William D. Young

Affiliations:
  • University of Texas at Austin, USA


According to our database1, William D. Young authored at least 29 papers between 1980 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Modeling Asymptotic Complexity Using ACL2.
Proceedings of the Proceedings Seventeenth International Workshop on the ACL2 Theorem Prover and its Applications, 2022

2013
Building a Hypervisor on a Formally Verifiable Protection Layer.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2011
Toward the Verification of a Simple Hypervisor
Proceedings of the Proceedings 10th International Workshop on the ACL2 Theorem Prover and its Applications, 2011

2008
Mechanized Information Flow Analysis through Inductive Assertions.
Proceedings of the Formal Methods in Computer-Aided Design, 2008

2006
A robust machine code proof framework for highly secure applications.
Proceedings of the Sixth International Workshop on the ACL2 Theorem Prover and its Applications, 2006

2005
Introducing Abstractions via Rewriting.
Proceedings of the Correct Hardware Design and Verification Methods, 2005

1997
Comparing Verification Systems: Interactive Consistency in ACL2.
IEEE Trans. Software Eng., 1997

Mathematical Modeling and Analysis of an External Memory Manager.
Proceedings of the FME '97: Industrial Applications and Strengthened Foundations of Formal Methods, 1997

1995
A State-Machine Approach to Non-Interference.
J. Comput. Secur., 1995

Connection policies and controlled interference.
Proceedings of the Eighth IEEE Computer Security Foundations Workshop (CSFW '95), 1995

1994
A State-Based Approach to Non-Interference.
Proceedings of the Seventh IEEE Computer Security Foundations Workshop, 1994

1992
Machine Checked Proofs of the Design of a Fault-Tolerance Circuit.
Formal Aspects Comput., 1992

Introduction to a Formally Defined Hardware Description Language.
Proceedings of the Theorem Provers in Circuit Design, 1992

1991
Formal Methods versus Software Engineering: Is There a Conflict?
Proceedings of the Symposium on Testing, Analysis, and Verification, 1991

Mathematical Methods for Digital Systems Development.
Proceedings of the VDM '91, 1991

1990
Verified program support environments.
Proceedings of the Conference proceedings on Formal methods in software development, 1990

1989
A Mechanically Verified Code Generator.
J. Autom. Reason., 1989

An Approach to Systems Verification.
J. Autom. Reason., 1989

Verified Compilation in micro-Gypsy.
Proceedings of the ACM SIGSOFT '89 Third Symposium on Testing, Analysis, and Verification, 1989

1987
Extending the Noninterference Version of MLS for SAT.
IEEE Trans. Software Eng., 1987

An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.
IEEE Trans. Software Eng., 1987

Coding for a Believable Specification to Implementation Mapping.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

Toward Verified Execution Environments.
Proceedings of the 1987 IEEE Symposium on Security and Privacy, 1987

1986
Extending the Non-Interference Version of MLS for SAT.
Proceedings of the 1986 IEEE Symposium on Security and Privacy, 1986

1985
Secure Ada Target: Issues, System Design, and Verification.
Proceedings of the 1985 IEEE Symposium on Security and Privacy, 1985

1981
Steelman and the verifiability of (preliminary) ADA.
ACM SIGPLAN Notices, 1981

HAL/S/V: a verifiable subset for HAL/S.
ACM SIGPLAN Notices, 1981

1980
Generics and verification in Ada.
Proceedings of the ACM-SIGPLAN symposium on The ADA programming language, 1980

A preliminary evaluation of verifiability in Ada.
Proceedings of the ACM 1980 Annual Conference, 1980


  Loading...