Safe and Secure Model-Driven Design for Embedded Systems Letitia Li

Total Page:16

File Type:pdf, Size:1020Kb

Safe and Secure Model-Driven Design for Embedded Systems Letitia Li Safe and secure model-driven design for embedded systems Letitia Li To cite this version: Letitia Li. Safe and secure model-driven design for embedded systems. Embedded Systems. Université Paris-Saclay, 2018. English. NNT : 2018SACLT002. tel-01894734 HAL Id: tel-01894734 https://pastel.archives-ouvertes.fr/tel-01894734 Submitted on 12 Oct 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Approche Orientee´ Modeles` pour la Suretˆ e´ et la Securit´ e´ des Systemes` Embarques´ These` de doctorat de l’Universite´ Paris-Saclay prepar´ ee´ a` Telecom ParisTech Ecole doctorale n◦580 Denomination´ (STIC) NNT : 2018SACLT002 Specialit´ e´ de doctorat: Informatique These` present´ ee´ et soutenue a` Biot, le 3 septembre` 2018, par LETITIA W. LI Composition du Jury : Prof. Philippe Collet Professeur, Universite´ Coteˆ d’Azur President´ Prof. Guy Gogniat Professeur, Universite´ de Bretagne Sud Rapporteur Prof. Maritta Heisel Professeur, University Duisburg-Essen Rapporteur Prof. Jean-Luc Danger Professeur, Telecom ParisTech Examinateur Dr. Patricia Guitton Ingenieur,´ Renault Software Labs Examinateur Dr. Ludovic Apvrille Maˆıtre de Conferences,´ Telecom ParisTech Directeur de these` Dr. Annie Bracquemond Directeur de Recherche, Institut Vedecom Co-directeur de these` Titre:Approche Orientee´ Modeles` pour la Suretˆ e´ et la Securit´ e´ des Systemes` Embarques´ Mots cles:´ systemes` embarques, vehicules´ autonomes, suretˆ e´ de fonctionnement, securit´ e,´ exploration d’architecture Resum´ e:´ La presence´ de systemes` et d’objets em- le memeˆ temps, alors que les vehicules´ sont de plus barques´ communicants dans notre vie quotidienne a en plus connectes´ (et dans un avenir proche, au- apporte´ une myriade d’avantages, allant de l’ajout de tonomes), les chercheurs ont demontr´ e´ la possibilite´ commodites´ et de divertissements a` l’amelioration´ de de piratage de leurs capteurs ou de leurs systemes` de la suretˆ e´ des deplacements´ et des soins de sante.´ controleˆ interne. Cette these` s’interesse´ a` la securit´ e´ Cependant, les defauts´ et les vulnerabilit´ es´ de ces et la suretˆ e´ des systemes` embarques,´ dans le con- systemes` exposent leurs utilisateurs a` des risques de texte du vehicule´ autonome de l’Institut Vedecom. dommages materiels,´ de pertes monetaires,´ et memeˆ Notre approche repose sur une nouvelle methode´ de dommages corporels. Par exemple, certains de modelisation´ pour concevoir des systemes` em- vehicules´ commercialises,´ qu’ils soient connectes´ ou barques´ sursˆ et securis´ es,´ basee´ sur la methodologie´ conventionnels, ont dej´ a` souffert d’une variet´ e´ de SysML-Sec, et impliquant de nouvelles strategies´ de defauts´ de conception entraˆınant des victimes. Dans modelisation´ et de verification´ formelle. Title: Safe and Secure Model-Driven Design for Embedded Systems Keywords: embedded systems, autonomous vehicles, safe comportment, security, design space exploration Abstract: The presence of communicating embed- cases, death. At the same time, as vehicles become ded systems/IoTs in our daily lives have brought a increasingly connected (and in the near future, au- myriad of benefits, from adding conveniences and en- tonomous), researchers have demonstrated possible tertainment, to improving the safety of our commutes hacks on their sensors or internal control systems. and health care. However, the flaws and vulnera- This thesis discusses how to ensure the safety and bilities in these devices expose their users to risks security of embedded systems, in the context of Insti- of property damage, monetary losses, and personal tut Vedecom’s autonomous vehicle. Our approach in- injury. For example, consumer vehicles, both con- volves a new model-based methodology for safe and nected and conventional, have succumbed to a va- secure design, which involve new modeling and veri- riety of design flaws resulting in injuries, and in some fication methods. Universite´ Paris-Saclay Espace Technologique / Immeuble Discovery Route de l’Orme aux Merisiers RD 128 / 91190 Saint-Aubin, France Acknowledgments The research presented in this thesis was sponsored by Institut Vedecom of Versailles, France and took place at Lab System-on-Chip of Telecom ParisTech in Sophia Antipolis, France. With the conclusion of my PhD, I would like to recognize everyone who made the completion of this thesis possible: through technical support, encouragement, assisting with my post-thesis career plans, and helping me find a life in France. I would like to thank my advisors, Professor Ludovic Apvrille and Dr. Annie Bracquemond, who have guided me through this thesis. They have taught me all about modeling, verification, safety, security, and embedded systems, and it is their suggestions and corrections who have shaped this thesis into a coherent scientific work. I have been exceptionally fortunate for their availability to aid me in more than just my research, for I could not have navigated the administrative procedures or language difficulties without them, and I am also grateful for their willingness to show me the cultural heritage of the country, such as raclette. Next, I would like to thank all of my jury members for their time in participating in my defense, and all of the insights and the expertise they brought forth. I thank my reviewers: Professor Guy Gogniat and Professor Maritta Heisel for taking time this summer to read my thesis and offer feedback vital to its improvement, and the examiners of my jury: Professor Jean-Luc Danger, Professor Philippe Collet, and Dr. Patricia Guitton, for their interest in my research. I would also like to thank all of the developers of TTool, fellow members of LabSoc, and co-authors, for the working environment conducive to research, and all of our shared triumphs and disasters, especially: Professor Renaud Pacalet, who originally welcomed me to LabSoc for an internship and inspired me to start a career in research, and taught me the meaning of research and the search for knowledge and understanding, Professor Tullio Tanzi, who provided our case studies on his research on drones and rovers for disaster relief, and has taught me so much about radar and to find the courage to face the rest of the world so different than what I have experienced, Professor Rabea Ameur-Boulifa, who has been an excellent source of knowledge on formalization and verification, Dr. Florian Lugou, who developed so much of TTool’s security verification capabilities upon which my research is based, Matteo Bertolino, my officemate and fellow PhD student, who I am sure will forge his own career in academia, Dr. Dominique Blouin, whose work has greatly facilitated TTool development, Professor Daniela Genius of LIP6, our co-author who inspired most of our work on performance and relating between levels of abstraction, and Dr. Andrea Enrici of Nokia, the first of my fellow PhD students to graduate, who has been a great source of information regarding post-thesis life. I also thank the other researchers at Institut Vedecom, Laurent Bonic, Professor Féthi ben Ouezdou, and many others for helping with the modeling and testing on the company side. I thank my dearest and longtime friends Dr. Sharon Chou, Adam Fagan, Clement Pit-Claudel, Andrea Wang, and Stephie Wu, for their encouragement to see this thesis through, and staying a part of my life from afar. I am grateful for these friendships who have endured time and distance, and that they have ensured that we can meet again in those brief, precious times that we are on the same side of the ocean. And lastly, I thank my parents, who have always supported me no matter where my education and career take me. They have set an example to strive for education, knowledge, integrity, and scientific achievement, which, in my own way, I have attempted to live up to. 1 Abstract The presence of communicating embedded systems/IoTs in our daily lives have brought a myriad of ben- efits, from adding conveniences and entertainment, to improving the safety of our commutes and health care. However, the flaws and vulnerabilities in these devices expose their users to risks of property damage, monetary losses, and personal injury. For example, consumer vehicles, both connected and conventional, have succumbed to a variety of design flaws resulting in injuries, and in some cases, death. At the same time, as vehicles become increasingly connected (and in the near future, autonomous), researchers have demonstrated possible hacks on their sensors or internal control systems, including direct injection of messages on the CAN bus. Ensuring the safety of users or bystanders involves considering multiple factors. Conventional safety suggests that a system should not contain software and hardware flaws which can prevent it from correct function. ‘Safety of the Intended Function’ involves avoiding the situations which the system or its compo- nents cannot handle, such as adverse extreme environmental conditions. Timing can be critical for certain real-time systems, as the system will need to respond to certain events, such as obstacle
Recommended publications
  • Intel and Mobileye Autonomous Driving Solutions
    PRODUCT BRIEF Autonomous Driving Intel and Mobileye Autonomous Driving Solutions Together, Mobileye and Intel deliver scalable and versatile solutions using purpose-built software and efficient, powerful compute that will make autonomous driving an economic reality. Total Technology and Resources Making the self-driving car a reality requires an unprecedented integration of technology and expertise. Together, Mobileye and Intel provide comprehensive, scalable solutions to enable autonomous driving engineered for safety and affordability. With a combination of industry-leading computer vision, unique algorithms, crowdsourced mapping, efficient driving policy, a mathematical model designed for safety, and high-performing, low-power system designs, we deliver a versatile road map that scales to millions, not thousands, of vehicles. Purpose-built software and hardware Mobileye’s portfolio of innovative software across all pillars of autonomous driving (the “eyes”) complements Intel’s high-performance computing and connectivity expertise (the “brains”). This winning package supports complex and computationally intense vision processing with low power consumption, creating powerful and smart autonomous driving solutions from bumper to cloud. We start with revolutionary software from Mobileye that includes: • Low-cost, 360-degree surround-view computer vision • Crowdsourced Road Experience Management™ (REM™) mapping and localization • Sensor fusion, integrating surround vision and mapping with a multimodal sensor system • Efficient, semantic-based artificial intelligence (AI) for driving policy (decision-making) • A formal safety software layer via our Responsibility Sensitive Safety (RSS) model This advanced software calls for a powerful compute platform. We use a combination of proven Mobileye EyeQ® SoCs for computer vision, localization, sensor fusion, trajectory planning, and our RSS model designed for safety, as well as Intel® processors for translation of the planned trajectory into commands that are issued to the vehicle’s actuation system.
    [Show full text]
  • Download a PDF Version of the 2017 Annual Review
    Front Back Cover for Avisan.qxp_Layout 1 11/15/17 1:27 PM Page 1 Secure Technology Alliance 191 Clarksville Road Princeton Junction, New Jersey 08550 Annual Review 2017 Alliance A Secure Publication Technology 7 Volume www.securetechalliance.org Annual Review 2017 SCA-ad 2017 resized.indd 1 10/30/2017 10:40:22 AM EXECUTIVE DIRECTOR’S LETTER: A MESSAGE FROM RANDY VANDERHOOF Delivering Value to a Diverse Market Thank you for taking the time to read the 2017 Annual Review. This publication captures the best aspects of the membership experience for 2017 that hundreds of individual members and their organizations helped to provide. This year was especially sig- nificant, as the organization expanded its mission beyond smart cards and was re-branded as the Secure Technology Alliance. The new name and scope allows the Alliance to include embedded chip technology, hardware and software, and the future of digital security in all forms. The vast number of deliverables and member-driven activities recorded in the publication illustrates the diversity of the markets we serve and the commitment of all the industry professionals who contribute their knowledge and leadership toward expanding the market for smart card and related secure chip technologies. CHANGE COMES WITH NEW OPPORTUNITIES The decision to expand the mission and rebrand the organization was driven THE DECISION TO EXPAND by the changes in the secure chip industry, mostly from mobile technol- ogy and the growth of Internet-connected devices. This does not mean the THE MISSION AND REBRAND market for smart cards has disappeared. In fact, over the last few years, the THE ORGANIZATION WAS U.S.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Artificial Intelligence (AI) in Security Aspects of Industrie 4.0 Imprint
    RESULT PAPER Artificial Intelligence (AI) in Security Aspects of Industrie 4.0 Imprint Publisher Federal Ministry for Economic Affairs and Energy (BMWi) Public Relations Division 11019 Berlin www.bmwi.de Editorial responsibility Plattform Industrie 4.0 Bertolt-Brecht-Platz 3 10117 Berlin Design PRpetuum GmbH, Munich Status February 2019 Image credits Gorodenkoff – Fotolia (title), ipopba – iStockphoto (p. 5, p. 6), matejmo– iStockphoto (p. 13, p. 17), monsitj – iStockphoto (p. 23) You can obtain this and other brochures from: Federal Ministry for Economic Affairs and Energy (BMWi) Public Relations Email: [email protected] www.bmwi.de Central ordering service: Tel.: +49 30 182722721 Fax: +49 30 18102722721 This brochure is published as part of the public relations work of the Federal Ministry for Economic Affairs and Energy. It is distributed free of charge and is not intended for sale. The distribution of this brochure at campaign events or at infor- mation stands run by political parties is prohibited, and political party-related information or advertising shall not be inserted in, printed on, or affixed to this publication. 2 Contents Introduction . 3. Management Summary . 4. 1. Artificial Intelligence: Definition and Categories ..................................................................................................................................................... 6 1.1 Historical development – Phases of artificial intelligence......................................................................................................................
    [Show full text]
  • Combined Management Report
    15 Content Combined Management Report Our Group 16 Finances and strategy 16 2019 fiscal year 21 Business focus 22 Growth drivers 29 Group strategy 37 Human Resources strategy 39 The segments 40 Automotive 45 Industrial Power Control 49 Power Management & Multimarket 52 Digital Security Solutions 56 Research and development 60 Operations 62 Internal management system 65 Sustainability at Infineon 65 The Infineon share Our 2019 fiscal year 68 Group performance 68 Review of results of operations 73 Review of financial condition 76 Review of liquidity 79 Report on outlook, risk and opportunity 79 Outlook This report combines the Group Management 83 Risk and opportunity report Report of Infineon (“Infineon” or “Group”) – comprising Infineon Technologies AG (hereafter also referred to as “the Company”) and its 95 Overall statement on Infineon’s financial condition consolidated subsidiaries – and the Management 96 Infineon Technologies AG Report of Infineon Technologies AG. 99 Corporate Governance The Combined Management Report contains forward-looking statements about the business, 99 Information pursuant to section 289a, paragraph 1, financial condition and earnings performance and section 315a, paragraph 1, of Infineon. These statements are based on assumptions and projections based on currently of the German Commercial Code (HGB) available information and present estimates. They 102 Statement on Corporate Governance pursuant are subject to a multitude of uncertainties and risks. Actual business development may therefore to section 289f, 315d of the German Commercial differ materially from what has been expected. Code (HGB)/Corporate Governance Report Beyond disclosure requirements stipulated by law, Infineon does not undertake any obligation to 103 Compensation report update forward-looking statements.
    [Show full text]
  • EAFE EQUITY 2020 Year End Report
    EAFE EQUITY 2020 Year End Report COMPOSITE PERFORMANCE (% TOTAL RETURN) FOR PERIODS ENDED DECEMBER 31, 20201 SINCE 3 MONTHS 1 YEAR 3 YEARS2 5 YEARS2 10 YEARS2 INCEPTION2,3 HL EAFE EQUITY (GROSS OF FEES) 14.94 23.89 11.50 13.92 9.54 10.85 HL EAFE EQUITY (NET OF FEES) 14.82 23.26 10.91 13.32 8.92 10.23 MSCI EAFE INDEX4,5 16.09 8.28 4.79 7.96 6.00 6.80 1The Composite performance returns shown are preliminary; 2Annualized Returns; 3Inception Date: February 28, 2010; 4The Benchmark Index; 5Gross of withholding taxes. Please read the above performance in conjunction with the footnotes on the last page of this report. Past performance does not guarantee future results. All performance and data shown are in US dollar terms, unless otherwise noted. SECTOR EXPOSURE (%) WHAT'S INSIDE HL EAFE MSCI EAFE (UNDER) / OVER THE BENCHMARK Market Review › INFO TECHNOLOGY 21.3 8.9 After a turbulent year, and CASH 3.7 — despite an escalation in the global pandemic, international CONS STAPLES 14.2 11.0 stock markets rose dramatically HEALTH CARE 15.1 12.9 following positive results for COVID-19 vaccine trials. INDUSTRIALS 16.8 15.2 MATERIALS 9.4 7.9 Performance and Attribution › ENERGY 1.7 3.1 Sources of relative return by FINANCIALS 14.1 16.3 region and sector. REAL ESTATE 0.0 3.1 Perspective and Outlook › COMM SERVICES 1.3 5.2 We revisit our quaint worries from UTILITIES 0.0 3.9 a year ago about a “world turned upside down” by unsustainable CONS DISCRETIONARY 2.4 12.5 valuations and turn to some (14.0) (7.0) 0.0 7.0 14.0 newer concerns about regulatory threats to Big Tech.
    [Show full text]
  • 2015 Conference Program
    Conference Program ESWEEK.ORG OCTOBER 4-9, 2015 AMSTERDAM SPONSORED BY: Welcome to ESWEEK 2015 in Amsterdam! Embedded Systems Week (ESWEEK) is the premier event covering all aspects of research topic priorities, the cost of security and who is willing to pay for it or possibly embedded systems and software. By bringing together three leading conferences (CASES, accept reduced comfort. CODES+ISSS, and EMSOFT), three symposia (ESTIMedia, IoT, and RSP) and several Thursday and Friday are the days for symposia and workshops. The two established workshops and tutorials, ESWEEK allows attendees to benefit from the whole range of symposia, ESTIMEDIA (Real-time Multimedia) and RSP (Rapid System Prototyping), embedded system topics in research and development. which have been part of ESWEEK for many years, are now accompanied by a third, new The 21 regular sessions with three papers each are complemented by 7 invited sessions symposium on the Internet-of-Things. The Workshop on Design, Modeling and Evaluation focusing on new research trends or challenges. The regular sessions and special sessions of Cyber Physical Systems, CyPhy, is an established event that has joined ESWEEK for the of the three conferences are organized in four parallel tracks. There is a strong emphasis first time, just like the Embedded Operating Systems Workshop, EWiLi. WESE (education) on interaction: At the end of each session, there is a poster presentation during which and WESS (security) have been with ESWEEK for a while. There is one new workshop on all presented papers are discussed with the authors. As always, the paper selection Resiliency in Embedded Electronic Systems, REES, that is organized for the first time.
    [Show full text]
  • Autonomous Vehicle Technology: a Guide for Policymakers
    Autonomous Vehicle Technology A Guide for Policymakers James M. Anderson, Nidhi Kalra, Karlyn D. Stanley, Paul Sorensen, Constantine Samaras, Oluwatobi A. Oluwatola C O R P O R A T I O N For more information on this publication, visit www.rand.org/t/rr443-2 This revised edition incorporates minor editorial changes. Library of Congress Cataloging-in-Publication Data is available for this publication. ISBN: 978-0-8330-8398-2 Published by the RAND Corporation, Santa Monica, Calif. © Copyright 2016 RAND Corporation R® is a registered trademark. Cover image: Advertisement from 1957 for “America’s Independent Electric Light and Power Companies” (art by H. Miller). Text with original: “ELECTRICITY MAY BE THE DRIVER. One day your car may speed along an electric super-highway, its speed and steering automatically controlled by electronic devices embedded in the road. Highways will be made safe—by electricity! No traffic jams…no collisions…no driver fatigue.” Limited Print and Electronic Distribution Rights This document and trademark(s) contained herein are protected by law. This representation of RAND intellectual property is provided for noncommercial use only. Unauthorized posting of this publication online is prohibited. Permission is given to duplicate this document for personal use only, as long as it is unaltered and complete. Permission is required from RAND to reproduce, or reuse in another form, any of its research documents for commercial use. For information on reprint and linking permissions, please visit www.rand.org/pubs/permissions.html. The RAND Corporation is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous.
    [Show full text]
  • Recommendations for Implementing the Strategic Initiative INDUSTRIE 4.0
    Securing the future of German manufacturing industry Recommendations for implementing the strategic initiative INDUSTRIE 4.0 Final report of the Industrie 4.0 Working Group April 2013 Imprint Authors Contact details / Marketing Communication Promoters Group of the Industry-Science Office of the Industry-Science Research Alliance Research Alliance: beim Stifterverband für die Deutsche Prof. Dr. Henning Kagermann Wissenschaft Ulrike Findeklee, M.A. National Academy of Science and Engineering [email protected] (Spokesperson of the Promoters Group) Prof. forschungsunion.de Dr. Wolfgang Wahlster German Research Center for Artificial Secretariat of the Platform Industrie 4.0 Intelligence Dr. Johannes Helbig Lyoner Straße 9 60528 Deutsche Post AG Frankfurt/Main kontakt@plattform- acatech – National Academy of Science and Engineering i40.de plattform-i40.de Editorial staff Ariane Hellinger, M.A. Veronika Stumpf, M.A. With the assistance of: Christian Kobsda, B.A. acatech – National Academy of Science and Engineering Publication date: April 2013 Copy editing Linda Treugut, M.A. acatech – National Academy of Science and Engineering English translation Joaquín Blasco Dr. Helen Galloway Layout and typesetting HEILMEYERUNDSERNAU QGESTALTUNG © Copyright reserved by the authors. All rights reserved. This heilmeyerundsernau.com work and all its parts are protected by copyright. Any use not explicitly permitted by copyright law shall require the written consent of the authors. Failure to obtain this consent may result Graphics in legal action. This applies in particular to reproductions, isotype.com translations, microfilming and storage in electronic systems. The HEILMEYERUNDSERNAU QGESTALTUNG authors are not liable for the accuracy of manufacturers’ data. Contents Contents Executive summary . .. .. 04 Working group members | Authors | Technical experts .
    [Show full text]
  • Certain Vision-Based Driver Assistance System Cameras, Components Thereof, and Products Containing the Same
    In the Matter of CERTAIN VISION-BASED DRIVER ASSISTANCE SYSTEM CAMERAS, COMPONENTS THEREOF, AND PRODUCTS CONTAINING THE SAME 337-TA-907 Publication 4866 February 2019 U.S. International Trade Commission Washington, DC 20436 U.S. International Trade Commission COMMISSIONERS Meredith Broadbent, Chairman Dean Pinkert, Vice Chairman Irving Williamson, Commissioner David Johanson, Commissioner Rhonda Schmidtlein, Commissioner Address all communications to Secretary to the Commission United States International Trade Commission Washington, DC 20436 1,----- .______U.S. _____ International Trade Commission I Washington, DC 20436 www.usitc.gov In the Matter of CERTAIN VISION-BASED DRIVER ASSISTANCE SYSTEM CAMERAS, COMPONENTS THEREOF, AND PRODUCTS CONTAINING THE SAME 337-TA-907 Publication 4866 February 2019 UNITED STATES INTERNATIONAL TRADE COMMISSION Washington, D.C. 20436 In the Matter of Investigation No. 337-TA-907 CERTAIN VISION-BASED DRIVER ASSISTANCE SYSTEM CAMERAS, COMPONENTSTHEREOF,AND PRODUCTS CONTAINING THE SAME NOTICE OF THE COMMISSION'S DETERMINATION FINDING NO VIOLATION OF SECTION 337; TERMINATION OF THE INVESTIGATION AGENCY: U.S. International Trade Commission. ACTION: Notice. SUMMARY: Notice is hereby given that the U.S. International Trade Commission has found no violation of section 337 of the Tariff Act of 1930, 19 U.S.C. § 1337, in the above-captioned investigation, and has terminated the investigation. FOR FURTHER INFORMATION CONTACT: Amanda P. Fisherow, Office of the General Counsel, U.S. International Trade Commission, 500 E Street, S.W., Washington, D.C. 20436, telephone (202) 205-2737. The public version of the complaint can be accessed on the Commission's electronic docket (EDIS) at http://edis.usitc.gov, and will be available for inspection during official business hours.
    [Show full text]
  • MOBILEYE What’S Next from CTO Amnon Shashua and His Benchmark ADAS Tech?
    AUTOMOTIVE ENGINEERING! Argonne Labs’ nano-coating banishes friction, self-heals New sensor ICs critical for safety Nissan’s latest Titanic truck cab All eyes on MOBILEYE What’s next from CTO Amnon Shashua and his benchmark ADAS tech? March 2017 autoengineering.sae.org New eye on the road One of the industry’s hottest tech suppliers is blazing the autonomy trail by crowd-sourcing safe routes and using AI to learn to negotiate the road. Mobileye’s co-founder and CTO explains. by Steven Ashley With 15 million ADAS-equipped vehicles worldwide carrying Mobileye EyeQ vision units, Amnon Shashua’s company has been called “the benchmark for applied image processing in the [mobility] community.” mnon Shashua, co-founder and Chief image-processing ‘system-on-a-chip’ would be enough to reliably ac- Technology Officer of Israel-based Mobileye, complish the true sensing task at hand, thank you very much. And, it tells a story about when, in the year 2000, would do so more easily and inexpensively than the favored alternative he first began approaching global carmakers to radar ranging: stereo cameras that find depth using visual parallax. Awith his vision—that cameras, processor chips and software-smarts could lead to affordable advanced driver-assistance systems (ADAS) and eventually to zFAS and furious self-driving cars. Seventeen years later, some 15 million ADAS-equipped vehicles “I would go around to meet OEM customers to try worldwide carry Mobileye EyeQ vision units that use a monocular to push the idea that a monocular camera and chip camera. The company is now as much a part of the ADAS lexicon as could deliver what would be needed in a front-facing are Tier-1 heavyweights Delphi and Continental.
    [Show full text]
  • Program & Exhibits Guide
    FROM CHIPS TO SYSTEMS – LEARN TODAY, CREATE TOMORROW CONFERENCE PROGRAM & EXHIBITS GUIDE JUNE 24-28, 2018 | SAN FRANCISCO, CA | MOSCONE CENTER WEST Mark You Calendar! DAC IS IN LAS VEGAS IN 2019! MACHINE IP LEARNING ESS & AUTO DESIGN SECURITY EDA IoT FROM CHIPS TO SYSTEMS – LEARN TODAY, CREATE TOMORROW JUNE 2-6, 2019 LAS VEGAS CONVENTION CENTER LAS VEGAS, NV DAC.COM DAC.COM #55DAC GET THE DAC APP! Fusion Technology Transforms DOWNLOAD FOR FREE! the RTL-to-GDSII Flow GET THE LATEST INFORMATION • Fusion of Best-in-Class Optimization and Industry-golden Signoff Tools RIGHT WHEN YOU NEED IT. • Unique Fusion Data Model for Both Logical and Physical Representation DAC.COM • Best Full-flow Quality-of-Results and Fastest Time-to-Results MONDAY SPECIAL EVENT: RTL-to-GDSII Fusion Technology • Search the Lunch at the Marriott Technical Program • Find Exhibitors www.synopsys.com/fusion • Create Your Personalized Schedule Visit DAC.com for more details and to download the FREE app! GENERAL CHAIR’S WELCOME Dear Colleagues, be able to visit over 175 exhibitors and our popular DAC Welcome to the 55th Design Automation Pavilion. #55DAC’s exhibition halls bring attendees several Conference! new areas/activities: It is great to have you join us in San • Design Infrastructure Alley is for professionals Francisco, one of the most beautiful who manage the HW and SW products and services cities in the world and now an information required by design teams. It houses a dedicated technology capital (it’s also the city that Design-on-Cloud Pavilion featuring presentations my son is named after).
    [Show full text]