automotive design automation
play

Automotive Design Automation Chung-Wei Lin cwlin@csie.ntu.edu.tw - PowerPoint PPT Presentation

From Electronic Design Automation to Automotive Design Automation Chung-Wei Lin cwlin@csie.ntu.edu.tw Assistant Professor CSIE Department National Taiwan University April 2019 Connected and Autonomous Vehicles A good application may need


  1. From Electronic Design Automation to Automotive Design Automation Chung-Wei Lin cwlin@csie.ntu.edu.tw Assistant Professor CSIE Department National Taiwan University April 2019

  2. Connected and Autonomous Vehicles ❑ A good application may need both of "connectivity" and "autonomy" Intersection Management Video (20170822-2) ➢ What if the intersection management does not have connectivity? ➢ What if the intersection management does not have autonomy? 2

  3. Connected Applications ❑ Connectivity realizes more applications, together with ➢ ADAS ➢ Autonomous functions Emergency Vehicle Warning Intersection Management Jamming Spoofing Cooperative Adaptive Cruise Control ! Side Road Merging Sharp Curve Assistant 3

  4. Software Design Complexity ❑ Various applications including Advanced Driver Assistance Systems (ADAS) and autonomous functions ❑ Various software programs for sensing, signal processing, control, Pre-Collision System (PCS) decision making, etc. ➢ Embedded software value to vehicle's total value Lane Departure Alert (LDA) • 2% → 13% from 2000 to 2010 ➢ Number of lines of code • 1 → 10+ → 100 million from 2000 → 2010 → now Automatic High Beams (AHB) ❑ Due to the safety-critical nature, correctness and quality of Pre-Collision System with Pedestrian Detection Function (PCS w/PD) software are extremely important http://www.toyota.com/safety-sense/ Dynamic Radar Cruise Control (DRCC) 4

  5. Hardware Design Complexity ❑ Number of Electronic Control Units (ECUs) ➢ 20 → 50+ in the past decade ❑ Integrated architecture ➢ One function can be distributed over multiple ECUs, and multiple functions can be supported by one ECU • More sharing and contention among software functions • Traditional federated architecture: each function is deployed to one ECU and provided as a black-box by its supplier ❑ New computational components ➢ Field Programmable Gate Array (FPGA) ➢ Graphical Processing Unit (GPU) ❑ Next-generation communication protocols ➢ Ethernet-based protocols https://en.wikipedia.org/wiki/Ethernet 5

  6. "Design Automation" ❑ Consider different design metrics ➢ Safety, reliability, robustness, performance, etc. ❑ Assist system designers for early design decisions Project Project Test Definition and Integration Verification Concept of & Validation Operation and Use Case Operations Maintenance Requirements System Requirements and Verification Architecture and Validation Specification Integration, Detailed Test, and Design Verification Implementation 6 https://en.wikipedia.org/wiki/V-Model_(software_development)

  7. EDA vs. Automotive Design Automation Modeling Design Analysis σ 1 σ 4 τ 1 τ 4 τ 7 functional Automotive Design model σ 2 σ 5 τ 2 τ 5 τ 8 output σ 6 σ 3 τ 3 τ 6 input architecture platform μ 1 μ 3 μ 4 μ 6 ε 1 ε 2 ε 3 μ 2 μ 5 P i INT P j periodic periodic activation activation μ 3 μ 6 μ 5 μ 1 μ 5 μ 4 μ 2 μ 3 μ 6 μ 5 μ 1 μ 5 μ 4 μ 2 schedule cycle cycle GND Automation (EDA) A current path Electronic Design from A to VCC3A H A C G (x p ,y p ) (x,y) (x q ,y q ) E VCC3A D A current path from VCC to B B VCC F intensity induced by intensity induced by aperture p aperture q 7

  8. EDA: Wire Routing and Wire Sizing 8

  9. Similar Problem in Automotive Design ❑ The wiring weight of a system can be up to 30kg ➢ The third heaviest and costliest component in an automotive system (after the chassis and the engine) ➢ Netlist • A set of "parts" to be connected ➢ Splice • Used for connecting more than two wires • Steiner vertex! ➢ Where to put splices? • Steiner tree problem 9

  10. EDA: FPGA and Bio-Chip Routing ❑ FPGA routing ❑ Bio-chip routing - Chang et al., "FPGA global routing based on a new congestion metric," ICCAD 1995. - Lin and Chang, "Cross-contamination aware design methodology for pin-constrained digital microfluidic biochips," DAC 2010. 10

  11. Similar Problem in Automotive Design No Traffic Light + No Traffic Light Traffic Light 5s Traffic Light 10s No Communication + Communication Video (20170822-1) Extension to Multiple Lanes Video (20170822-2) Video (20170822-2) 11

  12. Outline #1 #2 Placement Verification #4 #3 Security-Aware Software Integrity Design and Analysis 12

  13. One Example Formulation ❑ Software (functional model): task graph ❑ Hardware (architectural platform): distributed Electronic Control Units (ECUs) connected by a network Task Signal ECU Message Mapping σ 1 σ 4 σ 6 τ 1 τ 4 τ 7 τ 9 Functional Model σ 2 σ 5 τ 2 τ 5 τ 8 σ 3 τ 3 τ 6 Architectural Platform ε 1 ε 2 ε 3 μ 1 μ 2 μ 3 μ 4 μ 5 Network 13

  14. One Example Solution ❑ Decide task allocation and assign priorities to tasks on ECUs and messages on the network ❑ Satisfy timing constraints for tasks, signals, and paths Task Signal ECU Message Mapping σ 1 σ 4 σ 6 τ 1 τ 4 τ 7 τ 9 Functional Model σ 2 σ 5 τ 2 τ 5 τ 8 σ 3 τ 3 τ 6 Architectural Platform ε 1 ε 2 ε 3 μ 1 μ 2 μ 3 μ 4 μ 5 Network 14

  15. Edge Computing (1/2) Data Data Data Cloud too much High Intelligent data processing V2C2V Definition Driving Map too much traffic From Automotive Edge Computing Consortium 15

  16. Edge Computing (2/2) Data Data Data Cloud Local Local Local Local Data Data Data Data Edges High High Intelligent Intelligent V2C2V Definition V2C2V Definition Driving Driving Map Map From Automotive Edge Computing Consortium 16

  17. Outline #1 #2 Placement Verification #4 #3 Security-Aware Software Integrity Design and Analysis 17

  18. Motivations ❑ The traditional system development process is the V-model ➢ An OEM defines the specifications of components Requirements System Testing ➢ Suppliers implement System Design Integration Testing those components ❑ Formal verification can be Component Design Unit Testing applied to design models and Implementation implementations ➢ However, its scalability limits its applicability to systems of high complexity ❑ Runtime monitoring becomes a practical alternative ➢ Detect and notify when there is any specification or requirement violation during runtime 18

  19. Case Study ❑ Integration of two systems C C C ➢ Cooperative Pile-up A B A A B Mitigation System (CPMS) D D D ➢ False-start Prevention System (FPS) Without CPMS With CPMS ❑ Property specification language and automation tool ➢ Signal Temporal Logic (STL) • Extend Linear Temporal Logic (LTL) to specify properties over real time ➢ Breach [Donze '10] • Given a STL formula, synthesize an online monitor as a C++ program or a MATLAB S-function which can be realized as a Simulink block ❑ An assumption violation of CPMS is detected! 19

  20. Outline #1 #2 Placement Verification #4 #3 Security-Aware Software Integrity Design and Analysis 20

  21. ISO 26262 ❑ ISO 26262 is recognized as the state-of-the-art standard for functional safety of automotive systems ❑ Examples ➢ Some software structures are NOT recommended for highest Safety Integrity Level (SIL) Management • Dynamic objects and variables • Multiple uses of variable names & Operation Production Development Concept • Implicit type conversions Phase System Level • Unconditional jumps Hardware Level • Recursions Software Level Supporting Processes 21

  22. Motivations ❑ A potential conflict between certification issuers (e.g., OEM) and software suppliers (developers) ➢ A certification process represents a systematic way to inspect the source codes ➢ Some source codes of software suppliers (developers) are confidential ❑ Desired properties ➢ Authenticity • Only authenticated results from compilers and analysis tools (verification, simulation, and/or testing) are considered by the certification issuers ➢ Confidentiality • Sensitive source codes of the software suppliers and developers are not released to certification issuers 22

  23. Certification Protocol ❑ Trusted third-party ➢ Run a certification program which consists of a compiler and an analyzer ➢ Maintain a router which controls the input and the output ❑ Certification program ➢ All of the compiler, the analyzer, and the private key are updated by the OEM ➢ The updating process must be unidirectional to guarantee confidentiality ❑ Router ➢ Only the corresponding developer can be the receiver Trusted 3rd-Party Certification Program (Installed or Updated by OEM) Developer Supplier OEM Source Log for Codes Developer Log for Compiler Analyzer OEM Router Signature Signature Signing Signature Censoring Checking Checking Executable Public and Public and Physically Located at the Private Key Public Key Public Key Private Key Trusted 3rd-Party's Site 23

  24. Outline #1 #2 Placement Verification #4 #3 Security-Aware Software Integrity Design and Analysis 24

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend