro-drone detection with FMCW radar based on stationary point concentration technique," in Proc. 2019 Int. Symp. Antennas Propag., Xi'an, China, Oct. 2019, pp. 1-3.
[8] J. Park, D.-H. Jung, K.-B. Bae, and S.-O. Park, "Range-Doppler map improvement in FMCW radar for small moving drone detection using the stationary point concentration technique," IEEE Trans. Microw. Theory and Techn., vol. 68, no. 5, pp. 1858-1871, May 2020.
[9] J. Park, J. -S. Park, K.-B. Bae, and S.-O. Park, "Advanced stationary point concentration technique for leakage mitigation and small drone detection with FMCW radar," submitted for publication in IEEE. [Online]. Available: https://arxiv.org/abs/2007.06880
15 Achieving Determinism in Adaptive AUTOSAR
Christian Menard, Andres Goens, Marten Lohstroh, Jeronimo Castrillon
https://arxiv.org/pdf/1912.01367
REFERENCES
[1] E. A. Lee, “The problem with threads,” Computer, vol. 39, no. 5, pp. 33–42, May 2006.
[2] N. Halbwachs, P. Caspi, P. Raymond, and D. Pilaud, “The synchronous data flow programming language LUSTRE,” Proceedings of the IEEE, vol. 79, no. 9, pp. 1305–1320, 1991.
[3] G. Berry and G. Gonthier, “The Esterel synchronous programming language: Design, semantics, implementation,” Science of computer programming, vol. 19, no. 2, pp. 87–152, 1992.
[4] G. Berry, “SCADE: Synchronous design and validation of embedded control software,” in Next Generation Design and Verification Methodologies for Distributed Embedded Control Systems, S. Ramesh and P. Sampath, Eds., Dordrecht: Springer Netherlands, 2007, pp. 19–33.
[5] J.-L. Boulanger, F.-X. Fornari, J.-L. Camus, and B. Dion, SCADE: Language and applications, 1st. Wiley-IEEE Press, 2015.
[6] C. M. Kirsch and A. Sokolova, “The logical execution time paradigm,” in Advances in Real-Time Systems, S. Chakraborty and J. Ebersp¨ acher, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 103–120.
[7] AUTOSAR, “Specification of timing extensions,” AUTOSAR CP Release 4.4.0, Oct. 2018.
[8] A. Biondi and M. Di Natale, “Achieving predictable multicore execution of automotive applications using the LET paradigm,” in 2018 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), Apr. 2018, pp. 240–250.
[9] AUTOSAR, “Specification of communication management,” AUTOSAR AP Release 19-03, Mar. 2019.
[10] M. Lohstroh, M. Schoeberl, A. Goens, et al., “Actors revisited for time-critical systems,” in Proceedings of the 56th Annual Design Automation Conference 2019, ser. DAC ’19, Las Vegas, NV, USA: ACM, 2019, 152:1–152:4.
[11] AUTOSAR, “SOME/IP protocol specification,” AUTOSAR FO Release 1.5.0, Oct. 2018.
[12] ——, “SOME/IP service discovery protocol specification,” AUTOSAR FO Release 1.5.0, Oct. 2018.
[13] R. Gu, G. Jin, L. Song, L. Zhu, and S. Lu, “What change history tells us about thread synchronization,” in Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ser. ESEC/FSE 2015, Bergamo, Italy: ACM, 2015, pp. 426–438.
[14] AUTOSAR, “Specification of execution management,” AUTOSAR AP Release 19-03, Mar. 2019.
[15] C. Hewitt, “Viewing control structures as patterns of passing messages,” Artificial intelligence, vol. 8, no. 3, pp. 323–364, 1977.
[16] G. A. Agha, “Actors: A model of concurrent computation in distributed systems,” MIT Artificial Intelligence Lab, Tech. Rep., 1985.
[17] M. Lohstroh and E. A. Lee, “Deterministic actors,” in 2019 Forum on Specification and Design Languages (FDL), IEEE, 2019.
[18] M. Lohstroh, I. Incer Romeo, A. Goens, et al., “Reactors: A determin- istic model for composable reactive systems,” in Model-Based Design of Cyber Physical Systems (CyPhy’19), 2019, To appear.
[19] Y. Zhao, J. Liu, and E. A. Lee, “A programming model for time- synchronized distributed real-time systems,” in 13th IEEE Real Time and Embedded Technology and Applications Symposium (RTAS’07), Apr. 2007, pp. 259–268.
[20] P. Derler, T. H. Feng, E. A. Lee, et al., “PTIDES: A programming model for distributed real-time embedded systems,” EECS Department, University of California, Berkeley, Tech. Rep., May 2008.
[21] AUTOSAR, “Specification of time synchronization for adaptive platform,” AUTOSAR AP Release 19-03, Mar. 2019.
[22] R. Ernst, L. K¨ ohler, and K.-B. Gemlau, “System level LET: Mastering cause-effect chains in distributed systems,” in 44th Annual Conference of the IEEE Industrial Electronics Society (IECON), Oct. 2018.
16 Modelling of Autosar Libraries for Large Scale Testing
Authors: Wojciech Mostowski, Thomas Arts, John Hughes
https://arxiv.org/pdf/1703.06574
References
[1] T. Arts & J. Hughes (2016): How Well are Your Requirements Tested? In: 2016 IEEE International Conference on Software Testing, Verification and Validation, pp. 244–254, doi:10.1109/ICST.2016.23.
[2] T. Arts, J. Hughes, J. Johansson & U. Wiger (2006): Testing telecoms software with QuviQ QuickCheck. In: Proceedings of ERLANG’06, ACM, pp. 2–10, doi:10.1145/1159789.1159792.
[3] T. Arts, J. Hughes, U. Norell & H. Svensson (2015): Testing AUTOSAR software with QuickCheck. In: Eighth IEEE International Conference on Software Testing, Verification and Validation Workshops, pp. 1–4, doi:10.1109/ICSTW.2015.7107466.
[4] T. Arts & M.R. Mousavi (2015): Automatic Consequence Analysis of Automotive Standards (AUTO-CAAS). In: First International Workshop on Automotive Software Architectures (WASA 2015), ACM Press, pp.35–38, doi:10.1145/2752489.2752495.
[5] AUTOSAR Consortium (2013): AUTomotive Open System ARchitecture, standard documents. https://autosar.org/.
[6] AUTOSAR Consortium (2014): Acceptance Test Specification of Communication on CAN bus – Release 1.0.0.
[7] F. Cesarini & S. Thompson (2009): Erlang Programming. O’Reilly.
[8] J. Hughes (2007): QuickCheck testing for fun and profit. In: Proceedings of PADL’07, Springer, pp. 1–32, doi:10.1007/978-3-540-69611-7 1.
[9] S. Kunze, W. Mostowski, M.R. Mousavi & M. Varshosaz (2016): Generation of Failure Models through Automata Learning. In: Second International Workshop on Automotive Software Architectures (WASA 2016), IEEE Society, pp. 22–25, doi:10.1109/WASA.2016.7.
[10] J. Svenningsson, H. Svensson, N. Smallbone, T. Arts, U. Norell & J. Hughes (2014): An Expressive Semantics of Mocking. In: Fundamental Approaches to Software Engineering, LNCS 8411, Springer, pp. 385–399, doi:10.1007/978-3-642-54804-8 27.
[11] J. Tretmans (2011): Model-Based Testing and Some Steps towards Test-Based Modelling. In: Formal Methods for Eternal Networked Software Systems, LNCS 6659, Springer, pp. 297–326, doi:10.1007/978-3-642-21455-4 9.
Reference
Strategy to some summary and propose.
https://qiita.com/kaizen_nagoya/items/d36a9eba629022276918