JOIN/SIGN UP
Already a Member? |
GET INVOLVED
Understanding and Engaging in COVESA Expert Groups & Projects |
COLLABORATIVE PROJECTS
HISTORICAL
SDV Telemetry Project - On Hold |
We use cookies on this site to enhance your user experience. By using this site, you are giving your consent for us to set cookies. |
In addition to published specifications and code, and reference architecture information, COVESA presents a family of technology and security-related tech-briefs and whitepapers.
Some of these are from GENIVI times, as evident by the logo and text.
Many documents have also been published on the COVESA home page
Vehicle Domain Interaction Category
This brief describes the Display Sharing category which provides support in hardware for compositing the display output from multiple operating systems into a single final display buffer. Using this, a combined HMI can be created from independently operating systems without any additional interaction
Published with support from Renesas
Digital Cockpit HMI Distribution Using Shared State, Independent Rendering
This brief introduction introduces the 5 identified categories of Graphics Sharing and describes a concrete application of
the Shared State / Independent Rendering approach for Navigation map interaction between an IVI unit display and an instrument cluster display.
Published with support from Harman
Published with support from ADIT
Published with support from BMW
This brief describes an approach and technologies essential to building a demonstrator for the interoperability of GENIVI IVI (and LInux) based IVI systems and Adaptive AUTOSAR systems.
Published with support from itemis and itk
Security Category
Audience: Busy professionals, software engineers, as well as managers that need a quick awareness boost about risks and mitigations around encrypted communication channels.
Published with support from Irdeto.
Audience: Security professionals, system architects and implementers that need a deeper understanding of pitfalls and risks in implementing SSL/TLS, categories of attacks, and the type of mitigation that is effective against each.
Published with support from Irdeto.