default search action
David S. Hardin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]John Hatcliff, Jason Belt, Robby, David S. Hardin:
Integrated Contract-Based Unit and System Testing for Component-Based Systems. NFM 2024: 406-426 - 2023
- [j4]Jason Belt, John Hatcliff, Robby, John Shackleton, Jim Carciofini, Todd Carpenter, Eric Mercer, Isaac Amundson, Junaid Babar, Darren D. Cofer, David S. Hardin, Karl Hoech, Konrad Slind, Ihor Kuz, Kent McLeod:
Model-driven development for the seL4 microkernel using the HAMR framework. J. Syst. Archit. 134: 102789 (2023) - [j3]Eric Mercer, Konrad Slind, Isaac Amundson, Darren D. Cofer, Junaid Babar, David S. Hardin:
Synthesizing verified components for cyber assured systems engineering. Softw. Syst. Model. 22(5): 1451-1471 (2023) - [c19]David S. Hardin:
Verification of a Rust Implementation of Knuth's Dancing Links using ACL2. ACL2 2023: 161-174 - 2022
- [j2]Darren D. Cofer, Isaac Amundson, Junaid Babar, David S. Hardin, Konrad Slind, Perry Alexander, John Hatcliff, Robby, Gerwin Klein, Corey Lewis, Eric Mercer, John Shackleton:
Cyberassured Systems Engineering at Scale. IEEE Secur. Priv. 20(3): 52-64 (2022) - [c18]David S. Hardin:
Hardware/Software Co-Assurance using the Rust Programming Language and ACL2. ACL2 2022: 202-216 - 2021
- [c17]Eric Mercer, Konrad Slind, Isaac Amundson, Darren D. Cofer, Junaid Babar, David S. Hardin:
Synthesizing Verified Components for Cyber Assured Systems Engineering. MoDELS 2021: 205-215 - [c16]David S. Hardin, Konrad L. Slind:
Formal Synthesis of Filter Components for Use in Security-Enhancing Architectural Transformations. SP (Workshops) 2021: 111-120 - 2020
- [c15]David S. Hardin:
Synthesis of Verified Architectural Components for Critical Systems Hosted on a Verified Microkernel. HICSS 2020: 1-10
2010 – 2019
- 2018
- [c14]David S. Hardin, Konrad Slind:
Using ACL2 in the Design of Efficient, Verifiable Data Structures for High-Assurance Systems. ACL2 2018: 61-76 - 2016
- [c13]David S. Hardin, Konrad Slind, Mark Bortz, James Potts, Scott Owens:
A High-Assurance, High-Performance Hardware-Based Cross-Domain System. SAFECOMP 2016: 102-113 - 2015
- [c12]David S. Hardin:
Reasoning About LLVM Code Using Codewalker. ACL2 2015: 79-92 - 2014
- [c11]David S. Hardin, Jennifer A. Davis, David A. Greve, Jedidiah R. McClurg:
Development of a Translator from LLVM to ACL2. ACL2 2014: 163-177 - 2013
- [c10]David S. Hardin:
The Specification, Verification, and Implementation of a High-Assurance Data Structure: An ACL2 Approach. HICSS 2013: 5059-5067 - [c9]David S. Hardin, Samuel S. Hardin:
ACL2 Meets the GPU: Formalizing a CUDA-based Parallelizable All-Pairs Shortest Path Algorithm in ACL2. ACL2 2013: 127-142 - 2012
- [c8]David S. Hardin, Konrad Slind, Michael W. Whalen, Tuan-Hung Pham:
A DSL for cross-domain security. HILT 2012: 53-62 - [c7]David S. Hardin, Konrad Slind, Michael W. Whalen, Tuan-Hung Pham:
The Guardol Language and Verification System. TACAS 2012: 18-32 - 2011
- [c6]Jason Belt, John Hatcliff, Robby, Patrice Chalin, David S. Hardin, Xianghua Deng:
Bakar Kiasan: Flexible Contract Checking for Critical Systems Using Symbolic Execution. NASA Formal Methods 2011: 58-72 - [c5]Jason Belt, John Hatcliff, Robby, Patrice Chalin, David S. Hardin, Xianghua Deng:
Enhancing spark's contract checking facilities using symbolic execution. SIGAda 2011: 47-60 - [e2]David S. Hardin, Julien Schmaltz:
Proceedings 10th International Workshop on the ACL2 Theorem Prover and its Applications, ACL2 2011, Austin, Texas, USA, November 3-4, 2011. EPTCS 70, 2011 [contents] - 2010
- [p1]Matthew Wilding, David A. Greve, Raymond J. Richards, David S. Hardin:
Formal Verification of Partition Management for the AAMP7G Microprocessor. Design and Verification of Microprocessor Systems for High-Assurance Applications 2010: 175-191 - [e1]David S. Hardin:
Design and Verification of Microprocessor Systems for High-Assurance Applications. Springer 2010, ISBN 978-1-4419-1538-2 [contents]
2000 – 2009
- 2009
- [c4]David S. Hardin, T. Douglas Hiratzka, D. Randolph Johnson, Lucas G. Wagner, Michael W. Whalen:
Development of Security Software: A High Assurance Methodology. ICFEM 2009: 266-285 - 2008
- [c3]David S. Hardin:
Invited Tutorial: Considerations in the Design and Verification of Microprocessors for Safety-Critical and Security-Critical Applications. FMCAD 2008: 1-8 - 2006
- [c2]David S. Hardin, Eric Whitman Smith, William D. Young:
A robust machine code proof framework for highly secure applications. ACL2 2006: 11-20 - 2001
- [j1]Matthew Wilding, David A. Greve, David S. Hardin:
Efficient Simulation of Formal Processor Models. Formal Methods Syst. Des. 18(3): 233-248 (2001)
1990 – 1999
- 1998
- [c1]David S. Hardin, Matthew Wilding, David A. Greve:
Transforming the Theorem Prover into a Digital Design Tool: From Concept Car to Off-Road Vehicle. CAV 1998: 39-44
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-31 20:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint