Virtualization and Hard Isolation for Safety in Intelligent Cockpit Computing

Virtualization and Hard Isolation for Safety in Intelligent Cockpit Computing

Virtualization technology improves resource utilization and flexibility by allowing multiple virtual machines (VMs) to share underlying physical resources, but it also brings challenges in security and isolation. Hard isolation is a key mechanism to ensure that VMs do not interfere with each other, preventing malicious attacks or accidental failures from spreading from one VM to … Read more

Formal Methods Based on SCADE Models

Formal Methods Based on SCADE Models

In the previous issue of the embedded systems special, we provided a detailed overview of the birth, development, and application of Ansys SCADE (See: Embedded Systems | A Retrospective on Ansys SCADE). This article will focus on “Formal Methods Based on SCADE Models”. To put it simply, formal methods abstract a program into a mathematical … Read more