Browse Topic: Computer software and hardware
ABSTRACT Currently there is no method to ensure that the software loaded on a vehicle has been compromised at the software level. Common practice is to use physical port security to secure all network and data bus connection points with physical devices requiring tool, keys, or damage to tamper evident devices to prevent, inhibit, or discourage unauthorized connection; turn off access to the ports in the BIOS and password protect the BIOS. As well as give non-admin access to user accounts and password protect the operating systems. All these countermeasures help to prevent access but there is no way to tell if the software was compromised if not detected by these methods. Blockchain technology ensures that the software has not been compromised by comparing a hash generated at start up and comparing it to the distributed ledger. This technology helps to bring Warfighter technology into the future
ABSTRACT The U.S. Army must adapt and upgrade ground platforms at the speed of technology advancement to maintain competitive advantages over adversaries. The Program Executive Office (PEO) Ground Combat Systems (GCS) Common Infrastructure Architecture (GCIA) is a new ground systems approach to enable persistent modernization of future platforms. For legacy platforms, Project Lead Capability Transition and Product Integration (PL CTPI) is developing plans to incrementally incorporate standards and portions of GCIA where feasible and affordable on legacy platforms. The GCIA will enable rapid integration of ground system capabilities, increasing the Army’s ability to counter emergent threats on the battlefield. Citation: PEO GCS / PL CTPI, “Architecting for Persistent Modernization,” In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 16-18, 2022
ABSTRACT Selecting component software for next generation vehicular and payload electronics is an increasingly difficult challenge. There are many culprits, including increased complexity at the silicon level that can ultimately enable the software defined “tank” of the future. This paper will address software criteria and development processes required to deploy a standards-based, net-enabled military ground vetronics capability and provide demonstrable foundational technology
ABSTRACT This paper explores the construction of a Trusted Execution Environment (TEE) which doesn’t rely on TrustZone or specific processing modes in order to achieve a high-performance operating environment with multiple layers of hardware enforced confidentiality and integrity. The composed TEE uses hardware intellectual property (IP) blocks, existing hardware-level protections, a hypervisor, Linux security module (LSM), and Linux kernel capabilities including a file system in order to provide the performance and multiple layers of confidentiality and integrity. Additionally, the TEE composition explores both open source and commercial solutions for achieving the same result. Citation: J. Kline, “High Performance Trusted Execution Environment”, In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 13-15, 2019
ABSTRACT This paper describes a software infrastructure made up of tools and libraries designed to assist developers in implementing computational dynamics applications running on heterogeneous and distributed computing environments. Together, these tools and libraries compose a so called Heterogeneous Computing Template (HCT). The underlying theme of the solution approach embraced by HCT is that of partitioning the domain of interest into a number of sub-domains that are each managed by a separate core/accelerator (CPU/GPU) pair. The five components at the core of HCT, which ultimately enable the distributed/heterogeneous computing approach to large-scale dynamical system simulation, are as follows: (a) a method for the geometric domain decomposition; (b) methods for proximity computation or collision detection; (c) support for moving data within the heterogeneous hardware ecosystem to mirror the migration of simulation elements from subdomain to subdomain; (d) parallel numerical
ABSTRACT The importance of hardening robotic and autonomous systems (RAS) considered for field deployment against cyber threats has been recognized by organizations across the Department of Defense (DoD). Among these needs is the ability to securely provide these modern military vehicles with software updates containing critical new functionality and security improvements. A secure update process and system for military RAS has been implemented building on a framework designed for the automotive industry. Demonstrations of the capabilities and mitigations against possible attacks on the update process will be performed on a RAS MRZR in a mock field environment. Citation: S. Pereira, C. Mott, D. Mikulski, “Secure Update Process For Robotic And Autonomous Systems,” In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 15-17, 2023
ABSTRACT The U.S. Army has realized the need to change its procurement strategy to demand shorter equipment fielding times, delivering capabilities with clear military value that can be improved in low risk increments. This paper addresses the need for a C4ISR infrastructure based on open standards that can be sourced from multiple vendors and host the full spectrum of applications. The Distributed Computing Environment (DCE) -- is a computing and network infrastructure scalable from handheld and dismounted form factors through redundant, distributed clusters supporting multiple secure enclaves, and qualified for the most stringent of ground combat environments. The DCE captures the benefits of commercial-off-the-shelf (COTS) capitalization surrounding the x86 architecture, and implements open standards including OpenVPX, POSIX, Gigabit Ethernet, the Object Management Group Data Distribution Service, and the Service Availability Forum. Packaged COTS subsystems implement the hardware as
ABSTRACT Software systems, like physical systems, require explicit architectural descriptions to increase system level comprehension. Developing networked robotic systems of diverse physical assets is a continuing challenge to developers. Problems often multiply when adding new hardware/software artifacts or when reconfiguring existing systems. This work describes a method to create reconfigurable software for Army robotic systems via model-based, graphical domain-specific languages and reusable components. The paradigm makes use of feature models, the basis for product line software that describes and constrains variable aspects of the robotic system’s hardware and associated software. Domain-specific languages use terms understandable to domain engineers and technicians. Users of the modeling environment are able to stay at a high level of abstraction and need not concern themselves with the details of the composed and generated code
ABSTRACT Optical distortion measurements for transparent armor (TA) solutions are critical to ensure occupants can see what is happening outside a vehicle. Unfortunately, optically transparent materials often have poorer mechanical properties than their opaque counterparts which usually results in much thicker layups to provide the same level of protection. Current standards still call for the use of a double exposure method to manually compare the distortion of grid lines. This report presents provides a similar method of analysis with less user input using items typically available in many mechanics labs: machine vision cameras and digital image correlation software. Citation: J. M. Gorman, “An Easier Approach to Measuring Optical Distortion in Transparent Armor”, In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 11-13, 2020. The views presented are those of the author and do not necessarily represent the views of DoD or
ABSTRACT Increased complexity of ground combat vehicles drives the need to support software applications from a broad variety of sources and seamlessly integrate them into a vehicle system. Traditionally, hosting GOTS and COTS applications required burdening a vehicle’s computing infrastructure with dedicated hardware tailored to specific processors and operating systems, heavily impacting the vehicles space, weight and power systems. Alternatively, porting the applications to the vehicles native computer systems is often cost prohibitive and error prone. Advancements in commercially developed software virtualization capabilities bring an entirely new approach for dealing with this challenge. Virtualization allows real-time and non-real-time applications running on different operating systems to operate seamlessly alongside each other on the same hardware. The benefits include reduced software porting costs and reduced qualification efforts. Additionally, elimination of specialized
ABSTRACT Vehicle design today takes longer than it ever has in the past largely due to the abundance of requirements, standards, and new design techniques; this trend is not likely to change any time soon. This paper will explore how advancements in gaming engines can be leveraged to bring realistic visualization and virtual prototypes to the beginning of the design cycle, integrate subsystems earlier in the design, provide advanced simulation capabilities, and ensure that the final design not only meets the requirements but is fully vetted by stakeholders and meets the needs of the platform. The Unreal Engine and Bravo Framework can be used to bring this and more to vehicle designs to reduce design churn and bring better products to market faster. Citation: A. Diepen, O. Vazquez, A. Black, C. Gaff “Leveraging Simulation Tools to Accelerate Design,” In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 16-18, 2022
ABSTRACT Model Based Systems Engineering (MBSE) has been a dominant methodology for defining and developing complex systems; however, it has not yet been paired with cutting-edge digital engineering transformation. MBSE is constrained to represent a whole system, but lacks other capabilities, such as dynamic simulation and optimization, as well as integration of hardware and software functions. This paper provides the key elements for developing a Smart MBSE (SMBSE) modeling approach that integrates Systems Engineering (SE) functionality with the full suite of other development tools utilized to create today’s complex products. SMBSE connects hardware and software with a set of customer needs, design requirements, program targets, simulations and optimization functionalities. The SMBSE modeling approach is still under development, with significant challenges for building bridges between conventional Systems Engineering methodology, with additional capabilities to reuse, automate
ABSTRACT Standard specifications give programs the flexibility of developing large systems from smaller pieces that can communicate between one another in a standard fashion. This benefit is lost, however, if there is no way to verify that vendors successfully adhere to the standard in question. The Vehicular Integration for Command, Control, Communications, and Computers (C4), Intelligence Surveillance and Reconnaissance (ISR) Electronic Warfare (EW) Interoperability (VICTORY) standards aim to create interoperability across various C4ISR/EW and platform systems installed on military ground vehicles while reducing size, weight, and power (SWaP) and enabling additional capabilities. The VICTORY Compliance Test Suite (CTS) provides a method to test hardware and software according to the standard specifications to ensure interoperability between VICTORY compliant components
ABSTRACT This paper outlines the results from an ongoing collaborative development effort to apply a new powertrain controller in a real combat vehicle application. Specifically, TARDEC and L3T CPS have partnered to demonstrate a production viable electronically controlled fuel injected (EFI) version of the AVDS 1790 diesel engine, used in the M88 HERCULES vehicle. Highlights of the development project focus on coordinated engineering activity involving the following key enablers. The neXtECU jointly developed by ETAS and TARDEC, custom engineered to become a common powertrain controller for use on the Army’s future family of combat vehicles Engine control software jointly developed by TARDEC and L3T to perform EFI fuel system controls and auxiliary powertrain functions using the neXtECU AVDS 8CR 1050 hp engine with L3T design modifications to incorporate a derivative of a commercially available EFI fuel system
ABSTRACT The Vehicular Integration for Command, Control, Communication, Computers, Intelligence, Surveillance and Reconnaissance / Electronic Warfare (C4ISR/EW) Interoperability (VICTORY) standards is an open architecture that defines how software and hardware are shared as common resources among services that make up a platform’s capabilities such as Ethernet switches and routers, end nodes, processing units, as well as functionality such as position and navigation systems, radios, health monitoring, and automotive. The VICTORY standard enables reducing the total Size, Weight, and Power (SWaP), and Costs (SWaP-C) on a platform. As part of the Information Assurance (IA) capabilities of the VICTORY standard, the VICTORY Access Control Framework (VACF) provides protection to these shared resources in the form of an Attribute-Based Access Control (ABAC) system. The VACF is composed of five VICTORY component types: Authentication, Attribute Store, Policy Store, Policy Decision, and Policy
ABSTRACT FEV North America will discuss application of advanced automotive cybersecurity to smart vehicle projects, - software safety - software architecture and how it applies to similar features and capabilities across the fleet of DoD combat and tactical vehicles. The analogous system architectures of automotive and military vehicles with advanced architectures, distributed electronic control units, connectivity to networks, user interfaces and maintenance networks and interface points clearly open an opportunity for DoD to leverage the technology techniques, hardware, software, management and human resources to drive implementation costs down while implementing fleet modifications, infrastructure methodology and many of the features of the automotive cyber security spectrum. Two of the primary automotive and DoD subsystems most relevant to Cyber Security threat and protection are the automotive connected vehicles analogous to the DoD Command, Control, Communications, Computers
ABSTRACT Virtualization is becoming an important technology for military embedded systems. The advantages to using virtualization start with its ability to facilitate porting to new hardware designs or integrating new software and applications onto existing platforms. Virtualization is a tool to reuse existing legacy software on new hardware and to combine new features alongside existing proven software. For embedded systems, especially critical components of military systems, virtualization techniques must have the ability to meet performance requirements when running application software in a virtual environment. Together, these needs define the key factors driving the development of hypervisor products for the embedded market: a desire to support and preserve legacy code, software that has been field-proven and tested over years of use; and a need to ensure that real-time performance is not compromised. Embedded-systems developers need to understand the power and limitations of
ABSTRACT Leveraging an open standard may still not achieve the desired interoperability between systems. Addressing “lessons learned” from past implementations of open standards for various Department of Defense (DoD) acquisition programs is critical for future success. This paper discusses past issues which range from insufficient technical detail, when and how to apply a given specification, verification of an implementation’s compliance, to inconsistent and imprecise contractual language. This paper illustrates how the Vehicular Integration for C4ISR/EW Interoperability (VICTORY) initiative addresses these challenges to enable interoperability on Army ground vehicles, as well as facilitate rapid technology insertion and incorporation of new capabilities. VICTORY represents a leap ahead in solving interoperability challenges and defining open standards
ABSTRACT A methodology based on a combination of commercial software tools is developed for rendering complex acoustic scenes in real time. The methodology aims to bridge the gap between real time acoustic rendering algorithms which lack important physics for the exterior urban environment and more rigorous but computationally expensive geometric or wave-based acoustics software by incorporating pre-computed results into a real time framework. The methodology is developed by surveying the best in class commercial software, outlining a general means for accommodating results from each, and identifying areas where supplemental capability is required. This approach yields a real time solution with improved accuracy. Strengths and limitations in current commercial technologies are identified and summarized
ABSTRACT The objective is to develop a human-multiple robot system that is optimized for teams of heterogeneous robots control. A new human-robot system permits to ease the execution of remote tasks. An operator can efficiently control the physical multi-robots using the high level command, Drag-to-Move method, on the virtual interface. The innovative virtual interface has been integrated with Augmented Reality that is able to track the location and sensory information from the video feed of ground and aerial robots in the virtual and real environment. The advanced feature of the virtual interface is guarded teleoperation that can be used to prevent operators from accidently driving multiple robots into walls and other objects
ABSTRACT Robotic Wingman (RW) is an advanced unmanned systems concept integrated with current operational tactics to enhance the force effectiveness of combat vehicle platoon and substantially enhance the survivability of manned vehicles in combat operations. Two approaches to RW; reconfiguring common fleet and new/unique platoon vehicles. Each approach has its advantages in wingman operations. This paper will discuss the approaches, the required technologies and program implementations. RW combat effectiveness and advances in force survivability will be assessed and discussed in both approaches. Advanced technology including sensors, autonomy, communications and automated behaviors will enable the RW to look, move, and act like companion manned vehicle. For its optimum effectiveness, the RW wants to cause the enemy to engage it first. The automation of the manned fleet to implement and achieve unmanned system performance similar to manned operations and is required to fool the enemy
ABSTRACT Program offices and the test community all desire to be more efficient with respect to testing but currently lack the analytical tools to help them fit early subsystem level testing into a framework which allows them to perform assessments at the system level. TARDEC initiated a Small Business Innovative Research (SBIR) effort to develop and deploy a system reliability testing and optimization tool that will quantify the value of subsystem level tests in an overall test program and incorporate the results into system level evaluations. The concept software, named the Army Lifecycle Test Optimization (ALTO) tool, provides not only the optimization capability desired, but also other key features to quickly see the current status, metrics, schedule, and reliability plots for the current test plan. As the user makes changes to the test plan, either by running the optimization or adjusting inputs or factors, the impacts on each of these areas is computed and displayed
ABSTRACT This paper discusses the Diagnostics And System Health (DASH) embedded diagnostics software originally developed for use on the M109A7 / M992A3 Family of Vehicles (FoV). The history and background of work completed by the DEVCOM Armaments Center (AC) System Health & Interactive Future Technologies (SHIFT) Division in developing and managing the DASH program are described. The DASH software architecture and design details are also discussed in depth, with a focus on the more recent efforts to adapt DASH to use a generic core software application that can be integrated on a wide variety of current and future ground combat systems to more easily provide embedded diagnostics capability. Citation: A. Ludwig, D. Tagliente, “Enabling Custom Vehicle Diagnostics with a Common Application Platform”, In Proceedings of the Ground Vehicle Systems Engineering and Technology Symposium (GVSETS), NDIA, Novi, MI, Aug. 10-12, 2021
ABSTRACT Use of Model-Based Design (MBD) processes for embedded controls software Development has been purported for nearly the last decade to result in cost, quality, and delivery improvements. Initially the business case for MBD was rather vague and qualitative in nature, but more data is now becoming available to support the premise for this development methodology. Many times the implementation of MBD in an organization is bundled with other software process improvements such as CMMI or industry safety standards compliance, so trying to unbundle the contributions from MBD has been problematic. This paper addresses the dominant factors for MBD cost savings and the business benefits that have been realized by companies in various industries engaged in MBD development. It also summarizes some key management best practices and success factors that have helped organizations achieve success in MBD deployment
ABSTRACT The proliferation of information technology adds expanded capabilities and exposes new vulnerabilities through cyber warfare. To combat new threats software quality must go beyond CMMI maturity levels and embrace a software development lifecycle (SDLC) with measurable cybersecurity assurance. Standard cybersecurity artifacts throughout the SDLC should be expected and available for inspection. Integrated software applications can confidently and rapidly reduce their threat exposure by incorporating reusable data management components with a pedigree of cybersecurity SDLC assurance evidence
Items per page:
50
1 – 50 of 6222