{"id":12214,"date":"2016-05-10T08:10:57","date_gmt":"2016-05-10T15:10:57","guid":{"rendered":"https:\/\/blogs.mentor.com\/verificationhorizons\/?p=12214"},"modified":"2026-03-27T08:37:21","modified_gmt":"2026-03-27T12:37:21","slug":"5-things-i-learned-at-the-2016-sae-world-congress","status":"publish","type":"post","link":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/2016\/05\/10\/5-things-i-learned-at-the-2016-sae-world-congress\/","title":{"rendered":"5 Things I Learned at the 2016 SAE World Congress"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2016\/05\/IMG_6642.jpg\" rel=\"attachment wp-att-12213\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-12213 alignright\" src=\"https:\/\/blogs.sw.siemens.com\/wp-content\/uploads\/sites\/54\/2016\/05\/IMG_6642-520x390.jpg\" alt=\"IMG_6642\" width=\"299\" height=\"227\" \/><\/a>A few weeks ago I had the honor of <a href=\"http:\/\/papers.sae.org\/2016-01-0066\/\" target=\"_blank\" rel=\"noopener noreferrer\">presenting a paper<\/a> related to my prior Verification Horizons blog posts on \u201c<em>How Formal Techniques Can Keep Hackers from Driving You into a Ditch<\/em>\u201d (<a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2015\/08\/05\/how-formal-techniques-can-keep-hackers-from-driving-you-into-a-ditch-part-1-of-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 1<\/a>, <a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2015\/08\/18\/how-formal-techniques-can-keep-hackers-from-driving-you-into-a-ditch-part-2-of-2\/\" target=\"_blank\" rel=\"noopener noreferrer\">Part 2<\/a>) at the annual Society of Automotive Engineers (SAE) World Congress in Detroit, MI. Being an IEEE member for many years, it was intriguing to enter this parallel universe of professionals equally interested in advancing the state of their art. This year in particular, the incredible momentum behind automotive automation gave this conference a palpable energy \u2013 below are but 5 aspects of this.<\/p>\n<p><strong>1 &#8211; The auto industry is now taking vehicle security very seriously<\/strong> &#8212; Apparently the infamous \u201cJeep hack\u201d story and subsequent recall was a real watershed &#8212; automakers and their suppliers took this as a wake-up call to allocate substantial new R&amp;D resources to this area. Indeed, informally scanning the audiences\u2019 badges and striking up conversations in the \u201cCyber Security\u201d and related \u201cSafety Critical\u201d conference tracks revealed that these sessions were well attended by representatives from all walks of the industry, and the <a href=\"http:\/\/www.sae.org\/servlets\/techSession?EVT_NAME=ANNUAL&amp;GROUP_CD=INTL&amp;SCHED_NUM=217486&amp;REQUEST_TYPE=SESSION_LIST&amp;BYTRACK=ETRON\" target=\"_blank\" rel=\"noopener noreferrer\">expert panel discussions and papers themselves<\/a> were very substantive.<\/p>\n<p><strong>2 &#8211; Learn to \u201cthink maliciously\u201d<\/strong> \u2013 from the panel on <a href=\"http:\/\/www.sae.org\/servlets\/techSession?EVT_NAME=AE202&amp;GROUP_CD=TSESS&amp;SCHED_NUM=239093&amp;tab=sessionDetails&amp;REQUEST_TYPE=SESSION_DETAILS&amp;saetkn=1g0QVHbDK9\" target=\"_blank\" rel=\"noopener noreferrer\">\u201c<em>With Connectivity, Comes Risks &#8211; Cybersecurity and Safety<\/em>\u201d<\/a> one of the panelists implored design &amp; verification engineers to always consider how someone could misuse a diagnostic port or routine for evil and not good. Example: think about how something necessary like a command to disable the anti-lock brakes to bleed off the pressure before maintenance can be safely performed could be manipulated by a Trojan Horse to disable the brakes during a deliberately unsafe moment, or when the vehicle crosses a particular GPS geofence area. (In a related Verification Horizons post <a href=\"https:\/\/blogs.mentor.com\/verificationhorizons\/blog\/2015\/12\/20\/iso-26262-fault-analysis-worst-case-is-really-the-worst\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u201c<em>ISO 26262 fault analysis \u2013 worst case is really the worst<\/em>\u201d<\/a>, my colleague Avidan Efody explores a variant of this issue.)<\/p>\n<p><strong>3 &#8211; The CAN bus must go, but it\u2019s going to be a painful transition<\/strong> \u2013 The <a href=\"https:\/\/en.wikipedia.org\/wiki\/CAN_bus\" target=\"_blank\" rel=\"noopener noreferrer\">Controller Area Network (CAN)<\/a> is the bus protocol that connects the internal control systems of most cars. Indeed, even a cursory stroll across the SAE World Congress expo floor will expose you to a wide variety of CAN-related offerings. Before cars were connected to the internet CAN served vehicle requirements well; but by computer networking standards it\u2019s not that fast (40 Kbit\/s to 125 Kbits\/sec) and the payload size is very small <a href=\"http:\/\/www.ti.com\/lit\/an\/sloa101a\/sloa101a.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">(a grand total of 64 bits)<\/a>. This small payload size is CAN\u2019s Achilles Heel \u2013 there are simply not enough bits to embed digital signature or other security-related data in a payload this small, leaving the whole bus vulnerable. Hence, it\u2019s trivial to do things like a basic \u201creplay attack\u201d (e.g. recording a door unlock sequence, then \u201creplay\u201d the signals when you want to steal the car without a trace). My personal bet to replace CAN is the emerging Automotive Ethernet standard (<a href=\"http:\/\/www.prnewswire.com\/news-releases\/automotive-ethernet-hits-the-road-in-wide-range-of-new-vehicles-300159260.html\" target=\"_blank\" rel=\"noopener noreferrer\">that\u2019s already been embraced by BMW, Jaguar, and VW<\/a>) because all the cyber security work in the computer and mobile networking worlds can be brought to bear.<\/p>\n<p><strong>4 &#8211; A new rev of ISO26262 is on the horizon<\/strong> &#8212; this is old news for anyone in the Functional Safety field, but semiconductor makers and EDA suppliers should be aware that the upcoming revision has specific provisions for <a href=\"https:\/\/nmi.org.uk\/wp-content\/uploads\/2016\/01\/HORIBA-MIRA-ISO-26262-NMI-Jan-16-DDW.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cSemiconductor Functional Safety\u201d<\/a>.<\/p>\n<p><strong>5 &#8211; The auto industry as a whole is reinvigorated<\/strong> \u2013 as noted above, thanks to the whole movement toward more automated vehicles, there was energy crackling through the conference. Throughout the sessions I attended, and in the conversations on the expo floor, the engineers and managers from a myriad of disciplines were eagerly unpacking the challenges and brainstorming solutions. Case in point, on a panel on \u201c<em>Collaborate. Create. Commercialize. The Next Gen Supplier Network<\/em>\u201d, the VP of Purchasing for Toyota North America, a 20+ year veteran of the car business, summarized it best, \u201c<em>There has never been a better time to be in automotive!<\/em>\u201d<\/p>\n<p>Until the fully autonomous car is in production, keep your eyes on the road and your hands up on the wheel,<\/p>\n<p>Joe Hupcey III<\/p>\n<p>&nbsp;<\/p>\n<p>P.S. My colleagues are presenting at the Functional Safety and ISO26262 track at the upcoming IESF Automotive Conference on June 1 in Dearborn, MI \u2013 the complete agenda is posted here: <a href=\"https:\/\/www.mentor.com\/events\/iesf\/automotive-conference\" target=\"_blank\" rel=\"noopener\">https:\/\/www.mentor.com\/events\/iesf\/automotive-conference<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A few weeks ago I had the honor of presenting a paper related to my prior Verification Horizons blog posts&#8230;<\/p>\n","protected":false},"author":71594,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spanish_translation":"","french_translation":"","german_translation":"","italian_translation":"","polish_translation":"","japanese_translation":"","chinese_translation":"","footnotes":""},"categories":[1],"tags":[408,493,559,668,692,697],"industry":[],"product":[],"coauthors":[],"class_list":["post-12214","post","type-post","status-publish","format-standard","hentry","category-news","tag-cyber-security","tag-formal-verification","tag-iso-26262","tag-questa-secure-check","tag-sae","tag-safety-critical"],"_links":{"self":[{"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/posts\/12214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/users\/71594"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/comments?post=12214"}],"version-history":[{"count":1,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/posts\/12214\/revisions"}],"predecessor-version":[{"id":19820,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/posts\/12214\/revisions\/19820"}],"wp:attachment":[{"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/media?parent=12214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/categories?post=12214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/tags?post=12214"},{"taxonomy":"industry","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/industry?post=12214"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/product?post=12214"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blogs.sw.siemens.com\/verificationhorizons\/wp-json\/wp\/v2\/coauthors?post=12214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}