2016 IEEE 11th International Symposium on Applied Computational Intelligence and Informatics (SACI) 2016
DOI: 10.1109/saci.2016.7507429
|View full text |Cite
|
Sign up to set email alerts
|

Delta flashing of an ECU in the automotive industry

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(4 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…One of the main contributions of this study is the significant reduction in downtime during the update process as well as the elimination of the need for rebooting the end device after the update. Moreover, this method aims to overcome some limitations associated with the delta firmware update method described in [3,12,15], namely, the requirement to reconstruct the firmware from the deltas, leading to resource savings and process simplification.…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the main contributions of this study is the significant reduction in downtime during the update process as well as the elimination of the need for rebooting the end device after the update. Moreover, this method aims to overcome some limitations associated with the delta firmware update method described in [3,12,15], namely, the requirement to reconstruct the firmware from the deltas, leading to resource savings and process simplification.…”
Section: Resultsmentioning
confidence: 99%
“…With regard to the efficient use of the communications channel, the literature refers to methods for optimising the data transmission to be updated. Bogdan [3] focuses on optimising data transmission in firmware update processes, detailing the concept of delta transmission and its combination with data compression. That work is based on the use of opcodes instead of addresses, offering an innovative perspective to efficiently transmit the updates.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, different security mechanisms have been used to secure the software updates by means of hashing mechanisms [13,14] as well as symmetric and asymmetric cryptographic mechanisms [15,16]. SOTA approaches have been extended by using compression [17] and delta flashing [18] to reduce the network utilization and bandwidth used for software updates. Blockchain-based approaches [19,20] have also been considered for performing software updates for vehicles to guarantee the authenticity and integrity of new updates.…”
Section: Related Workmentioning
confidence: 99%
“…In this way, the need to use a programmer-debugger which is an expensive device is eliminated. In the literature there are presented bootloaders for different kind of microcontrollers, such as PIC [3], AVR [4], ARM [5], Renesas [6], [7] and NXP [8]. Texas Instruments MSP bootloaders are also presented in [9], [10] and [11].…”
Section: Introductionmentioning
confidence: 99%