| 2006 |
| 20 | EE | David S. Hardin,
Eric W. Smith,
William D. Young:
A robust machine code proof framework for highly secure applications.
ACL2 2006: 11-20 |
| 2005 |
| 19 | EE | William D. Young:
Introducing Abstractions via Rewriting.
CHARME 2005: 402-405 |
| 1997 |
| 18 | | William D. Young,
William R. Bevier:
Mathematical Modeling and Analysis of an External Memory Manager.
FME 1997: 237-257 |
| 17 | EE | William D. Young:
Comparing Verification Systems: Interactive Consistency in ACL2.
IEEE Trans. Software Eng. 23(4): 214-223 (1997) |
| 1995 |
| 16 | EE | William R. Bevier,
Richard M. Cohen,
William D. Young:
Connection policies and controlled interference.
CSFW 1995: 167-176 |
| 15 | | William R. Bevier,
William D. Young:
A State-Machine Approach to Non-Interference.
Journal of Computer Security 3(1): 55-70 (1995) |
| 1994 |
| 14 | | William D. Young,
William R. Bevier:
A State-Based Approach to Non-Interference.
CSFW 1994: 11-21 |
| 1992 |
| 13 | | Bishop Brock,
Warren A. Hunt Jr.,
William D. Young:
Introduction to a Formally Defined Hardware Description Language.
TPCD 1992: 3-35 |
| 12 | | William R. Bevier,
William D. Young:
Machine Checked Proofs of the Design of a Fault-Tolerance Circuit.
Formal Asp. Comput. 4(6A): 755-775 (1992) |
| 1991 |
| 11 | EE | William D. Young:
Formal Methods versus Software Engineering: Is There a Conflict?
Symposium on Testing, Analysis, and Verification 1991: 188-189 |
| 10 | | Donald I. Good,
William D. Young:
Mathematical Methods for Digital Systems Development.
VDM Europe (2) 1991: 406-430 |
| 1989 |
| 9 | EE | William D. Young:
Verified Compilation in micro-Gypsy.
Symposium on Testing, Analysis, and Verification 1989: 20-26 |
| 8 | | William R. Bevier,
Warren A. Hunt Jr.,
J. Strother Moore,
William D. Young:
An Approach to Systems Verification.
J. Autom. Reasoning 5(4): 411-428 (1989) |
| 7 | | William D. Young:
A Mechanically Verified Code Generator.
J. Autom. Reasoning 5(4): 493-518 (1989) |
| 1987 |
| 6 | | William R. Bevier,
Warren A. Hunt Jr.,
William D. Young:
Toward Verified Execution Environments.
IEEE Symposium on Security and Privacy 1987: 106-115 |
| 5 | | William D. Young,
John McHugh:
Coding for a Believable Specification to Implementation Mapping.
IEEE Symposium on Security and Privacy 1987: 140-149 |
| 4 | | J. Thomas Haigh,
William D. Young:
Extending the Noninterference Version of MLS for SAT.
IEEE Trans. Software Eng. 13(2): 141-150 (1987) |
| 3 | | J. Thomas Haigh,
Richard A. Kemmerer,
John McHugh,
William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Trans. Software Eng. 13(2): 157-168 (1987) |
| 1986 |
| 2 | | J. Thomas Haigh,
Richard A. Kemmerer,
John McHugh,
William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Symposium on Security and Privacy 1986: 14-24 |
| 1 | | J. Thomas Haigh,
William D. Young:
Extending the Non-Interference Version of MLS for SAT.
IEEE Symposium on Security and Privacy 1986: 60-60 |