Wei Wang

Learn More
Scalability is a key challenge in static analysis. For imperative languages like C, the approach taken for modeling memory can play a significant role in scalability. In this paper, we explore a family of memory models called partitioned memory models which divide memory up based on the results of a points-to analysis. We review Steensgaard's original and(More)
Cascade is a program static analysis tool developed at New York University. Cascade takes as input a program and a control file. The control file specifies one or more assertions to be checked together with restrictions on program behaviors. The tool generates verification conditions for the specified assertions and checks them using an SMT solver which(More)
Cascade is a static program analysis tool developed at New York University. It uses bounded model checking to generate verification conditions and checks them using an SMT solver which either produces a proof of correctness or gives a concrete trace showing how an assertion can fail. It supports the majority of standard C features except for floating point.(More)
Component behavior modeling and relativity analysis is a crucial issue for the component-based software maintenance and evolution. There are two prerequisites for each application of maintenance or evolution strategy. The first is modeling the behavior of the evolving component, and the second is determining the components which are behavior related with(More)
This paper gives some new non-linear controller and CAD method for the multi-objective control systems. Then discusses how to use the new nonlinear controller to perform it. Finally, In this paper, an example of the electronic hydraulic pressure servo control system designed with CAD of multi-objective optimal design method is given. The performance index(More)
In this paper, we use SPIN, a model checker for LTL, to detect vulner-abilities in the AACS drive-host authentication protocol. Before the detection, we propose a variant of the Dolev-Yao attacker model [4] and incorporate the synthesis and analysis rules [7] to formalize the protocol and the intruder capabilities. During the detection, we check the(More)
  • 1