2006 |
20 | EE | David S. Hardin,
Eric W. Smith,
William D. Young:
A robust machine code proof framework for highly secure applications.
ACL2 2006: 11-20 |
2005 |
19 | EE | William D. Young:
Introducing Abstractions via Rewriting.
CHARME 2005: 402-405 |
1997 |
18 | | William D. Young,
William R. Bevier:
Mathematical Modeling and Analysis of an External Memory Manager.
FME 1997: 237-257 |
17 | EE | William D. Young:
Comparing Verification Systems: Interactive Consistency in ACL2.
IEEE Trans. Software Eng. 23(4): 214-223 (1997) |
1995 |
16 | EE | William R. Bevier,
Richard M. Cohen,
William D. Young:
Connection policies and controlled interference.
CSFW 1995: 167-176 |
15 | | William R. Bevier,
William D. Young:
A State-Machine Approach to Non-Interference.
Journal of Computer Security 3(1): 55-70 (1995) |
1994 |
14 | | William D. Young,
William R. Bevier:
A State-Based Approach to Non-Interference.
CSFW 1994: 11-21 |
1992 |
13 | | Bishop Brock,
Warren A. Hunt Jr.,
William D. Young:
Introduction to a Formally Defined Hardware Description Language.
TPCD 1992: 3-35 |
12 | | William R. Bevier,
William D. Young:
Machine Checked Proofs of the Design of a Fault-Tolerance Circuit.
Formal Asp. Comput. 4(6A): 755-775 (1992) |
1991 |
11 | EE | William D. Young:
Formal Methods versus Software Engineering: Is There a Conflict?
Symposium on Testing, Analysis, and Verification 1991: 188-189 |
10 | | Donald I. Good,
William D. Young:
Mathematical Methods for Digital Systems Development.
VDM Europe (2) 1991: 406-430 |
1989 |
9 | EE | William D. Young:
Verified Compilation in micro-Gypsy.
Symposium on Testing, Analysis, and Verification 1989: 20-26 |
8 | | William R. Bevier,
Warren A. Hunt Jr.,
J. Strother Moore,
William D. Young:
An Approach to Systems Verification.
J. Autom. Reasoning 5(4): 411-428 (1989) |
7 | | William D. Young:
A Mechanically Verified Code Generator.
J. Autom. Reasoning 5(4): 493-518 (1989) |
1987 |
6 | | William R. Bevier,
Warren A. Hunt Jr.,
William D. Young:
Toward Verified Execution Environments.
IEEE Symposium on Security and Privacy 1987: 106-115 |
5 | | William D. Young,
John McHugh:
Coding for a Believable Specification to Implementation Mapping.
IEEE Symposium on Security and Privacy 1987: 140-149 |
4 | | J. Thomas Haigh,
William D. Young:
Extending the Noninterference Version of MLS for SAT.
IEEE Trans. Software Eng. 13(2): 141-150 (1987) |
3 | | J. Thomas Haigh,
Richard A. Kemmerer,
John McHugh,
William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Trans. Software Eng. 13(2): 157-168 (1987) |
1986 |
2 | | J. Thomas Haigh,
Richard A. Kemmerer,
John McHugh,
William D. Young:
An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Symposium on Security and Privacy 1986: 14-24 |
1 | | J. Thomas Haigh,
William D. Young:
Extending the Non-Interference Version of MLS for SAT.
IEEE Symposium on Security and Privacy 1986: 60-60 |