519-888-4567 x34871
Location: 
DC 2337
Research Expertise
  • Analysis of software requirements and specifications with computer-aided tools and techniques
  • Configurable model-driven development (MDD)
  • Practitioner-friendly specification and design notations that have precise semantics suitable for automated analysis
  • Software modeling, model checking, documentation, and analysis

Waterloo Formal Methods Research Group

Group(s): 
Connected and Autonomous→Vehicle control; Software and Data→Embedded software, Hazard and safety analysis; A to D profiles
519-888-4567 x37137
Location: 
E3 3157
Research Expertise
  • Embedded systems and software
  • Generative programming and model-based software development
  • Software design
  • Software system families and product lines

Waterloo Intelligent Systems Engineering Lab (WISE Lab)

Group(s): 
Connected and Autonomous→Autonomous driving, V2X - Communications; Software and Data→Embedded software, Multi-disciplinary optimization; A to D profiles
519-888-4567 x35321
Location: 
DC 2335
Research Expertise
  • Development of automated and interactive formal methods tools
  • Formal methods of system analysis
  • Hardware verification
  • Requirements specification and analysis
  • Software Engineering
  • System safety

Waterloo Formal Methods (WatForm) 

Software Engineering Lab

Group(s): 
Software and Data→Embedded software, Hazard and safety analysis; A to D profiles
519-888-4567 x33694
Location: 
E5 4112
Research Expertise
  • Distributed Embedded Real-Time Systems
  • Real-Time Safety Critical Software

Real-time Embedded Software Group

Group(s): 
Connected and Autonomous→Autonomous driving, Mobile security, V2X - Communications; Software and Data→Embedded software; E to H profiles
519-888-4567 x33539
Location: 
EIT 4014
Research Expertise
  • Embedded Hardware Security
  • Countermeasures for Hardware Hacking, including techniques for resistance to side channel analysis, reverse engineering, fault injection attacks
  • Protection of Keys, Secure Boot
Group(s): 
Connected and Autonomous→Mobile security; Software and Data→Embedded software; E to H profiles