Herefore, Ingly Connected

Total Page:16

File Type:pdf, Size:1020Kb

Herefore, Ingly Connected Downloaded from SAE International by Mert D. Pese, Thursday, April 02, 2020 2020-01-1295 Published 14 Apr 2020 Security Analysis of Android Automotive Mert Pese and Kang Shin University of Michigan Josiah Bruner Georgia Institute of Technology Amy Chu Harman International Citation: Pese, M., Shin, K., Bruner, J., and Chu, A., “Security Analysis of Android Automotive,” SAE Technical Paper 2020-01-1295, 2020, doi:10.4271/2020-01-1295. Abstract car manufacturer as well as third-party businesses, but also n-vehicle infotainment (IVI) platforms are getting increas- introduces a new attack surface on the vehicle. Therefore, ingly connected. Besides OEM apps and services, the next Android Automotive must have a secure system architecture Igeneration of IVI platforms are expected to offer integra- to prevent any potential attacks that might compromise the tion of third-party apps. Under this anticipated business security and privacy of the vehicle and the driver. In partic- model, vehicular sensor and event data can be collected and ular, malicious third-party entities could remotely compro- shared with selected third-party apps. To accommodate this mise a vehicle’s functionalities and impact the vehicle safety, trend, Google has been pushing towards standardization causing financial and operational damage to the vehicle, as among proprietary IVI operating systems with their Android well as compromise the driver’s privacy and safety. Automotive platform which runs natively on the vehicle’s IVI This paper presents an Android Automotive system archi- platform. Unlike Android Auto’s limited functionality of tecture and provides guidelines for conducting a high-level display-projecting certain smartphone apps to the IVI screen, security analysis. It also describes what countermeasures have Android Automotive will have access to the in-vehicle already been taken by Google to prevent potential attacks, and network (IVN), and will be able to read and share various discusses what still needs to be done in order to offer a secure vehicular sensor data with third-party apps. This increased and privacy-preserving Android experience for next-genera- connectivity opens new business opportunities for both the tion IVI platforms. Introduction AdSense and the applications that enable these two. In the ndroid was launched in late 2008 as a mobile oper- case of Android there is also revenue from app sales (Google ating system by Google. While this open-source Play Store), licensing fees (Google Play Services) as well as ALinux-based platform was initially designed for touch Google Play’s multimedia contents (e.g., Music) [7]. For the screen-equipped mobile phones - dubbed as smartphones - the automotive use-case, this is not entirely possible with Android success of this versatile operating system on widely popular Auto since no additional data can be leveraged. phones led Google to develop Android versions for TVs and This is a reason why Google introduced Android smartwatches in the early 2010s. Android’s penetration into Automotive at Google I/O 2018. They announced a partner- different markets culminated in the launch of Android Auto ship with a massive car-making alliance of Renault-Nissan- in 2015, which was also due partially to the introduction of Mitsubishi to run Android Automotive powered infotainment touch screens for in-vehicle infotainment (IVI) systems. systems in millions of cars beginning 2021 [9]. Although car- Android Auto is an app that runs on mobile handsets and makers have been hesitant to share valuable vehicle data with once connected to the IVI (over USB, WiFi or Bluetooth Google, the latter’s efforts in creating a clean, powerful oper- AVRCP) projects certain select apps to the IVI screen. The focus ating system tailored to run stand-alone on IVIs has convinced of Android Auto is to offer multimedia and navigation apps car-makers to adopt this new technology. A vehicle-specific with an enhanced UX to reduce distraction of the driver. Google Play Store will allow third-party apps to be deployed Despite its support by all major OEMs (and Apple Carplay) for in numerous vehicles independent of OEM [27] and can most of their models as of 2019, the major drawback of Android possibly allow car-makers to easily access a share of revenue Auto is the lack of having access to any data generated inside with Google. Third-party applications that require IVN access the vehicle. It solely relies on the handset’s sensors and does not can range from smart home apps for optimizing customers’ read nor write any data to the in-vehicle network (IVN). As a charging management in their home garage to usage-based result, a full car integration was not possible with Android Auto. insurance (UBI) apps. The latter compute the driving behavior Android’s business model is an extension of the existing from a set of sensors, such as speed or braking, to automati- Google business model: Revenue is obtained from Search, cally adjust the insurance premium. Downloaded from SAE International by Mert D. Pese, Thursday, April 02, 2020 2 SECURITY ANALYSIS OF ANDROID AUTOMOTIVE In recent years, wireless connectivity in vehicles has claiming that this leaves the infotainment system at serious gained popularity. According to [6], 250M vehicles will risk. They did not analyze if the Android Auto client-side be connected to the Internet of Things (IoTs) by 2020. Existing software on the IVI can gain access to the IVN, so that third- connected vehicles’ (CVs’) functionalities comprise infotain- party Android Auto apps can actually access the car’s data. ment, safety, diagnostics efficiency, navigation and payments The Android Auto specification mandates a gap between the [29]. In the next phase of CVs - which is starting now - cars IVN and Android Auto, partially due to its media- and navi- will connect to third-party services using a built-in data gation-based functions, unlike Android Automotive which connection, introducing novel vehicular data-collection plat- needs access to the IVN. forms, such as BMW CarData [8]. Already 78M vehicles are As of now, there are only two major publications on connected to the web, with 98% of all new vehicles sold in the Android Automotive. [28] proposes a sensing model for vehic- US and Europe expected to have cellular connections by ular sensor data. It points out how its architecture can 2021 [26]. be embedded into the Android Automotive platform as a However, all these positive developments come at the proof-of-concept. [13] is a high-level description of Android expense of security and privacy risks. Third-parties (and the Automotive security. It focuses on malicious third-party apps platform provider Google) will have access to private/sensitive and their potential impact on safety, security and privacy. data which can be used by malicious entities to infer more Unlike our work, its focus lies on static and dynamic app information about the driver of the vehicle. Furthermore, analyses, not a security analysis of the framework. In fact, the CAN injection (write access to the IVN) has to be restricted authors developed a tool for vehicle-specific code analysis, to OEM apps. For instance, the HVAC app that Google offers called AutoTame. Their attacks focus on driver disturbance as a native application [1] usually requires to write to the CAN (by raising the volume of a media app) and availability (forking bus to change fan or temperature settings. Other third-party an app until it crashes). They also briefly discuss privacy, i.e., apps do not have a reason to write to the IVN, and hence leakage of sensitive information, through the use of two apps. should be limited to read-only mode. Only one app has permission to upload data to the Internet, The goal of this paper is to introduce Google’s Android whereas the other app can read sensitive sensor information. Automotive framework based on all of its available documents Through the means of inter-process communication (IPC), and point out both security and privacy threats that this useful the app that reads sensitive information can communicate the addition to the IVI world can cause. After describing three sensitive information to the other app that uploads it to the potential attacks on Android Automotive-equipped IVIs, malicious third-party. For this attack to succeed, the third- we will discuss possible countermeasures or precautions that party must have control over both apps, which makes this need to be taken by the OEM and Tier 1suppliers to mitigate attack harder to mount. the security and privacy risks. The paper is structured as follows. First, we would like to review some existing academic work done on Android IVI Security Automotive security, as well as point out how IVIs can The in-vehicle infotainment (IVI) system is a major point of be leveraged for automotive security attacks. Then, we will entry into the vehicle due to its connectivity provided by the introduce the Android Automotive architecture as defined by telematic control unit (TCU). As a result, it is a popular attack Google, as well as a primer of the CAN bus to provide insights vector since wireless surfaces, such as Bluetooth or WiFi, or into the impact of CAN injection attacks. This will be followed wired interfaces, such as the USB port, can be exploited. by an overview of how to analyze the security of Android Although manufacturers claim that the IVI usually has an air Automotive, including the EVITA’s methodology for classi- gap to the in-vehicle network (IVN), it has been shown in [25] fying potential attacks. As part of the security analysis, we will that this is not always true. Once access to the CAN bus - the show three different potential attacks that can be mounted on dominant IVN technology - has been obtained, it is possible an IVI running Android Automotive.
Recommended publications
  • How Applications Are Run on Android ?
    How applications are run on Android ? Jean-Loup Bogalho & Jérémy Lefaure [email protected] [email protected] Table of contents 1. Dalvik and ART 2. Executable files 3. Memory management 4. Compilation What is Dalvik ? ● Android’s Virtual Machine ● Designed to run on embedded systems ● Register-based (lower memory consumption) ● Run Dalvik Executable (.dex) files What is ART ? ● Android RunTime ● Dalvik’s successor ● ART Is Not a JVM ● Huge performance gain thanks to ahead-of-time (AOT) compilation ● Available in Android 4.4 What is ART ? Executable files Dalvik: .dex files ● Not the same bytecode as classical Java bytecode ● .class files are converted in .dex files at build time ● Optimized for minimal memory footprint Dalvik: .dex files Dalvik: application installation ● Verification: ○ bytecode check (illegal instructions, valid indices,...) ○ checksum on files ● Optimization: ○ method inlining ○ byte swapping and padding ○ static linking ART: OAT file ● Generated during installation (dex2oat) ● ELF format ● Classes metadata Memory management Zygote ● Daemon started at boot time ● Loads and initializes core libraries ● Forks to create new Dalvik instance ● Startup time of new VM is reduced ● Memory layouts are shared across processes Dalvik: memory management ● Memory is garbage collected ● Automatic management avoids programming errors ● Objects are not freed as soon as they become unused Dalvik: memory allocation ● Allocation profiling: ○ allocation count (succeeded or failed) ○ total allocated size (succeeded or failed) ● malloc
    [Show full text]
  • Android (Operating System) 1 Android (Operating System)
    Android (operating system) 1 Android (operating system) Android Home screen displayed by Samsung Nexus S with Google running Android 2.3 "Gingerbread" Company / developer Google Inc., Open Handset Alliance [1] Programmed in C (core), C++ (some third-party libraries), Java (UI) Working state Current [2] Source model Free and open source software (3.0 is currently in closed development) Initial release 21 October 2008 Latest stable release Tablets: [3] 3.0.1 (Honeycomb) Phones: [3] 2.3.3 (Gingerbread) / 24 February 2011 [4] Supported platforms ARM, MIPS, Power, x86 Kernel type Monolithic, modified Linux kernel Default user interface Graphical [5] License Apache 2.0, Linux kernel patches are under GPL v2 Official website [www.android.com www.android.com] Android is a software stack for mobile devices that includes an operating system, middleware and key applications.[6] [7] Google Inc. purchased the initial developer of the software, Android Inc., in 2005.[8] Android's mobile operating system is based on a modified version of the Linux kernel. Google and other members of the Open Handset Alliance collaborated on Android's development and release.[9] [10] The Android Open Source Project (AOSP) is tasked with the maintenance and further development of Android.[11] The Android operating system is the world's best-selling Smartphone platform.[12] [13] Android has a large community of developers writing applications ("apps") that extend the functionality of the devices. There are currently over 150,000 apps available for Android.[14] [15] Android Market is the online app store run by Google, though apps can also be downloaded from third-party sites.
    [Show full text]
  • K1 LEVEL QUESTIONS 17PMC640 ANDROID PROGRAMMING Unit:1
    K1 LEVEL QUESTIONS 17PMC640 ANDROID PROGRAMMING Unit:1 1) Dalvik Virtual Machine (DVM) actually uses core features of A. Windows B. Mac C. Linux D. Contiki 2) A type of service provided by android that allows sharing and publishing of data to other applications is A. View System B. Content Providers C. Activity Manager D. Notifications Manager 3) Android library that provides access to UI pre-built elements such as buttons, lists, views etc. is A. android.text B. android.os C. android.view D. android.webkit 4) A type of service provided by android that shows messages and alerts to user is A. Content Providers B. View System C. Notifications Manager D. Activity Manager 5) A type of service provided by android that controls application lifespan and activity pile is A. Activity Manager B. View System C. Notifications Manager D. Content Providers 6) One of application component, that manages application's background services is called A. Activities B. Broadcast Receivers C. Services D. Content Providers 7) In android studio, callback that is called when activity interaction with user is started is A. onStart B. onStop C. onResume D. onDestroy 8) Tab that can be used to do any task that can be done from DOS window is A. TODO B. messages C. terminal D. comments 9) Broadcast that includes information about battery state, level, etc. is A. android.intent.action.BATTERY_CHANGED B. android.intent.action.BATTERY_LOW C. android.intent.action.BATTERY_OKAY D. android.intent.action.CALL_BUTTON 10) OHA stands for a) Open Host Application b) Open Handset
    [Show full text]
  • Android Operating System
    Software Engineering ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, 2012, pp.-10-13. Available online at http://www.bioinfo.in/contents.php?id=76 ANDROID OPERATING SYSTEM NIMODIA C. AND DESHMUKH H.R. Babasaheb Naik College of Engineering, Pusad, MS, India. *Corresponding Author: Email- [email protected], [email protected] Received: February 21, 2012; Accepted: March 15, 2012 Abstract- Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Android, an open source mobile device platform based on the Linux operating system. It has application Framework,enhanced graphics, integrated web browser, relational database, media support, LibWebCore web browser, wide variety of connectivity and much more applications. Android relies on Linux version 2.6 for core system services such as security, memory management, process management, network stack, and driver model. Architecture of Android consist of Applications. Linux kernel, libraries, application framework, Android Runtime. All applications are written using the Java programming language. Android mobile phone platform is going to be more secure than Apple’s iPhone or any other device in the long run. Keywords- 3G, Dalvik Virtual Machine, EGPRS, LiMo, Open Handset Alliance, SQLite, WCDMA/HSUPA Citation: Nimodia C. and Deshmukh H.R. (2012) Android Operating System. Software Engineering, ISSN: 2229-4007 & ISSN: 2229-4015, Volume 3, Issue 1, pp.-10-13. Copyright: Copyright©2012 Nimodia C. and Deshmukh H.R. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
    [Show full text]
  • Dalvik - Virtual Machine
    Review Indian Journal of Engineering, Volume 1, Number 1, November 2012 REVIEW Indian Journal of 7765 – ngineering 7757 EISSN 2319 E – ISSN 2319 Dalvik - Virtual Machine Ashish Yadav J1, Abhishek Vats J2, Aman Nagpal J3, Avinash Yadav J4 1.Department of Computer Science, Dronacharya college of Engineering, Gurgaon, India, E-mail: [email protected] 2.Department of Computer Science, Dronacharya college of Engineering, Gurgaon, India, E-mail: [email protected] 3.Department of Computer Science, Dronacharya college of Engineering, Gurgaon, India, E-mail: [email protected] 4.Department of Computer Science, Dronacharya college of Engineering, Gurgaon, India, E-mail: [email protected] Received 26 September; accepted 19 October; published online 01 November; printed 16 November 2012 ABSTRACT Android is a software stack for mobile devices that contains an operating system, middleware and key applications. Android is a software platform and operating system for mobile devices based on the Linux operating system and developed by Google and the Open Handset Alliance. It allows developers to Write handle code in a Java-like language that utilizes Google-developed Java libraries, but does not support programs developed in native code. The presentation of the Android platform on 5 November 2007 was announced with the founding of the Open Handset Alliance, a consortium of 34 hardware, software and telecom companies devoted to advancing open standards for mobile devices. When released in 2008, most of the Android platform will be made obtainable under the Apache free-software and open-source license. Open Android provide the permission to access core mobile device functionality through standard API calls.
    [Show full text]
  • Dexmedetomidine Mitigates LPS-Induced Acute Lung Injury in Rats Through HMGB1-Mediated Anti- Inflammatory and Antioxidant Mechanisms
    Revista Argentina de Clínica Psicológica 2020, Vol. XXIX, N°4, 377-383 377 DOI: 10.24205/03276716.2020.837 Dexmedetomidine Mitigates LPS-Induced Acute Lung Injury in Rats Through HMGB1-Mediated Anti- Inflammatory and Antioxidant Mechanisms Ning Lva*,XiaoYun Lib ABSTRACT Purpose: To investigate the effect of dexmedetomidine on lipopolysaccharide (LPS)- induced acute lung injury in rats, and the underlying mechanism. Methods: Healthy male SD rats (n=54) were randomly divided into three groups: normal, model and dexmedetomidine groups, with 18 rats in each group. Rats in the model and dexmedetomidine groups were given LPS at a dose of 8 mg/kg, to establish a model of acute lung injury. Rats in the dexmedetomidine group were injected intraperitoneallywith dexmedetomidine at a dose of 50 μg/kg prior to establishment of the model, while rats in the normal group received intraperitoneal injection of normal saline in place of dexmedetomidine. Hematoxylin and eosin (H&E) staining was used to observe changes in lung tissue in each group.Changes in wet/dry weight ratio of lung tissue were compared among the groups. Enzyme-linked immunosorbent assay was used to determine the expressions of inflammation indices i.e. interleukin-6 (IL-6), tumor necrosis factor-α (TNF- α), and interleukin-1β (L-1β)] in lung tissue. Levels of MDA were measured with thiobarbituric acid method. Superoxide dismutase (SOD) activity was assayed through enzyme rate method, while nitric oxide was measured using nitrate reductase assay.The expression levels of high mobility group protein B1 (HMGB1), p-PI3K, p-Akt, p-IκB, p-NF- κB, and Toll-like receptor 4 (TLR4) in lung tissue were determined with Western blotting.
    [Show full text]
  • Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART
    sensors Article Mobile Code Anti-Reversing Scheme Based on Bytecode Trapping in ART Geonbae Na 1, Jongsu Lim 1, Sunjun Lee 2 and Jeong Hyun Yi 2,* 1 School of Computer Science and Engineering, Soongsil University, Seoul 06978, Korea; [email protected] (G.N.); [email protected] (J.L.) 2 School of Software, Soongsil University, Seoul 06978, Korea; [email protected] * Correspondence: [email protected] Received: 31 March 2019; Accepted: 6 June 2019; Published: 10 June 2019 Abstract: As interest in Internet of Things environments rapidly increases throughout the IT convergence field, compatibility with mobile devices must be provided to enable personalized services. The security of mobile platforms and applications is critical because security vulnerabilities of mobile devices can be spread to all things in these environments. Android, the leading open mobile platform, has long used the Dalvik virtual machine as its runtime system. However, it has recently been completely replaced by a new runtime system, namely Android Runtime (ART). The change from Android’s Dalvik to ART means that the existing Dalvik bytecode-based application execution structure has been changed to a machine code-based application execution structure. Consequently, a detailed understanding of ART, such as new file formats and execution switching methods between codes, is required from the viewpoint of application security. In this paper, we demonstrate that an existing Dalvik-based application vulnerability can be exploited as-is in ART. This is because existing Dalvik executable files coexist in the ART executable file, and these Dalvik bytecodes and compiled machine codes have one-to-one mapping relationships.
    [Show full text]
  • EB GUIDE: and Engineering Services All-In-One Automotive HMI UI and Application Development Services Development Toolchain, Voice Assistants (E.G
    How can software suppliers create future car user experiences? Elektrobit, the visionary supplier of embedded software products and services is your answer. Deliver stunning, next-generation automotive user interfaces Disruption is affecting every industry. In the automotive At EB, we believe that an optimal interaction between hu- industry, this is most visible in the transformation of the man and machine is characterized by three aspects: classic vehicle into a software-driven Internet of Things (IoT) device. Personalization, connectivity, and mobility-as- a-service are becoming increasingly important for drivers EXCELLENT and passengers. USABILITY HIGH saving you In order to stand out in a marketplace that is growing more EFFICIENCY operator time saving both time competitive by the day, automotive manufacturers are seizing and money the opportunity to showcase their distinct advantages in pro- viding their drivers and passengers user interfaces that are sleek, intuitive, and above all, seamlessly integrated. MAXIMUM Elektrobit has created a big move from simple driver infor- PRODUCTIVITY ultimately giving your mation centers, to in-vehicle infotainment systems, to con- company a competitive nected cockpits that integrate with multiple technologies advantage simultaneously. 2 The secret to our success is simple. We're passionate about Our mission is to deliver HMIs optimized for your target promoting the interactions between humans and machines platform - HMIs that meet your expectations for high qua- through exceptionally designed software tools and solutions lity, that perfectly integrate multimodal input and output and our skilled engineering teams. devices, and that can be easily maintained over multiple variants and even multiple life cycles of your product.
    [Show full text]
  • Nacldroid: Native Code Isolation for Android Applications
    NaClDroid: Native Code Isolation for Android Applications Elias Athanasopoulos1, Vasileios P. Kemerlis2, Georgios Portokalidis3, and Angelos D. Keromytis4 1 Vrije Universiteit Amsterdam, The Netherlands [email protected] 2 Brown University, Providence, RI, USA [email protected] 3 Stevens Institute of Technology, Hoboken, NJ, USA [email protected] 4 Columbia University, New York, NY, USA [email protected] Abstract. Android apps frequently incorporate third-party libraries that contain native code; this not only facilitates rapid application develop- ment and distribution, but also provides new ways to generate revenue. As a matter of fact, one in two apps in Google Play are linked with a library providing ad network services. However, linking applications with third-party code can have severe security implications: malicious libraries written in native code can exfiltrate sensitive information from a running app, or completely modify the execution runtime, since all native code is mapped inside the same address space with the execution environment, namely the Dalvik/ART VM. We propose NaClDroid, a framework that addresses these problems, while still allowing apps to include third-party code. NaClDroid prevents malicious native-code libraries from hijacking Android applications using Software Fault Isolation. More specifically, we place all native code in a Native Client sandbox that prevents uncon- strained reads, or writes, inside the process address space. NaClDroid has little overhead; for native code running inside the NaCl sandbox the slowdown is less than 10% on average. Keywords: SFI, NaCl, Android 1 Introduction Android is undoubtedly the most rapidly growing platform for mobile devices, with estimates predicting one billion Android-based smartphones shipping in 2017 [12].
    [Show full text]
  • The Future Going Back in Time to Abuse Android's
    Back To The Future Going Back In Time To Abuse Android’s JIT !1 $ whoami • Benjamin Watson • Director of Security Research @VerSprite Security • Android • @rotlogix !2 Agenda • Inspiration and Overview • Android 4.4.4 JIT Internals & Abuse • Android 7.1.1 JIT Internals & Abuse • Android Oreo • Tools • Future Challenges • Conclusion !3 Back To The Future Going Back In Time To Abuse Android’s JIT !4 Making Android Malware Great The First Time !5 On The Shoulders Of Giants !6 On the Shoulders of Giants @mattifestation @rwincey !7 Shellcode Execution in .NET using MSIL- Based JIT Overwrite • @mattifestation discovered the CPBLK opcode, which is effectively the MSIL equivalent to memcpy • He used to this opcode to overwrite a JIT’ed .NET method with shellcode • https://www.exploit-monday.com/2013/04/ MSILbasedShellcodeExec.html !8 Java Shellcode Execution • @rwincey uses the Unsafe API to overwrite a JIT’ed Java method with shellcode • https://www.slideshare.net/RyanWincey/java- shellcodeoffice !9 On the Shoulders of Giants • After absorbing Matt and Ryan’s research, I was left with one question … “ Is this also possible in Android? “ … !10 Motivation • These techniques discussed today are post-exploitation in nature • We already have installed a malicious application or gain code execution in Java through an arbitrary application • Our goal is to execute shellcode in memory entirely through Java without loading additional shared-libraries, or utilizing JNI !11 Motivation • This means that a simple “application” can have a self- contained solution
    [Show full text]
  • Dalvik Bytecode Acceleration Using Fetch/Decode Hardware Extension
    Journal of Information Processing Vol.23 No.2 118–130 (Mar. 2015) [DOI: 10.2197/ipsjjip.23.118] Regular Paper Dalvik Bytecode Acceleration Using Fetch/Decode Hardware Extension Surachai Thongkaew1,a) Tsuyoshi Isshiki1,b) Dongju Li1,c) Hiroaki Kunieda1,d) Received: May 6, 2014, Accepted: November 10, 2014 Abstract: The Dalvik virtual machine (Dalvik VM) is an essential piece of software that runs applications on the Android operating system. Android application programs are commonly written in the Java language and compiled to Java bytecode. The Java bytecode is converted to Dalvik bytecode (Dalvik Executable file) which is interpreted by the Dalvik VM on typical Android devices. The significant disadvantage of interpretation is a much slower speed of program execution compared to direct machine code execution on the host CPU. However, there are many tech- niques to improve the performance of Dalvik VM. A typical methodology is just-in-time compilation which converts frequently executed sequences of interpreted instruction to host machine code. Other methodologies include dedi- cated bytecode processors and architectural extension on existing processors. In this paper, we propose an alternative methodology, “Fetch & Decode Hardware Extension,” to improve the performance of Dalvik VM. The Fetch & De- code Hardware Extension is a specially designed hardware component to fetch and decode Dalvik bytecode directly, while the core computations within the virtual registers are done by the optimized Dalvik bytecode software handler. The experimental results show the speed improvements on Arithmetic instructions, loop & conditional instructions and method invocation & return instructions, can be achieved up to 2.4x, 2.7x and 1.8x, respectively.
    [Show full text]
  • Vehicle Embedded Data Stream Processing Platform for Android Devices
    (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 6, No. 2, 2015 Vehicle Embedded Data Stream Processing Platform for Android Devices Shingo Akiyama∗, Yukikazu Nakamoto∗, Akihiro Yamaguchiy, Kenya Satoz, Hiroaki Takadax ∗Graduate School of Applied Informatics, University of Hyogo, Japan yCenter for Embedded Computing System, Nagoya University, Japan zMobility Research Center, Doshisha University, Japan xGraduate School of Information Science, Nagoya University, Japan Abstract—Automotive information services utilizing vehicle and make decisions on the basis of this data to control data are rapidly expanding. However, there is currently no the vehicle on behalf of the driver. Jones used information data centric software architecture that takes into account the obtained from multiple on-board sensors to perform evasive scale and complexity of data involving numerous sensors. To steering and, when collision is unavoidable, to activate brake address this issue, the authors have developed an in-vehicle data- intervention to dampen the impact, thus decreasing damage stream management system for automotive embedded systems [5]. Such intelligent control systems acquire data from many (eDSMS) as data centric software architecture. Providing the data stream functionalities to drivers and passengers are highly sensors, such as cameras and millimeter-wave radar. Google beneficial. This paper describes a vehicle embedded data stream and Urban Challenge, which is a competition funded by the processing platform for Android devices. The platform enables Defense Advanced Research Projects Agency, revealed that flexible query processing with a dataflow query language and self-driving in urban areas is both feasible and safe in terms extensible operator functions in the query language on the of autonomous driving [6], [7].
    [Show full text]