Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

In addition to published specifications and code, and reference architecture information, GENIVI presents a family of technology and security-related technology briefs and whitepapers. 

These documents have also been published on the GENIVI home page.

Security Category

(green star) Certificate Pinning Technology Brief

Audience: Busy professionals, software engineers, as well as managers that need a quick awareness boost about risks and mitigations around encrypted communication channels.

Published with support from Irdeto.

(green star) Man-in-the-middle Whitepaper

Audience: Security professionals, system architects and implementers that need a deeper understanding of pitfalls and risks in implementing SSL/TLS, categories of attacks, and the type of mitigation that is effective against each.

Published with support from Irdeto.

Vehicle Domain Interaction Category

Vehicle Domain Interaction Category

Graphic Sharing & Distributed HMI


(green star) Sharing a physical display across multiple operating systems

  • This brief describes the Display Sharing which provides support in hardware for compositing the display output from multiple operating systems into a single final display buffer. Using this, a combined HMI can be created from independently operating systems without any additional interaction

...


(green star) Digital Cockpit HMI Distribution Using Shared State, Independent Rendering

...

  • WAMP (TBC)
  • Waltham protocol (TBC)

Security Category

(green star) Certificate Pinning Technology Brief

Audience: Busy professionals, software engineers, as well as managers that need a quick awareness boost about risks and mitigations around encrypted communication channels.

Published with support from Irdeto.

(green star) Man-in-the-middle Whitepaper

Audience: Security professionals, system architects and implementers that need a deeper understanding of pitfalls and risks in implementing SSL/TLS, categories of attacks, and the type of mitigation that is effective against each.

Published with support from Irdeto.