<?xml version="1.0"?>
<dblpperson name="William D. Young" pid="10/247" n="31">
<person key="homepages/10/247" mdate="2016-02-03">
<author pid="10/247">William D. Young</author>
<note type="affiliation">University of Texas at Austin, USA</note>
<url>http://www.cs.utexas.edu/~byoung/</url>
</person>
<r><inproceedings key="conf/fmcad/KwanXY25" mdate="2026-01-27">
<author pid="228/8045">Carl Kwan</author>
<author pid="368/2942">Yutong Xin</author>
<author pid="10/247">William D. Young</author>
<title>A Formal Y86 Simulator with CHERI Features.</title>
<year>2025</year>
<booktitle>FMCAD</booktitle>
<ee type="oa">https://doi.org/10.34727/2025/isbn.978-3-85448-084-6_22</ee>
<crossref>conf/fmcad/2025</crossref>
<url>db/conf/fmcad/fmcad2025.html#KwanXY25</url>
</inproceedings>
</r>
<r><inproceedings key="journals/corr/abs-2205-11700" mdate="2022-07-05">
<author pid="10/247">William D. Young</author>
<title>Modeling Asymptotic Complexity Using ACL2.</title>
<booktitle>ACL2</booktitle>
<year>2022</year>
<pages>83-98</pages>
<crossref>journals/corr/abs-2205-11103</crossref>
<ee type="oa">https://doi.org/10.4204/EPTCS.359.9</ee>
<ee type="oa">https://doi.org/10.48550/arXiv.2205.11700</ee>
<url>db/series/eptcs/eptcs359.html#abs-2205-11700</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hicss/McCoydKGDY13" mdate="2023-03-24">
<author pid="51/10360">Michael McCoyd</author>
<author pid="65/3873">Robert Bellarmine Krug</author>
<author pid="17/5558">Deepak Goel</author>
<author pid="d/MDahlin">Mike Dahlin</author>
<author pid="10/247">William D. Young</author>
<title>Building a Hypervisor on a Formally Verifiable Protection Layer.</title>
<pages>5069-5078</pages>
<year>2013</year>
<booktitle>HICSS</booktitle>
<ee>https://doi.org/10.1109/HICSS.2013.121</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/HICSS.2013.121</ee>
<crossref>conf/hicss/2013</crossref>
<url>db/conf/hicss/hicss2013.html#McCoydKGDY13</url>
</inproceedings>
</r>
<r><inproceedings key="journals/corr/abs-1110-4672" mdate="2018-09-12">
<author pid="d/MDahlin">Mike Dahlin</author>
<author pid="98/3414-3">Ryan Johnson 0003</author>
<author pid="65/3873">Robert Bellarmine Krug</author>
<author pid="51/10360">Michael McCoyd</author>
<author pid="10/247">William D. Young</author>
<title>Toward the Verification of a Simple Hypervisor</title>
<booktitle>ACL2</booktitle>
<year>2011</year>
<pages>28-45</pages>
<ee type="oa">https://doi.org/10.4204/EPTCS.70.3</ee>
<ee type="oa">http://arxiv.org/abs/1110.4672</ee>
<crossref>journals/corr/abs-1110-4473</crossref>
<url>db/series/eptcs/eptcs70.html#abs-1110-4672</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fmcad/HuntKRY08" mdate="2017-05-17">
<author pid="38/356">Warren A. Hunt Jr.</author>
<author pid="65/3873">Robert Bellarmine Krug</author>
<author pid="61/14">Sandip Ray</author>
<author pid="10/247">William D. Young</author>
<title>Mechanized Information Flow Analysis through Inductive Assertions.</title>
<pages>1-4</pages>
<year>2008</year>
<booktitle>FMCAD</booktitle>
<ee>https://doi.org/10.1109/FMCAD.2008.ECP.33</ee>
<crossref>conf/fmcad/2008</crossref>
<url>db/conf/fmcad/fmcad2008.html#HuntKRY08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/acl2/HardinSY06" mdate="2025-01-19">
<author pid="65/6786">David S. Hardin</author>
<author pid="27/1642">Eric Whitman Smith</author>
<author pid="10/247">William D. Young</author>
<title>A robust machine code proof framework for highly secure applications.</title>
<pages>11-20</pages>
<year>2006</year>
<crossref>conf/acl2/2006</crossref>
<booktitle>ACL2</booktitle>
<ee>https://doi.org/10.1145/1217975.1217978</ee>
<ee>https://www.wikidata.org/entity/Q130981546</ee>
<url>db/conf/acl2/acl22006.html#HardinSY06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/charme/Young05" mdate="2018-06-26">
<author pid="10/247">William D. Young</author>
<title>Introducing Abstractions via Rewriting.</title>
<pages>402-405</pages>
<year>2005</year>
<crossref>conf/charme/2005</crossref>
<booktitle>CHARME</booktitle>
<ee type="oa">https://doi.org/10.1007/11560548_41</ee>
<url>db/conf/charme/charme2005.html#Young05</url>
</inproceedings>
</r>
<r><article key="journals/tse/Young97" mdate="2017-05-17">
<author pid="10/247">William D. Young</author>
<title>Comparing Verification Systems: Interactive Consistency in ACL2.</title>
<pages>214-223</pages>
<ee>https://doi.org/10.1109/32.588536</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/32.588536</ee>
<year>1997</year>
<volume>23</volume>
<journal>IEEE Trans. Software Eng.</journal>
<number>4</number>
<url>db/journals/tse/tse23.html#Young97</url>
</article>
</r>
<r><inproceedings key="conf/fm/YoungB97" mdate="2017-05-22">
<author pid="10/247">William D. Young</author>
<author pid="30/5078">William R. Bevier</author>
<title>Mathematical Modeling and Analysis of an External Memory Manager.</title>
<pages>237-257</pages>
<year>1997</year>
<crossref>conf/fm/1997</crossref>
<booktitle>FME</booktitle>
<url>db/conf/fm/fme1997.html#YoungB97</url>
<ee>https://doi.org/10.1007/3-540-63533-5_13</ee>
</inproceedings>
</r>
<r><article key="journals/jcs/BevierY95" mdate="2023-08-28">
<author pid="30/5078">William R. Bevier</author>
<author pid="10/247">William D. Young</author>
<title>A State-Machine Approach to Non-Interference.</title>
<pages>55-70</pages>
<year>1995</year>
<volume>3</volume>
<journal>J. Comput. Secur.</journal>
<number>1</number>
<url>db/journals/jcs/jcs3.html#BevierY95</url>
<ee>https://doi.org/10.3233/JCS-1994/1995-3105</ee>
<ee>https://www.wikidata.org/entity/Q114944555</ee>
</article>
</r>
<r><inproceedings key="conf/csfw/BevierCY95" mdate="2023-03-24">
<author pid="30/5078">William R. Bevier</author>
<author pid="70/985">Richard M. Cohen</author>
<author pid="10/247">William D. Young</author>
<title>Connection policies and controlled interference.</title>
<pages>167-176</pages>
<year>1995</year>
<crossref>conf/csfw/1995</crossref>
<booktitle>CSFW</booktitle>
<ee>https://doi.org/10.1109/CSFW.1995.518561</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSFW.1995.518561</ee>
<url>db/conf/csfw/csfw1995.html#BevierCY95</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csfw/YoungB94" mdate="2017-05-25">
<author pid="10/247">William D. Young</author>
<author pid="30/5078">William R. Bevier</author>
<title>A State-Based Approach to Non-Interference.</title>
<year>1994</year>
<crossref>conf/csfw/1994</crossref>
<booktitle>CSFW</booktitle>
<url>db/conf/csfw/csfw1994.html#YoungB94</url>
<pages>11-21</pages>
<ee>https://doi.org/10.1109/CSFW.1994.315951</ee>
</inproceedings>
</r>
<r><article key="journals/fac/BevierY92" mdate="2020-08-25">
<author pid="30/5078">William R. Bevier</author>
<author pid="10/247">William D. Young</author>
<title>Machine Checked Proofs of the Design of a Fault-Tolerance Circuit.</title>
<pages>755-775</pages>
<year>1992</year>
<volume>4</volume>
<journal>Formal Aspects Comput.</journal>
<number>6A</number>
<url>db/journals/fac/fac4.html#BevierY92</url>
</article>
</r>
<r><inproceedings key="conf/tpcd/BrockHY92" mdate="2002-02-25">
<author pid="00/1029">Bishop Brock</author>
<author pid="38/356">Warren A. Hunt Jr.</author>
<author pid="10/247">William D. Young</author>
<title>Introduction to a Formally Defined Hardware Description Language.</title>
<pages>3-35</pages>
<year>1992</year>
<crossref>conf/tpcd/1992</crossref>
<booktitle>TPCD</booktitle>
<url>db/conf/tpcd/tpcd1992.html#BrockHY92</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fm/GoodY91" mdate="2017-05-20">
<author pid="55/332">Donald I. Good</author>
<author pid="10/247">William D. Young</author>
<title>Mathematical Methods for Digital Systems Development.</title>
<pages>406-430</pages>
<year>1991</year>
<crossref>conf/fm/1991-2</crossref>
<booktitle>VDM Europe (2)</booktitle>
<url>db/conf/fm/vdme1991-2.html#GoodY91</url>
<ee>https://doi.org/10.1007/BFb0020002</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/issta/Young91" mdate="2018-11-06">
<author pid="10/247">William D. Young</author>
<title>Formal Methods versus Software Engineering: Is There a Conflict?</title>
<pages>188-189</pages>
<year>1991</year>
<crossref>conf/issta/1991</crossref>
<booktitle>Symposium on Testing, Analysis, and Verification</booktitle>
<ee>https://doi.org/10.1145/120807.120824</ee>
<url>db/conf/issta/tav91.html#Young91</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fmsd/Young90" mdate="2022-02-17">
<author pid="10/247">William D. Young</author>
<title>Verified program support environments.</title>
<pages>147-149</pages>
<year>1990</year>
<booktitle>Formal Methods in Software Development</booktitle>
<ee>https://doi.org/10.1145/99569.99839</ee>
<ee>https://doi.org/10.1145/99571.99839</ee>
<crossref>conf/fmsd/1990</crossref>
<url>db/conf/fmsd/fmsd1990.html#Young90</url>
</inproceedings>
</r>
<r><article key="journals/jar/BevierHMY89" mdate="2023-06-19">
<author pid="30/5078">William R. Bevier</author>
<author pid="38/356">Warren A. Hunt Jr.</author>
<author pid="m/JStrotherMoore">J Strother Moore</author>
<author pid="10/247">William D. Young</author>
<title>An Approach to Systems Verification.</title>
<pages>411-428</pages>
<year>1989</year>
<volume>5</volume>
<journal>J. Autom. Reason.</journal>
<number>4</number>
<url>db/journals/jar/jar5.html#BevierHMY89</url>
<ee>https://doi.org/10.1007/BF00243131</ee>
</article>
</r>
<r><article key="journals/jar/Young89" mdate="2020-09-02">
<author pid="10/247">William D. Young</author>
<title>A Mechanically Verified Code Generator.</title>
<pages>493-518</pages>
<year>1989</year>
<volume>5</volume>
<journal>J. Autom. Reason.</journal>
<number>4</number>
<url>db/journals/jar/jar5.html#Young89</url>
<ee>https://doi.org/10.1007/BF00243134</ee>
</article>
</r>
<r><inproceedings key="conf/issta/Young89" mdate="2022-02-18">
<author pid="10/247">William D. Young</author>
<title>Verified Compilation in micro-Gypsy.</title>
<pages>20-26</pages>
<year>1989</year>
<crossref>conf/issta/1989</crossref>
<booktitle>Symposium on Testing, Analysis, and Verification</booktitle>
<ee>https://doi.org/10.1145/75308.75312</ee>
<ee>https://doi.org/10.1145/75309.75312</ee>
<url>db/conf/issta/tav89.html#Young89</url>
</inproceedings>
</r>
<r><article key="journals/tse/HaighY87" mdate="2017-05-17">
<author pid="20/1155">J. Thomas Haigh</author>
<author pid="10/247">William D. Young</author>
<title>Extending the Noninterference Version of MLS for SAT.</title>
<pages>141-150</pages>
<year>1987</year>
<volume>13</volume>
<journal>IEEE Trans. Software Eng.</journal>
<number>2</number>
<url>db/journals/tse/tse13.html#HaighY87</url>
<ee>https://doi.org/10.1109/TSE.1987.226478</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TSE.1987.226478</ee>
</article>
</r>
<r><article key="journals/tse/HaighKMY87" mdate="2022-08-16">
<author pid="20/1155">J. Thomas Haigh</author>
<author pid="k/RAKemmerer">Richard A. Kemmerer</author>
<author pid="66/4447">John McHugh</author>
<author pid="10/247">William D. Young</author>
<title>An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.</title>
<pages>157-168</pages>
<year>1987</year>
<volume>13</volume>
<journal>IEEE Trans. Software Eng.</journal>
<number>2</number>
<url>db/journals/tse/tse13.html#HaighKMY87</url>
<ee>https://doi.org/10.1109/TSE.1987.226479</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TSE.1987.226479</ee>
<ee>https://www.wikidata.org/entity/Q111898929</ee>
</article>
</r>
<r><inproceedings key="conf/sp/BevierHY87" mdate="2023-09-21">
<author pid="30/5078">William R. Bevier</author>
<author pid="38/356">Warren A. Hunt Jr.</author>
<author pid="10/247">William D. Young</author>
<title>Toward Verified Execution Environments.</title>
<pages>106-115</pages>
<year>1987</year>
<crossref>conf/sp/1987</crossref>
<booktitle>S&#38;P</booktitle>
<url>db/conf/sp/sp1987.html#BevierHY87</url>
<ee>https://doi.org/10.1109/SP.1987.10018</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.1987.10018</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/YoungM87" mdate="2023-09-21">
<author pid="10/247">William D. Young</author>
<author pid="66/4447">John McHugh</author>
<title>Coding for a Believable Specification to Implementation Mapping.</title>
<pages>140-149</pages>
<year>1987</year>
<crossref>conf/sp/1987</crossref>
<booktitle>S&#38;P</booktitle>
<url>db/conf/sp/sp1987.html#YoungM87</url>
<ee>https://doi.org/10.1109/SP.1987.10003</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.1987.10003</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/HaighKMY86" mdate="2023-09-21">
<author pid="20/1155">J. Thomas Haigh</author>
<author pid="k/RAKemmerer">Richard A. Kemmerer</author>
<author pid="66/4447">John McHugh</author>
<author pid="10/247">William D. Young</author>
<title>An Experience Using Two Covert Channel Analysis Techniques on a Real System Design.</title>
<pages>14-24</pages>
<year>1986</year>
<crossref>conf/sp/1986</crossref>
<booktitle>S&#38;P</booktitle>
<url>db/conf/sp/sp1986.html#HaighKMY86</url>
<ee>https://doi.org/10.1109/SP.1986.10013</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.1986.10013</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/HaighY86" mdate="2023-09-21">
<author pid="20/1155">J. Thomas Haigh</author>
<author pid="10/247">William D. Young</author>
<title>Extending the Non-Interference Version of MLS for SAT.</title>
<pages>60</pages>
<year>1986</year>
<crossref>conf/sp/1986</crossref>
<booktitle>S&#38;P</booktitle>
<url>db/conf/sp/sp1986.html#HaighY86</url>
<ee>https://doi.org/10.1109/SP.1986.10004</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.1986.10004</ee>
</inproceedings>
</r>
<r><inproceedings key="conf/sp/BoebertKYH85" mdate="2023-09-21">
<author pid="02/822">William Earl Boebert</author>
<author pid="156/4102">R. Y. Kaln</author>
<author pid="10/247">William D. Young</author>
<author pid="156/4297">S. A. Hansohn</author>
<title>Secure Ada Target: Issues, System Design, and Verification.</title>
<pages>176-183</pages>
<year>1985</year>
<booktitle>S&#38;P</booktitle>
<ee>https://doi.org/10.1109/SP.1985.10022</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SP.1985.10022</ee>
<crossref>conf/sp/1985</crossref>
<url>db/conf/sp/sp1985.html#BoebertKYH85</url>
</inproceedings>
</r>
<r><article key="journals/sigplan/YoungG81" mdate="2021-08-03">
<author pid="10/247">William D. Young</author>
<author pid="55/332">Donald I. Good</author>
<title>Steelman and the verifiability of (preliminary) ADA.</title>
<pages>113-119</pages>
<year>1981</year>
<volume>16</volume>
<journal>ACM SIGPLAN Notices</journal>
<number>2</number>
<ee>https://doi.org/10.1145/954269.954286</ee>
<url>db/journals/sigplan/sigplan16.html#YoungG81</url>
</article>
</r>
<r><article key="journals/sigplan/TripathiYGB81" mdate="2021-08-03">
<author pid="t/AnandRTripathi">Anand R. Tripathi</author>
<author pid="10/247">William D. Young</author>
<author pid="55/332">Donald I. Good</author>
<author pid="13/1022">James C. Browne</author>
<title>HAL/S/V: a verifiable subset for HAL/S.</title>
<pages>102-112</pages>
<year>1981</year>
<volume>16</volume>
<journal>ACM SIGPLAN Notices</journal>
<number>3</number>
<ee>https://doi.org/10.1145/947825.947833</ee>
<url>db/journals/sigplan/sigplan16.html#TripathiYGB81</url>
</article>
</r>
<r><inproceedings key="conf/acm/TripathiYG80" mdate="2018-11-06">
<author pid="t/AnandRTripathi">Anand R. Tripathi</author>
<author pid="10/247">William D. Young</author>
<author pid="55/332">Donald I. Good</author>
<title>A preliminary evaluation of verifiability in Ada.</title>
<pages>218-224</pages>
<year>1980</year>
<booktitle>ACM Annual Conference</booktitle>
<ee>https://doi.org/10.1145/800176.809971</ee>
<crossref>conf/acm/1980</crossref>
<url>db/conf/acm/acm1980.html#TripathiYG80</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sigplan/YoungG80" mdate="2021-08-03">
<author pid="10/247">William D. Young</author>
<author pid="55/332">Donald I. Good</author>
<title>Generics and verification in Ada.</title>
<pages>123-127</pages>
<year>1980</year>
<booktitle>SIGPLAN</booktitle>
<ee>https://doi.org/10.1145/800004.807942</ee>
<ee>https://doi.org/10.1145/948632.948649</ee>
<ee>https://doi.org/10.1145/947783.948649</ee>
<crossref>conf/sigplan/1980</crossref>
<url>db/conf/sigplan/sigplan1980.html#YoungG80</url>
</inproceedings>
</r>
<coauthors n="24" nc="3">
<co c="0"><na f="b/Bevier:William_R=" pid="30/5078">William R. Bevier</na></co>
<co c="1"><na f="b/Boebert:William_Earl" pid="02/822">William Earl Boebert</na></co>
<co c="0"><na f="b/Brock:Bishop" pid="00/1029">Bishop Brock</na></co>
<co c="0"><na f="b/Browne:James_C=" pid="13/1022">James C. Browne</na></co>
<co c="0"><na f="c/Cohen:Richard_M=" pid="70/985">Richard M. Cohen</na></co>
<co c="0" n="2"><na f="d/Dahlin:Michael" pid="d/MDahlin">Michael Dahlin</na><na>Mike Dahlin</na></co>
<co c="0"><na f="g/Goel:Deepak" pid="17/5558">Deepak Goel</na></co>
<co c="0"><na f="g/Good:Donald_I=" pid="55/332">Donald I. Good</na></co>
<co c="2"><na f="h/Haigh:J=_Thomas" pid="20/1155">J. Thomas Haigh</na></co>
<co c="1"><na f="h/Hansohn:S=_A=" pid="156/4297">S. A. Hansohn</na></co>
<co c="0"><na f="h/Hardin:David_S=" pid="65/6786">David S. Hardin</na></co>
<co c="0"><na f="h/Hunt_Jr=:Warren_A=" pid="38/356">Warren A. Hunt Jr.</na></co>
<co c="0"><na f="j/Johnson_0003:Ryan" pid="98/3414-3">Ryan Johnson 0003</na></co>
<co c="1"><na f="k/Kaln:R=_Y=" pid="156/4102">R. Y. Kaln</na></co>
<co c="2"><na f="k/Kemmerer:Richard_A=" pid="k/RAKemmerer">Richard A. Kemmerer</na></co>
<co c="0"><na f="k/Krug:Robert_Bellarmine" pid="65/3873">Robert Bellarmine Krug</na></co>
<co c="0"><na f="k/Kwan:Carl" pid="228/8045">Carl Kwan</na></co>
<co c="0"><na f="m/McCoyd:Michael" pid="51/10360">Michael McCoyd</na></co>
<co c="2"><na f="m/McHugh:John" pid="66/4447">John McHugh</na></co>
<co c="0"><na f="m/Moore:J_Strother" pid="m/JStrotherMoore">J Strother Moore</na></co>
<co c="0"><na f="r/Ray:Sandip" pid="61/14">Sandip Ray</na></co>
<co c="0"><na f="s/Smith:Eric_Whitman" pid="27/1642">Eric Whitman Smith</na></co>
<co c="0"><na f="t/Tripathi:Anand_R=" pid="t/AnandRTripathi">Anand R. Tripathi</na></co>
<co c="0"><na f="x/Xin:Yutong" pid="368/2942">Yutong Xin</na></co>
</coauthors>
</dblpperson>

