Safety Assessment of Autonomous Driving Functions: Fault Injection Simulation Testing

Safety Assessment of Autonomous Driving Functions: Fault Injection Simulation Testing

How to Know, How Can One Not Know Article from: Ranyun Automobile (ID: BC-Auto2018) As we entered 2018, the autonomous driving industry began to focus on commercialization issues. The application of any new technology, including autonomous driving, must meet two conditions: (1) a business model that creates value; (2) sufficient technological maturity. Regarding the first … Read more

Practical Guide to Fault Injection in Python

Practical Guide to Fault Injection in Python

Click the blue text to follow Hello everyone! Today we are going to discuss an interesting topic – fault injection. When developing robust systems, we need to ensure that not only the normal processes run smoothly, but also validate how the system performs under exceptional conditions. Fault injection is a testing method that simulates system … Read more

Multi-Channel Fault Injection Method for ARINC429 Bus in Avionics Relay Systems

Multi-Channel Fault Injection Method for ARINC429 Bus in Avionics Relay Systems

Follow “Avionics Technology Circle” for avionics news and technical insights~ Abstract In response to the issue of parallel fault injection for multiple channels in the integrated testing of civil aircraft avionics systems, this study investigates the fault injection method for the ARINC429 bus and implements functional design. First, the data interaction method of the avionics … Read more

Fault Injection in Diagnostic Protocols

Fault Injection in Diagnostic Protocols

Click the blue text above to follow us / Technical Exchange Group/ Add WeChat 15021948198 to apply for membership to download PPT & join the automotive network information security, testing evaluation, automotive electronics, autonomous driving technology exchange group, recruitment job-seeking group, investment and financing cooperation group… Related Articles [Grab Your Spot] Countdown! The 8th Information … Read more

ChaosBlade: A Tool for Large-Scale Kubernetes Fault Injection

ChaosBlade: A Tool for Large-Scale Kubernetes Fault Injection

Author | Ye Fei Source | Alibaba Middleware Team 1 ChaosBlade With the development of cloud-native technologies, the consistency, reliability, and flexible orchestration capabilities of cloud-native applications have led most enterprises to choose to migrate their applications to the cloud. However, the cloud infrastructure faces significant challenges in terms of stability and observability. ChaosBlade is … Read more

Summary of Side-Channel and Fault Injection Attacks

Summary of Side-Channel and Fault Injection Attacks

This article is contributed by the ChaMd5 Security Team IOT Group. This is a summary of the theoretical knowledge learned recently about side-channel attacks and fault injection. If there are any mistakes or areas for improvement, I hope experts will correct me. First, let’s introduce several common encryption algorithms. Encryption Algorithms RSA Encryption Algorithm RSA … Read more

Fault Injection Attack on FLASH Erasure Process

Fault Injection Attack on FLASH Erasure Process

Comprehensive Analysis of Chip Debug Interface Protection Mechanisms Author | Liu Zheng Editor | Liu Mengdi 1. Background Introduction Microcontrollers are the backbone of the modern interconnected world, with widespread applications in robotics, medical devices, aerospace, and automotive industries. With the development of the Internet of Things (IoT), microcontrollers have become even more prevalent in … Read more

Reliability Testing Based on Fault Injection Technology

Reliability Testing Based on Fault Injection Technology

Abstract: This article proposes a testing technology path aimed at design mechanisms for comprehensive verification of faults. By adopting the concept of comprehensive verification, we distill an integrated verification principle and implementation requirements based on fault injection methods. The article also presents implementation principles, processes, verification evaluation methods, and key technological connotations for application trade-offs, … Read more