Toby Murray
Toby Murray
School of Computing and Information Systems, University of Melbourne
Verified email at unimelb.edu.au - Homepage
Title
Cited by
Cited by
Year
Comprehensive formal verification of an OS microkernel
G Klein, J Andronick, K Elphinstone, T Murray, T Sewell, R Kolanski, ...
ACM Transactions on Computer Systems (TOCS) 32 (1), 1-70, 2014
2872014
seL4: from General Purpose to a Proof of Information Flow Enforcement
T Murray, D Matichuk, M Brassil, P Gammie, T Bourke, S Seefried, ...
IEEE Symposium on Security and Privacy, 2013
1882013
seL4 enforces integrity
T Sewell, S Winwood, P Gammie, T Murray, J Andronick, G Klein
International Conference on Interactive Theorem Proving, 325-340, 2011
882011
The last mile: An empirical study of timing channels on seL4
D Cock, Q Ge, T Murray, G Heiser
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
742014
Cogent: Verifying high-assurance file system implementations
S Amani, A Hixon, Z Chen, C Rizkallah, P Chubb, L O'Connor, J Beeren, ...
ACM SIGARCH Computer Architecture News 44 (2), 175-188, 2016
642016
Noninterference for operating system kernels
T Murray, D Matichuk, M Brassil, P Gammie, G Klein
International Conference on Certified Programs and Proofs, 126-142, 2012
532012
Compositional verification and refinement of concurrent value-dependent noninterference
T Murray, R Sison, E Pierzchalski, C Rizkallah
2016 IEEE 29th Computer Security Foundations Symposium (CSF), 417-431, 2016
382016
Eisbach: A proof method language for Isabelle
D Matichuk, T Murray, M Wenzel
Journal of Automated Reasoning 56 (3), 261-282, 2016
382016
Refinement through restraint: Bringing down the cost of verification
L O'Connor, Z Chen, C Rizkallah, S Amani, J Lim, T Murray, Y Nagashima, ...
ACM SIGPLAN Notices 51 (9), 89-102, 2016
312016
An Isabelle proof method language
D Matichuk, M Wenzel, T Murray
International Conference on Interactive Theorem Proving, 390-405, 2014
262014
File systems deserve verification too!
G Keller, T Murray, S Amani, L O'Connor, Z Chen, L Ryzhyk, G Klein, ...
Proceedings of the Seventh Workshop on Programming Languages and Operating …, 2013
252013
Empirical study towards a leading indicator for cost of formal software verification
D Matichuk, T Murray, J Andronick, R Jeffery, G Klein, M Staples
2015 IEEE/ACM 37th IEEE International Conference on Software Engineering 1 …, 2015
212015
An overview of the Annex system
DA Grove, TC Murray, CA Owen, CJ North, JA Jones, MR Beaumont, ...
Computer Security Applications Conference, 2007. ACSAC 2007. Twenty-Third …, 2007
192007
Analysing the security properties of object-capability patterns
T Murray
PhD thesis, University of Oxford, 2010
182010
Formally verified software in the real world
G Klein, J Andronick, M Fernandez, I Kuz, T Murray, G Heiser
Communications of the ACM 61 (10), 68-77, 2018
172018
It's time for trustworthy systems
G Heiser, T Murray, G Klein
IEEE Security & Privacy 10 (2), 67-70, 2012
162012
Non-delegatable authorities in capability systems
T Murray, D Grove
Journal of Computer Security 16 (6), 743-759, 2008
162008
The cross domain desktop compositor: Using hardware-based video compositing for a multi-level secure user interface
M Beaumont, J McCarthy, T Murray
Proceedings of the 32nd Annual Conference on Computer Security Applications …, 2016
152016
Specifying a realistic file system
S Amani, T Murray
Models for Formal Analysis of Real Systems (MARS), 2015
152015
An empirical research agenda for understanding formal methods productivity
R Jeffery, M Staples, J Andronick, G Klein, T Murray
Information and Software Technology 60, 102-112, 2015
152015
The system can't perform the operation now. Try again later.
Articles 1–20