Toby Murray
Toby Murray
School of Computing and Information Systems, University of Melbourne
Verified email at - Homepage
Cited by
Cited by
Comprehensive formal verification of an OS microkernel
G Klein, J Andronick, K Elphinstone, T Murray, T Sewell, R Kolanski, ...
ACM Transactions on Computer Systems (TOCS) 32 (1), 1-70, 2014
seL4: from General Purpose to a Proof of Information Flow Enforcement
T Murray, D Matichuk, M Brassil, P Gammie, T Bourke, S Seefried, ...
IEEE Symposium on Security and Privacy, 2013
seL4 enforces integrity
T Sewell, S Winwood, P Gammie, T Murray, J Andronick, G Klein
International Conference on Interactive Theorem Proving, 325-340, 2011
Cogent: Verifying high-assurance file system implementations
S Amani, A Hixon, Z Chen, C Rizkallah, P Chubb, L O'Connor, J Beeren, ...
ACM SIGARCH Computer Architecture News 44 (2), 175-188, 2016
The last mile: An empirical study of timing channels on seL4
D Cock, Q Ge, T Murray, G Heiser
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Noninterference for operating system kernels
T Murray, D Matichuk, M Brassil, P Gammie, G Klein
International Conference on Certified Programs and Proofs, 126-142, 2012
Compositional verification and refinement of concurrent value-dependent noninterference
T Murray, R Sison, E Pierzchalski, C Rizkallah
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 417-431, 2016
Eisbach: A proof method language for Isabelle
D Matichuk, T Murray, M Wenzel
Journal of Automated Reasoning 56 (3), 261-282, 2016
Refinement through restraint: Bringing down the cost of verification
L O'Connor, Z Chen, C Rizkallah, S Amani, J Lim, T Murray, Y Nagashima, ...
ACM SIGPLAN Notices 51 (9), 89-102, 2016
An Isabelle proof method language
D Matichuk, M Wenzel, T Murray
International Conference on Interactive Theorem Proving, 390-405, 2014
File systems deserve verification too!
G Keller, T Murray, S Amani, L O'Connor, Z Chen, L Ryzhyk, G Klein, ...
Proceedings of the Seventh Workshop on Programming Languages and Operating …, 2013
Empirical study towards a leading indicator for cost of formal software verification
D Matichuk, T Murray, J Andronick, R Jeffery, G Klein, M Staples
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
COVERN: A logic for compositional verification of information flow control
T Murray, R Sison, K Engelhardt
2018 IEEE European Symposium on Security and Privacy (EuroS&P), 16-30, 2018
Analysing the security properties of object-capability patterns
T Murray
PhD thesis, University of Oxford, 2010
An overview of the Annex system
DA Grove, TC Murray, CA Owen, CJ North, JA Jones, MR Beaumont, ...
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007
An empirical research agenda for understanding formal methods productivity
R Jeffery, M Staples, J Andronick, G Klein, T Murray
Information and software technology 60, 102-112, 2015
It's time for trustworthy systems
G Heiser, T Murray, G Klein
IEEE Security & Privacy 10 (2), 67-70, 2012
Empirically Analyzing Ethereum's Gas Mechanism
R Yang, T Murray, P Rimba, U Parampalli
2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW …, 2019
Formally verified software in the real world
G Klein, J Andronick, M Fernandez, I Kuz, T Murray, G Heiser
Communications of the ACM 61 (10), 68-77, 2018
The cross domain desktop compositor: Using hardware-based video compositing for a multi-level secure user interface
M Beaumont, J McCarthy, T Murray
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20