Cyber-Physical Systems

Cyber-Physical systems are where software meets the physical world. Building on our expertise in language design, static analysis, and formal methods, we build the tools to increase the reliability and simplify the design of complex embedded systems.

Galois provides a range of services in high-assurance embedded system development. We leverage our expertise in formal verification, run-time monitoring, security, and safety to bring new approaches to the area.

Galois Contacts

Lee Pike - Research Lead

Read More

Publications coauthored by Lee Pike can be found here.

  • Lee Pike, Alwyn Goodloe, Robin Morisset, and Sebastian Niller. Copilot: A Hard Real-Time Runtime Monitor. Proceedings of the 1st Intl. Conference on Runtime Verification (RV'2010), 2010. Springer.
  • Lee Pike. Schrödinger's CRCs (Fast Abstract). 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2010), 2010.
  • Lee Pike, Geoffrey M. Brown, and Alwyn Goodloe: Experience report: roll your own real-time simulator. In ACM SIGPLAN Haskell Symposium 2009.
  • Geoffrey M. Brown and Lee Pike: Automated verification and refinement for physical-layer protocols. Submitted (journal article), 2007.
  • Lee Pike, Don Stewart, and John Van Enk: Autonomous Verification and Validation (position paper). CPS Week 2009 Workshop on Mixed Criticality
  • Alwyn Goodloe and Lee Pike. Toward monitoring fault-tolerant embedded systems (extended abstract). In International Workshop on Software Health Management (SHM'09), 2009.
  • Alwyn Goodloe and Lee Pike. Monitoring distributed real-time systems: a survey and future directions. NASA Contractor Report NASA/CR-2010-216724, 2010.
  • Lee Pike. Post-hoc separation policy analysis with graph algorithms. In Workshop on Foundations of Computer Security (FCS'09), 2009.

Collaborate with Us

Licensing - Obtain a license for one of our advanced technologies.

Research & Development - Solve your toughest problems by exploring new approaches with us.

Training - Learn how to use cutting-edge tools to increase trustworthiness in your critical systems.

Let's Work TogetherStart the Conversation >>