Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267
0

Embedded World 2022 – June 21-23 – Virtual Schedule | #linux | #linuxsecurity | #hacking | #aihp


Embedded World 2020 was a lonely affair with many companies canceling attendance due to COVID-19, and Embedded World 2021 took place online only. But Embedded World is back to Nuremberg, Germany in 2022 albeit with the event moved from the traditional month of February to June 21-23.

Embedded systems companies and those that service them will showcase their latest solution at their respective booths, and there will be a conference with talks and classes during the three-day event. The programme is up, so I made my own little Embedded World 2022 virtual schedule as there may be a few things to learn, even though I won’t be attending.

Tuesday, June 21, 2022

  • 10:00 – 13:00 – Rust, a Safe Language for Low-level Programming

Rust is a relatively new language in the area of systems and low-level programming. Its main goals are performance, correctness, safety, and productivity. While still ~70% of all severe vulnerabilities are caused by memory bugs, Rust offers 100% memory safety (no segfaults or buffer overflows) and is 100% safe against data races. These guarantees are enforced by a static type system with ownership types and borrowing. Further, Rust provides several features better known from high-level languages: immutability, algebraic data types, pattern matching, traits, and closures. The features are provided as zero-cost abstractions, so the performance of Rust is comparable with C or C++. The language is gaining more and more popularity, and big software companies are adopting the language. This half-day tutorial starts with an introductory talk explaining the main concepts behind Rust. After the talk, participants will gain practical experience in Rust through various exercises.

  • 13:00 – 13:30 – Do it yourself PCB antennas for NeoMesh, NB-IoT, LTE-M, LoRaWAN, Mioty, and other SubGHz technologies

If you want to develop a wireless IoT device, you need to choose a good antenna. Antenna datasheets are full of a lot of technical data that is often not fully known to the IoT developer. With this presentation, we will shed some light on the darkness of antennas.

Most developers look at the return loss of the antenna when making their selection. This is correct in the first step. A matching network of many passive components should make you skeptical. Each additional component also means more losses in the matching network. The self-constructed PCB antennas in our presentation do not need a matching network at all and therefore have no losses in the network and a very high radiated power. The ratio between the injected power and the radiated power is called the antenna efficiency.

The second step should be to look at the efficiency in dB or as a percentage of the average value. Here already lies the first pitfall. In some datasheets, the average value of the total peak frequencies in all directions is given in 3D. Somewhere in the spatial observation compared to the isotropic omnidirectional radiator, a peak value is found. All peak values are then averaged and referred to as the average value. The average value of the peak values is impressively large compared to the other manufacturers who also name an average value. They call the technically correct average value. So the wrong average value leads to the wrong choice of antenna.

Sub-topics of the presentation:

  1. Errors in three known PCB antenna layouts
  2. Return loss
  3. Efficiency of the antenna
  4. Antenna gain
  5. 3D radiation patterns of antennas
  6. 2D radiation patterns of antennas
  7. The better PCB antennas
  8. Summary of decision making for antennas

Self-built PCB antennas are often technically better, have 0 days delivery time, 0 cost in purchasing, 0 cost in BOM, 0 cost in matching network and never end of life. How every IoT developer gets his 0 USD PCB antenna is explained in the presentation and supported by the 80-page DIN A4 study “Low-cost PCB antennas for the wireless IoT“.

  • 13:45 – 15:30 – RISC-V & Linux
    1. Can Open Source (RISC-V & Linux) Drive the Autonomous Car Revolution?The automotive industry is under a big transition from hundreds of small ECU’s to a centralized compute architecture. Can RISC-V and Linux take a part in this automotive revolution? Open source has the benefit of an ecosystem that improves the quality, on one hand, while on the other hand, it does not necessarily follow the automotive development flow. In this talk, we will present how this challenge can be addressed successfully. We will discuss the ELISA (Enabling Linux in Safety Applications) approach for safe Linux, when ELIZA is an organization that includes Automotive companies like BMW, Toyota, Suzuki, just to name a few. The goal of ELISA is to enable the usage of Linux in safety-critical applications, like Advanced Driver Assistance Systems (ADAS) and Autonomous Vehicles (AV).
    2. Building Linux Distributions and Applications for RISC-V SystemsThe Yocto Project and OpenEmbedded have been building custom Linux Distributions since 2003. Over this time, the project learned how to effectively support targeting software stacks to new hardware. This talk covers building Linux distributions for GNU Radio applications and how to support a complex software stack across many machines. The Yocto Project is designed to divide the process for building Linux distributions into three parts; the machine or board support package, the distribution policies, and the application-specific code. The talk describes how to build an image with GNU Radio installed and run the packaged test suite.
    3. Creating a RISC-V Linux Distribution With the Yocto ProjectThis session will show you the Yocto Project, one of the most widely used platforms for creating a custom Linux system. To give you a hands-down impression of what this means in real life, Josef will build and boot for RISC-V from source while providing a live show and tell about the underlying technology and its ins and outs – and why you might want your own custom Linux soon.
  • 15:30 – 16:00 – MATTER, Bluetooth LE, Zigbee, and Thread: how can ST’s connectivity solutions support these evolving standards?

No abstract

  • 16:00 – 17:45 – Embedded Vision Implementations
    1. Real-Time Motion Tracking for Augmented Reality with TOF Camera and Vulkan RenderingThis paper describes a new concept for motion tracking in augmented reality systems using new approaches from an actual research project at ZHAW-InES. Motion tracking and the resulting recalculation of the representation of virtual objects is the key function of augmented reality systems. One of the innovations described in this paper is the sensor fusion of a Time of Flight (TOF) camera to spatially capture the environment in conjunction with a standard color camera to compute the 3D representation. The final 3D output is then generated using the open standard Vulkan low-overhead, cross-platform rendering API. Motion processing is based on the angular velocity and translation extraction using the Nvidia CUDA SIFT (Scale invariant feature transform) library. The extracted angular velocity is then fused with IMU (Inertial Motion Unit) data using a Kalman filter for the sensor fusion. The presentation also briefly discusses the hardware architecture, which is based on the NVIDIA Jetson AGX.
    2. Real-time Image Signal Processor for SoC/FPGA With Direct GPU CommunicationMany real-time computer image processing applications, e.g., autonomous driving or machine control, need large processing power but also require little space and power consumption. The preprocessing of video data (demosaic, convolutional filtering, statistics, noise shaping, etc.), which is normally done in a GPU/CPU, is a major part and consumes a lot of resources. The Institute of Embedded Systems of ZHAW developed an Image Signal Processor (ISP), which takes care of demosaicing the raw camera data and has automatic white balancing, automatic exposure time, configurable convolution filtering, image sharpening, color space conversion, gamma correction, collecting statistic data, etc. The output of the video processing is fed directly into the GPU via a newly developed frame-based DMA (FDMA), avoiding the delay that would otherwise be introduced by the processor’s video pipeline. The ISP consists of a pipeline of multiple video processing functions that process the raw camera data without CPU involvement. The ISP operates independently. Camera data can be fed into the ISP via MIPI-CSI. In addition to a detailed discussion of the modular ISP, we also discuss the frame base DMA (FDMA) method, which allows data to be fed directly into the GPU via PCI-e without CPU involvement. The implementation can be demonstrated on a specially designed video capture card with six camera interfaces.
    3. Implementing Low Power Smart Vision in Industrial SystemsIndustrial OEMs are steadily increasing the deployment of embedded machine vision technology such as defect detection, object or person detection, and object identification/counting to enable increased quality, productivity and safety in smart factories and warehouses. These systems often need to be deployed in challenging environments requiring compact, low power, high-performance designs able to address tight spacing and significant thermal management issues. Additionally, many designs require bridging or adaptation to accommodate differences in the number or type of sensor interfaces and key machine vision system components. Low power FPGAs are ideal for enabling adaptable and high-performance vision systems to meet today’s challenges, offering support for a wide range of legacy and emerging sensor interface and transmission technologies as well as high-performance image processing and analytics. This presentation arms developers with the latest market trends and solutions to technical challenges faced when designing state-of-the-art embedded vision systems.
  • 18:00 – 19:00 – Security
    1. Protecting Industrial Systems Against Sophisticated AttacksIn recent years, industrial systems have become favorite targets for attacks ranging from DDoS, ransomware, and worms to sophisticated nation-state operations. At the same time, business initiatives like predictive maintenance and Industrial IoT are driving greater connectivity between Operational Technology (OT) and the outside world. Owner-operators and systems integrators must square the circle: making OT smart without making it vulnerable. Fortunately, domain experts have been working in standards groups for years to develop best practices and standard technologies for OT security. Recently, TCG published a document titled “TCG Guidance for Securing Industrial Control Systems.” The document lays out 22 common industrial security use cases and explains how to address them.
    2. Plan for Systems to be CompromisedThere is a lot written about cybersecurity on embedded systems, often focusing on a pipeline, a car, or a piece of critical industrial infrastructure that has been compromised. Many (hopefully all) are focused on improving the immunity of connected systems to being hacked. Initiatives like Arm’s Platform Security Architecture have been immensely helpful in raising awareness of the challenge and proposing solutions. This talk will cover:

       

      • Increasing the focus on early identification of an attack happening, using ML algorithms that learn normal system behavior
      • Architecting systems to return to a known good state
  • 19:00 – 20:00 – IoT Issues
    1. Embedded IoT Security – The Right Solution for the Right ProblemEmbedded product manufacturers are increasingly aware of the need for security for devices connected to the IoT, but “security” means different things for different products and different device types. Various security solutions are available, so how do you know which one to select? In a cost-competitive market where time-to-market is critical, it is vital to choose wisely and get it right the first time. This session will discuss some common security concerns for embedded IoT products and how to select the appropriate solution to address them.
    2. The Edge-Cloud Symbiosis in the IoTIn this presentation, we will examine the symbiotic relationship between the IoT edge and cloud that is driving digital transformation. We will also review the major trends and opportunities that result, and the implications for Infineon.
  • 20:00 – 21:00 – Automotive Technologies
    1. The Technologies Driving Connected Automobiles: V2X, 5G, WiFi 6, Security, and Edge AnalyticsAutomotive manufacturers are focusing on telematics and connected mobility solutions as a way to increase customer loyalty and strengthen their brand. Vehicle data is poised to power new automotive business opportunities, with the dependency on more powerful edge processing and embedded computing devices. This talk will cover the technologies driving connected automotive and mobility solutions, including V2X, 5G, WiFi 6, security, and Edge analytics.
    2. Cloud-Native Mixed Critical Automotive System DevelopmentThis talk covers the adoption of cloud-native technologies in automotive system development enabling cloud-native DevOps for mixed critical workloads in cloud-based execution environments and deployment across the automotive edge.

 

  • 21:00 – 22:00 – Power Efficiency
    1. Offer “Always On” Functionality Without Breaking the Power BudgetIncreasingly, users expect an instant response from their systems, such as using a voice command to perform an action. As devices incorporate myriad sensors, there’s a growing desire to enable “always-on” functionality using more than just wake words—for example, so that a machine can wake up when a person approaches. This requires clever and sophisticated AI algorithms that can reliably detect events of interest and often must be implemented with ultra-low power consumption, especially for battery-powered devices. This talk will discuss trends and implementations in the always-on market as well as the latest DSP solutions.
    2. Power Efficient Embedded ProcessingThe classic MCU is often the beating heart of deeply embedded applications such as in cardiac rhythm management or biometric monitoring. Bluetooth Low Energy enabled MCUs that combine a radio front-end with an MCU subsystem are a good solution to the design challenges associated with adding connectivity to a control system, but balancing power consumption alongside vital features like security can be a difficult task. This presentation explores how to maximize battery life in critical applications using the features available to hardware and firmware developers alike.

 

  • 22:00 – 23:00 – Wireless, including 5G
    1. Ultra-low-power IoT asset trackingAsset tracking is a most common use case across industry verticals like healthcare, agriculture, and logistics. It is arguably the most challenging complexity along the global supply chain due to specific needs, such as years of battery life in a small form factor with affordable network costs. Learn how using WiFi in combination with GNSS over a LoRaWAN network can help you deliver next-generation IoT asset tracking solutions such as locating your equipment, tracking your pallets, and always being able to find your delivery carts.
    2. Design Systems That Seamlessly Adjust to Varying Wireless ProtocolsWhether it’s connecting people with their mobile devices, V2X software that helps drivers negotiate traffic, or enabling IoT devices to run smart factories, today’s wireless systems are more powerful than ever. This power means ubiquitous connectivity – designing systems capable of seamlessly switching between satellite, cellular, and local area networks to maintain a fast, secure, and reliable online connection. Such a connection is no longer a nice-to-have but a must-have, but it comes with challenges. In this session, you’ll hear about the various ubiquitous connectivity technologies available to engineers, along with the relevant standards, challenges, and resources that enable them to design, model, analyze, and test systems on them.

Wednesday, June 22, 2022

  • 10:00 – 13:00 – An Introduction to TinyML: Bringing Deep Learning to Ultra-low-power Micro-ControllersTinyML targets to bring AI models to the extreme edge, specifically to ultra-low-power, micro-controller-type devices that are typically part or near to the sensors. This tutorial targets to give the audience an introduction to the field of TinyML. Memory is most often the limiting resource of TinyML systems, such that every byte of data counts. Hence, the tutorial will introduce TinyML compression methods and frameworks such as Tensor Flow Lite for Micro, which optimizes the AI model and generates a memory-optimized inference code. In this tutorial, we give a short introduction to the background of the underlying TinyML methods as well as a practical guide on how to get started with TinyML frameworks. Specifically, the audience will learn about:
    • The background and application fields of TinyML to deploy Deep Neural Networks on ultra-low-power, micro-controller-type devices
    • The basics of TinyML methods such as model compression (quantization and pruning) to bring down the memory demand of neural network inference
    • A practical guide on how to get started with TinyML with a hands-on example
  • 13:30 – 14:00 – Bridging the IT / OT divide in Industry 4.0

To fully reap the benefits of Industry 4.0, the industrial factory needs to close the gaps between OT, IT, and the IoT world. On the one hand, each piece of hardware still serves a distinct functionality in the industrial factory, whether as a PLC, gateway, or robotic controller. On the other, the advent of secure application orchestration paradigms makes every IoT device software-defined and app-enabled, with a device intelligence ultimately a function of the software it runs. Similarly, whereas the IoT world witnessed the advent of over-the-air firmware updates, modern factories still require costly manual interventions through on-site engineer visits down on the shop floor. Furthermore, real-time Linux with PREEMPT_RT can efficiently meet the low-latency and determinism needs for machine and operation safety in the OT domain. The convergence between IoT and automation domains thus calls for a transition from legacy stacks with closed standards and interfaces to modern IT solutions and the embrace of open-source software. In this talk, Edoardo will discuss the challenges in bringing IT to the OT in Industrial 4.0.

  • 14:00 – 14:30 – Static Analysis and Dynamic Testing of Software: A Combined Approach

No abstract​

  • 14:30 – 15:00 – Software Defined Vehicle: Build or Buy the required IP?

OEMs have recognized the need to focus on software and electronics, as the best route to meet market demands for innovation, safety, and long-term survival.

Industry standards such as Autosar, and the coming Adaptive Autosar, have helped OEMs and Tier1s to base their designs on a common architecture, but a lot still remains to be defined and developed. This presentation looks at what is available now, and how to set the priorities for future in-house software development or vendor partnerships.

Topics will include vehicle architecture demands, Over-The-Air solutions, Safety, and Cybersecurity relating to software development

  • 15:00  – 15:30 – Accelerate Development of AWS IoT Connected Devices with FreeRTOS and Arm Tools

Arm simplifies the development and deployment of IoT endpoint devices with AWS. Join Christopher Seidl, Senior Product Manager at Arm, and Paul Butler, Sr. Partner Solutions Architect at AWS, as they present how to create AWS-enabled IoT projects with FreeRTOS components and Arm Keil tools, including Arm Virtual Hardware. The IoT software foundation that will be showcased is based on FreeRTOS components that interface to the CMSIS eco-system. Part of CMSIS is the Open-CMSIS-Pack delivery standard – an infrastructure to integrate and manage software components that are supported by a wide range of tools. Arm Keil Studio used in the workflow, is a cloud-native software development platform with Git integration, that supports CI workflows for software validation that accelerates time-to-market.

  • 15:30 – 16:00 – Developing Autonomous Mobile Robots: a complex and challenging journey made simple with AAEON and Intel

Introducing the AAEON Robotics Evaluation kit with a description of the hardware and software components. The Hardware description will help users to understand the main Autonomous Mobile Robots (AMR) components and how they are controlled by the UP Xtreme i11 embedded system. It will be followed by a description of the Intel Edge Insight for AMR software package, which is based on ROS2, the tools included in the SDK and the showcase of sample applications that can be used by developers as a starting point for their robotics project.

  • 16:00 – 17:45 – High-Performance Embedded Architecture and Compilation
    1. The Innovation Seed of Chip ArchitecturesSoftware platforms are the new standard in the automotive industry: they cover new functions for connectivity (OTA, after-shipment subscriptions) and autonomous driving from L2+. Modern software architectures are currently being used to realize these smart functionalities. The young guns are establishing software architectures based on modern cloud applications with CI development processes. But all previous functionalities for safe driving physics must also be taken into account. Nobody wants to see a restart of the powertrain or suspension function at 100km/h, or a temporary latency of the break-by-wire ECU when a child comes onto the road in front of them. Separately, nobody wants to see the message that you’ve been hacked and have to pay 2 bitcoins to get your car back. Already established software frameworks are adapting to this trend, such as AUTOSAR Adaptive with its safe planned dynamics approach. Future software platforms will be all about partitioning. Partitioning is about managing challenges such as mixed-criticality, security, and different software vendors. The tool for SW partitioning is virtualization through different concepts such as different hypervisor types, boot monitors, and software containers. This presentation will give a brief overview of all these virtualization technologies, explain when to use which, highlight the need for real-time hypervisors in future high-performance computing ECUs and discuss an example of modern automotive software platform.
    2. Efficient Graph Neural Network Processing Exploiting CGRA ArchitecturesGraphs-based neural networks are prominent solutions that make machine learning applicable to particular fields such as communication networks, fault detection, synthetic chemistry, social networks, and neuroscience. Data in these applications is represented on non-euclidean spaces making hardware acceleration more difficult to implement due to the different network variants. A versatile solution to investigate is represented by Coarse-Grained Reconfigurable Array architectures. They can improve execution time and energy consumption by exploiting hardware reconfiguration compared to FPGA solutions. Coarser reconfigurable hardware can be reprogrammed faster and has a little hardware overhead that impacts maximum frequency. They are composed of simple functional units that communicate with each other with a programmable infrastructure that can be tuned at run-time to fit the needs of different algorithms. In this work, we analyze the most recent reconfigurable hardware solutions, focusing on their programming model and computation capabilities. We provide the first study on their applicability to the graph neural networks, making considerations on the design of the functional units, the degrees of freedom of the interconnections, the memory access mechanism, and the programming model. We conclude this work by providing hardware and software design choices that improve the efficiency of network inference on these types of reconfigurable architecture

Thursday, June 23, 2022

  • 10:00 – 10:30 – Industry Fusion: An open-source, scalable end-to-end IIoT solution for small to medium enterprises in manufacturing

Members of the Industry Fusion Foundation (the consortium behind the Industry Fusion project) will introduce Industry Fusion – an open-source IIoT connectivity solution for smart products and smart factories that empower small and medium-sized businesses to participate in tomorrow’s connected industry. Learn how IFF went about producing a common set of open-source software tools to build a digital twin to manage and optimize a heterogeneous machine landscape. Finally, an introduction to how SUSE and Intel provide the compute HW and SW infrastructure layer to empower the Industry Fusion stack.

  • 10:30 – 11:00 – VITA 88 XMC+ Enables PCI Express 5.0 Performance in Rugged Computing Applications

Legacy VITA 42 XMC interconnects enable high-speed, switched interconnect protocol I/O expansion across popular cPCI, PXIe, and VPX platforms. The new VITA 88 XMC+ standard, released on December 2021, defines improved electrical/mechanical mezzanine connectors for XMC applications. The new connector is backward compatible with VITA 42/61 footprints. The updated solder footprint and blade/beam style contact system result is superior SI performance, improved mating/un-mating forces, and increased durability at stacks up to 18 mm. In this Exhibitor Forum, technical experts from Samtec will detail real-world VITA 88 signal channels and design criteria essential for supporting next-gen performance in rugged computing.

  • 11:00 – 12:45 – Embedded OS & Containers
    1. Convenient Reproducible Build Environments with Docker”But it compiles on MY machine!” is one of the sentences, which every software developer dreads. Setting up an embedded software development environment can be quite complex and often needs fiddling with dependencies. The prevalent motto often is to never touch a running system when it comes to maintaining build systems with the result that embedded software engineering often happens on obsolete toolchains and stale dependencies. But it does not have to be this way. Thanks to containerization, maintaining build systems has gotten much easier and with the native integration of remote containers in various IDEs using them is as convenient as it gets. In this session, you will see how to create a docker container for managing dependencies, how to use it for everyday programming, and how to use the very same container as a base for a CI/CD system. And all this on a live example – No slides, just code.
    2. Challenges and Solutions When Using Containers in Embedded SystemsDeveloping embedded equipment has always been challenging. Along with new technologies, new challenges appear. Docker Containers are a very popular technology for computers and servers and over time it has come surprisingly close to embedded systems. One of the main reasons for this approach is that the equipment is increasingly performing multiple functions at the same time. Eg. Image processing, user Interface, collecting sensor data, and so on. Docker Containers solves this very easily by adding the possibility to isolate applications and libraries in different containers. In addition, Docker brings to embedded systems a great capacity for compatibility between different hardware and adds great agility for development. Concepts like continuous integration and deployment are easier to apply to embedded when Docker Container is adopted as part of the architecture. Along with the benefits come the challenges. Challenges such as preparing an immutable image to be securely loaded on devices on the production line, or building, and developing docker for ARM architectures. This speech aims to present some of the challenges when using Docker Containers and present solutions that are available targeted at the embedded market segments.
    3. Containerization of Embedded OS for Intelligent Edge SystemsEdge computing is accelerating the need to develop, manage, and update software running at the intelligent edge. As hardware is increasing in compute power and adding new capabilities, it complicates how one balances the real-time and safety-critical nature of the system with security and business forces that require continuous updates. This presentation will cover how one may address the problem of deploying software across a wide range of devices from MCUs to edge compute devices. This engineering challenge may be solved by leveraging various technologies including virtualization and containerization on devices running both real-time operating systems (RTOS) and general-purpose operating systems. It will also include how cloud-native technologies can be used to both build and orchestrate this software and leverage an SBOM to track what software is running across your fleet of IoT devices.
  • 13:45 – 15:30 – Bluetooth Mesh
    1. Performance, Scalability, and Reliability Considerations for Bluetooth Mesh NetworksSince its adoption in 2017, Bluetooth Mesh has been proving to be a very well-performing and scalable technology. In many cases, it has performed well above the expectations. But the devil, as always, is in the details. This session will highlight the important specification and implementation details that contribute to the overall scalability and performance of a Bluetooth mesh network. Both device architecture considerations and network configuration options will be explained and their impact on the overall network behavior will be analyzed.
    2. Bluetooth Mesh: Connecting the Next Wave of IoT TechnologyBluetooth Mesh networking enables many-to-many device communication that is optimized for creating large-scale device networks. Since it’s a new networking technology compared to other options, such as Zigbee and Wi-Fi, it’s important to understand what Bluetooth Mesh is, when to use it for specific applications, and what are the benefits, use cases, and tradeoffs. This paper goes through these points in greater detail.
    3. Bluetooth Mesh Nodes Configuration Updates Using Parallel MethodBluetooth Mesh provides scalable and secure communication for industrial-grade IoT applications. It has various levels of encryption which provide protection against various known attacks. This paper presents the parallel methodology of reconfiguring the nodes without violating the Bluetooth Mesh security. One of the possible methods for updating the configuration of a single node is by sharing the security credentials over Bluetooth GATT or serial interface. Additionally, in some cases, it may be required to set, update, or delete the configuration of a large number of nodes together. For example, adding a network key to several nodes for creating another subnet or resetting the configuration of multiple nodes together. The Bluetooth Mesh standard has the foundation Model called the Configuration Model to do the configuration of each node. It utilizes the Device key which is unique to each node. In an alternative implementation, sending a Vendor Model message to a Destination Group can transfer Config model messages and configure this group together. The major advantage of this implementation is to save time for configuration. If the Device Keys are used, only one node can be configured in a message while using the Group message, the number of nodes can be configured together.
  • 16:00 – 17:45 – Embedded OS Trends
    1. Progress on the AUTOSAR Adaptive Platform for Intelligent VehiclesAUTOSAR develops a new approach to cope with the challenging market trends in the automotive industry like internet access in cars, highly automated driving, and vehicle-to-vehicle communication. The result of these activities during the last years is an intelligent and flexible infrastructure SW which therefore is named AUTOSAR Adaptive Platform. The platform runs on high-end computing hardware and supports parallel processing on many-core systems and GPUs. Consequently, it can also be used to support high bandwidth communication, is able to host AI applications, and will therefore support deep learning and video stream processing in real-time. The POSIX nature of the operating system enables the deployment of customer applications during live time so that software updates over the air are complementing the feature set. Since AUTOSAR has its roots in the automotive industry, the highest priority of safety and security features is as self-evident as the compatibility to systems based on the AUTOSAR Classic Platform. The range of Functional Safety concepts has been extended by the System Health Monitoring, Mode Dependent Configuration, and the End2End for Fields. Furthermore, the In-Vehicle Communication introduced an additional part of 10BASE-T11 for more bus efficiency and cost reduction. The new Release includes a rework of Partial Network Cluster (PNC) and Network Management (NM) Handling. Additionally, the DDS Enhancements, DDS Security, and DDS Network Binding were released. In conclusion, the two standardized AUTOSAR Software Platforms define one holistic E/E System Architecture for Future Intelligent Mobility.
    2. Best Practices for Vehicle Security Lifecycle ManagementToday’s vehicles are built from integrated parts that incorporate firmware and software built with third-party and open-source code, and “black box” systems. To make matters more complicated, OEMs and their suppliers must comply with multiple cybersecurity regulations, standards, and internal policies from their legal teams regarding licenses and the terms associated with OSS software. They also need to ensure the safety of upgrades and fixes that are being implanted over-the-air (OTA), as part of the growing trend for at-home service. To do this, they must understand at every stage in the product life cycle, what vulnerabilities are lurking in the embedded firmware and software bill of materials (SBOMs). This session will explore options to tackle these challenges and comply with emerging regulations such as WP.29 R155. It will delve into how OEMs and their suppliers can integrate “living SBOMs” and product security lifecycle management into their cybersecurity framework, with processes that begin with the supply-chain and design phases of development, through post-production and OTA updates. It will show how these processes will reduce risk and product delays while improving efficiency in the product development lifecycle.

That’s it for the sessions. No beer on Tuesday, but time can be reserved on Wednesday and Thursday.

It’s completely free to attend the Embedded World 2022 as a visitor, as long as you use an online coupon. If you forget to enter the “ew22web” coupon it will cost 25 Euros. Even though I won’t be onsite, expect more news from the event on CNX Software starting around mid-June.

Click Here For The Original Source.


————————————————————————————-

Translate

Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish