IEEE Design&Test Vol. 36, Issue 6

  • Speaker:
    Secure Automotive Systems
  • Location:

    IEEE Explorer

  • Date: November/December
Design & Test

Volume 36, Issue 6 (November/December)

Special Issue on "Secure Automotive Systems"
General Interest by Shu-Feng Cheng ; Po-Tsang Huang ; Li-Chun Wang ; Mau-Chung Frank Chang "Built-In Self-Test/Repair Methodology for Multiband RF-Interconnected TSV 3D Integration"
General Interest Paper by Mohammed Shayan ; Kanad Basu ; Ramesh Karri "Hardware Trojans Inspired IP Watermarks"

November/December 2019 Content

From the EIC
Secure Automotive Systems
  View full article (PDF).

Special Issue on Secure Automotive Systems
Guest Editors’ Introduction: Secure Automotive Systems
  Modern and Emergent automotive systems are highly complex, dominated by a large number of integrated electronics and software components. The electronic and software components include a diversity of device functionality, ranging across infotainment, driver assistance, radio, and wireless communication. read more.
View full article (PDF).
Lessons learned from hacking a car
  Rapid error discovery is crucial for timely correction mechanisms and reliable router systems. Aiming to achieve a high degree of reliability, this article presents a machine-learning framework for analyzing router time series to evaluate the health status and detect anomalies while accounting for the important temporal characteristics of complex communication systems. read more.
View full article (PDF).
PortLoc: A Portable Data-Driven Indoor Localization Framework for Smartphones
  In 2015, Miller and Valasek demonstrated one of the most celebrated hacks on automotive systems, when they managed to remotely compromise a 2014 Jeep Cherokee. They showed how to exploit a vulnerability in head unit to control the physical aspects of the driving subsystem, including steering and more.
View full article (PDF).
Randomization for Safer, more Reliable and Secure, High-Performance Automotive Processors
  This article presents a future computing platform for automotive systems, where randomization will be introduced in the nonfunctional behavior of certain hardware components. By doing so, besides ensuring the higher performance of the processors, it will enhance the security of the complex processors, provide time predictability via probabilistic analysis, and finally, enhance reliability against aging and voltage noise. read more.
View full article (PDF).
Survey of Automotive Controller Area Network Intrusion Detection Systems
  Editor’s note: Control Area Network (CAN) is one of the most popular targets for malicious attacks and exploitations in modern automotive systems. The goal of intrusion detection systems (IDS) is to identify and mitigate security attacks; consequently, they are of paramount importance to automotive security. read more
View full article (PDF).
Pass and Run: A Privacy Preserving Delay Tolerant Network Communication Protocol for CyberVehicles
  Editor’s note: In the era of intelligent transportation systems (ITS) due to vehicle-to-infrastructure (V2I) communication, data sent to roadside units (RSUs) can leak sensitive information of the vehicle such as driving patterns and history, and therefore may seriously violate privacy requirements. To address this very important research challenge, this article presents a Pass and Run protocol for the vehicular delay tolerant network (VDTN). read more
View full article (PDF).

General Interest Papers
Built-In Self-Test/Repair Methodology for Multiband RF-Interconnected TSV 3D Integration
  Editor’s note: Multiband radio-frequency interconnect (MRFI) is an emerging technology to achieve low-latency and energy-efficient on-chip communication. This article proposes a BIST method to improve the reliability of MRFI-based design read more
View full article (PDF).
Hardware Trojans Inspired IP Watermarks
  Editor’s note: Hardware watermarking (HW) is supposed to protect the authenticity of HW intellectual properties (IPs) but face the dual challenge of high overhead and ease of removal. HW Trojans are designed to overcome those same challenges for a very different purpose. In this article, the authors propose an ingenious watermarking methodology inspired by HW Trojans for efficiently and effectively protecting the authenticity of HW IPs. read more
View full article (PDF).
56th Design Automation Conference Report
  View full article (PDF).
Conference Report from the 2019 International Symposium on Low Power Electronics and Design (ISLPED)
  View full article (PDF).
Report of the Fourth International Workshop on Design Automation for Cyber-Physical Systems (DACPS) 2019
  View full article (PDF).
The Last Byte: Baseball and Testing
  View full article (PDF).