The Best Tools for Driving Safety and Security in Automotive Applications
The reliability of safety-critical chips for automotive applications is a well-known imperative for high-end vehicles, making automotive applications the driver of reliable, repeatable and verifiable functional safety.
Safety-critical designs must be free from systematic errors. Development strategies must ensure development design flaws are handled with rigorous design verification, based on certified design methodologies with intricate requirements tracking. That’s why attention is drawn more than ever to the verification flow and strategic verification planning.
Similarly, recent vehicle hacks and system patches have highlighted the need for security to be seen as a safety-critical issue.
Automotive device verification therefore represents the state-of-the-art in methodologies overall. This means that automotive engineering designers involved in safety-critical development are evaluating a trove of verification tools in search of those that can meet the stringent requirements driven by regulations such as ISO26262. Formal verification and its thorough and exhaustive analysis, fault-simulation, emulation and specialized verification planning tools are all under consideration. One example is the verification of fault handling mechanisms, using fault injection by leveraging either traditional fault simulation or more modern formal verification. There are many more.
Meanwhile, protecting against vulnerabilities that allow the operation of a chip to be maliciously subverted has become key, and is likely to become part of a future version of ISO 26262. Special tools and techniques are required to ensure secure device operation.
A panel of knowledgeable verification experts from each discipline, along with users of such tools, will draw from their experiences to discuss and debate which tools are best for driving security and safety in automotive applications. They will be challenged by Moderator Paul Dempsey of Tech Design Forum and each other to defend their positions and will be expected to offer a clear, concise rationale for the use of a particular tool. Panelists will be asked as well to describe the ideal strategic verification plan for these types of application. Audience participation will be encouraged. The discussion will conclude with a look toward other technology sectors that will soon add reliability to their verification planning strategy.
This will be a lively, thought-provoking discussion covering the range of verification challenges for security and automotive applications related to ISO26262. Attendees can expect to hear the speakers’ personal experiences working within the standard's envelope. At the conclusion, the audience will have a clear picture of the serious verification challenges facing this sector and how the rigorous verification planning it requires could soon be required elsewhere.