Toby Murray
Toby Murray
School of Computing and Information Systems, University of Melbourne
Verified email at - Homepage
Cited by
Cited by
Comprehensive formal verification of an OS microkernel
G Klein, J Andronick, K Elphinstone, T Murray, T Sewell, R Kolanski, ...
ACM Transactions on Computer Systems (TOCS) 32 (1), 1-70, 2014
seL4: from General Purpose to a Proof of Information Flow Enforcement
T Murray, D Matichuk, M Brassil, P Gammie, T Bourke, S Seefried, ...
IEEE Symposium on Security and Privacy, 2013
Cogent: Verifying high-assurance file system implementations
S Amani, A Hixon, Z Chen, C Rizkallah, P Chubb, L O'Connor, J Beeren, ...
ACM SIGARCH Computer Architecture News 44 (2), 175-188, 2016
seL4 enforces integrity
T Sewell, S Winwood, P Gammie, T Murray, J Andronick, G Klein
Interactive Theorem Proving: Second International Conference, ITP 2011, Berg …, 2011
The last mile: An empirical study of timing channels on seL4
D Cock, Q Ge, T Murray, G Heiser
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Noninterference for operating system kernels
T Murray, D Matichuk, M Brassil, P Gammie, G Klein
Certified Programs and Proofs: Second International Conference, CPP 2012 …, 2012
Compositional verification and refinement of concurrent value-dependent noninterference
T Murray, R Sison, E Pierzchalski, C Rizkallah
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 417-431, 2016
Eisbach: A proof method language for Isabelle
D Matichuk, T Murray, M Wenzel
Journal of Automated Reasoning 56, 261-282, 2016
Refinement through restraint: Bringing down the cost of verification
L O'Connor, Z Chen, C Rizkallah, S Amani, J Lim, T Murray, Y Nagashima, ...
ACM SIGPLAN Notices 51 (9), 89-102, 2016
Formally verified software in the real world
G Klein, J Andronick, M Fernandez, I Kuz, T Murray, G Heiser
Communications of the ACM 61 (10), 68-77, 2018
COVERN: A logic for compositional verification of information flow control
T Murray, R Sison, K Engelhardt
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 16-30, 2018
Empirically analyzing ethereum's gas mechanism
R Yang, T Murray, P Rimba, U Parampalli
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019
File systems deserve verification too!
G Keller, T Murray, S Amani, L O'Connor, Z Chen, L Ryzhyk, G Klein, ...
Proceedings of the Seventh Workshop on Programming Languages and Operating …, 2013
Empirical study towards a leading indicator for cost of formal software verification
D Matichuk, T Murray, J Andronick, R Jeffery, G Klein, M Staples
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
An Isabelle proof method language
D Matichuk, M Wenzel, T Murray
Interactive Theorem Proving: 5th International Conference, ITP 2014, Held as …, 2014
An overview of the Annex system
DA Grove, TC Murray, CA Owen, CJ North, JA Jones, MR Beaumont, ...
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007
An empirical research agenda for understanding formal methods productivity
R Jeffery, M Staples, J Andronick, G Klein, T Murray
Information and software technology 60, 102-112, 2015
It's time for trustworthy systems
G Heiser, T Murray, G Klein
IEEE Security & Privacy 10 (2), 67-70, 2012
SecCSL: Security Concurrent Separation Logic
G Ernst, T Murray
Computer Aided Verification: 31st International Conference, CAV 2019, New …, 2019
Verifying that a compiler preserves concurrent value-dependent information-flow security
R Sison, T Murray
International Conference on Interactive Theorem Proving, 27:1-27:19, 2019
The system can't perform the operation now. Try again later.
Articles 1–20