


Остановите войну!
for scientists:
David S. Hardin
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [c17]Eric Mercer, Konrad Slind, Isaac Amundson, Darren D. Cofer, Junaid Babar, David S. Hardin:
Synthesizing Verified Components for Cyber Assured Systems Engineering. MoDELS 2021: 205-215 - [c16]David S. Hardin, Konrad L. Slind:
Formal Synthesis of Filter Components for Use in Security-Enhancing Architectural Transformations. SP Workshops 2021: 111-120 - 2020
- [c15]David S. Hardin:
Synthesis of Verified Architectural Components for Critical Systems Hosted on a Verified Microkernel. HICSS 2020: 1-10
2010 – 2019
- 2018
- [c14]David S. Hardin, Konrad Slind:
Using ACL2 in the Design of Efficient, Verifiable Data Structures for High-Assurance Systems. ACL2 2018: 61-76 - 2016
- [c13]David S. Hardin, Konrad Slind, Mark Bortz, James Potts, Scott Owens
:
A High-Assurance, High-Performance Hardware-Based Cross-Domain System. SAFECOMP 2016: 102-113 - 2015
- [c12]David S. Hardin:
Reasoning About LLVM Code Using Codewalker. ACL2 2015: 79-92 - 2014
- [c11]David S. Hardin, Jennifer A. Davis, David A. Greve, Jedidiah R. McClurg:
Development of a Translator from LLVM to ACL2. ACL2 2014: 163-177 - 2013
- [c10]David S. Hardin:
The Specification, Verification, and Implementation of a High-Assurance Data Structure: An ACL2 Approach. HICSS 2013: 5059-5067 - [c9]David S. Hardin, Samuel S. Hardin:
ACL2 Meets the GPU: Formalizing a CUDA-based Parallelizable All-Pairs Shortest Path Algorithm in ACL2. ACL2 2013: 127-142 - 2012
- [c8]David S. Hardin, Konrad Slind, Michael W. Whalen, Tuan-Hung Pham:
A DSL for cross-domain security. HILT 2012: 53-62 - [c7]David S. Hardin, Konrad Slind, Michael W. Whalen, Tuan-Hung Pham:
The Guardol Language and Verification System. TACAS 2012: 18-32 - 2011
- [c6]Jason Belt, John Hatcliff, Robby, Patrice Chalin, David S. Hardin, Xianghua Deng:
Bakar Kiasan: Flexible Contract Checking for Critical Systems Using Symbolic Execution. NASA Formal Methods 2011: 58-72 - [c5]Jason Belt, John Hatcliff, Robby, Patrice Chalin, David S. Hardin, Xianghua Deng:
Enhancing spark's contract checking facilities using symbolic execution. SIGAda 2011: 47-60 - [e2]David S. Hardin, Julien Schmaltz:
Proceedings 10th International Workshop on the ACL2 Theorem Prover and its Applications, ACL2 2011, Austin, Texas, USA, November 3-4, 2011. EPTCS 70, 2011 [contents] - 2010
- [p1]Matthew Wilding, David A. Greve, Raymond J. Richards, David S. Hardin:
Formal Verification of Partition Management for the AAMP7G Microprocessor. Design and Verification of Microprocessor Systems for High-Assurance Applications 2010: 175-191 - [e1]David S. Hardin:
Design and Verification of Microprocessor Systems for High-Assurance Applications. Springer 2010, ISBN 978-1-4419-1538-2 [contents]
2000 – 2009
- 2009
- [c4]David S. Hardin, T. Douglas Hiratzka, D. Randolph Johnson, Lucas G. Wagner, Michael W. Whalen:
Development of Security Software: A High Assurance Methodology. ICFEM 2009: 266-285 - 2008
- [c3]David S. Hardin:
Invited Tutorial: Considerations in the Design and Verification of Microprocessors for Safety-Critical and Security-Critical Applications. FMCAD 2008: 1-8 - 2006
- [c2]David S. Hardin, Eric W. Smith, William D. Young:
A robust machine code proof framework for highly secure applications. ACL2 2006: 11-20 - 2001
- [j1]Matthew Wilding, David A. Greve, David S. Hardin:
Efficient Simulation of Formal Processor Models. Formal Methods Syst. Des. 18(3): 233-248 (2001)
1990 – 1999
- 1998
- [c1]David S. Hardin, Matthew Wilding, David A. Greve:
Transforming the Theorem Prover into a Digital Design Tool: From Concept Car to Off-Road Vehicle. CAV 1998: 39-44
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2022-05-05 22:00 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint