Dr Toby Murray

  • Room: Level: 08 Room: 17
  • Building: Doug McDonell Building
  • Campus: Parkville

Research interests

  • Computer Security
  • Concurrent Systems
  • Formal Verification
  • Operating Systems
  • Programming Languages
  • Software Engineering

Personal webpage



Toby is a faculty member of the Department of Computing and Information Systems. His research focuses on how to build highly secure computer systems using rigorous techniques, such as formal software verification and novel programming languages. Before joining the University of Melbourne, he worked at NICTA (now Data61) where he led the team that completed the world's first proof that a general purpose operating system kernel could enforce data confidentiality, for the seL4 kernel; played a leading role in the development of the COGENT programming language for verified systems programming; and collaborated with DST Group to build and verify the security of seL4-based cross domain devices. He holds a D.Phil. in Computer Science from the University of Oxford, awarded in June 2011, and a Bachelor of Computer Science with First Class Honours from the University of Adelaide, awarded in August 2005.

Recent publications

  1. Noble J, Potanin A, Murray T, Miller MS. Abstract and Concrete Data Types vs Object Capabilities. Principled Software Development Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday. Springer. 2018. Editors: M√úller P, Schaefer I. DOI: 10.1007/978-3-319-98047-8_14
  2. Murray T, Van Oorschot P. BP: Formal proofs, the fine print and side effects. 2018 IEEE Cybersecurity Development (SecDev). 2018. DOI: 10.1109/SecDev.2018.00009
  3. Murray T, Sison R, Engelhardt K. COVERN: A Logic for Compositional Verification of Information Flow Control. Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. 2018. DOI: 10.1109/EuroSP.2018.00010
  4. Klein G, Andronick J, Fernandez M, Kuz I, Murray T, Heiser G. Formally Verified Software in the Real World. COMMUNICATIONS OF THE ACM. Association for Computing Machinery Inc.. 2018, Vol. 61, Issue 10. DOI: 10.1145/3230627
  5. Issa A, Murray T, Ernst G. In search of perfect users: towards understanding the usability of converged multi-level secure user interfaces. Australian Conference on Computer-Human Interaction. 2018. DOI: 10.1145/3292147.3292231
  6. Klein G, Andronick J, Keller G, Matichuk D, Murray T, O'Connor L. Provably trustworthy systems. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES. Royal Society of London. 2017, Vol. 375, Issue 2104. DOI: 10.1098/rsta.2015.0404
  7. Gruetter S, Murray T. Short paper: Towards information flow reasoning about real-world C code. PLAS 2017 - Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, co-located with CCS 2017. 2017, Vol. 2017-January. DOI: 10.1145/3139337.3139345
  8. Murray T, Sabelfeld A, Bauer L. Special issue on verified information flow security. JOURNAL OF COMPUTER SECURITY. IOS Press. 2017, Vol. 25, Issue 4-5. DOI: 10.3233/JCS-0559
  9. Rizkallah C, Lim J, Nagashima Y, Sewell T, Chen Z, O'Connor L, Murray T, Keller G, Klein G. A Framework for the Automatic Formal Verification of Refinement from COGENT to C. 7th International Conference on Interactive Theorem Proving (ITP). Springer Verlag. 2016, Vol. 9807. Editors: Blanchette JC, Merz S. DOI: 10.1007/978-3-319-43144-4_20
  10. Amani S, Hixon A, Chen Z, Rizkallah C, Chubb P, O'Connor L, Beeren J, Nagashima Y, Lim J, Sewell T, Tuong J, Keller G, Murray T, Klein G, Heiser G. COGENT: Verifying High-Assurance File System Implementations. 21st International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery Inc.. 2016, Vol. 50, Issue 2. DOI: 10.1145/2872362.2872404
  11. Murray T, Sison R, Pierzchalski E, Rizkallah C. Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference. 2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016). IEEE. 2016, Vol. 2016-August. DOI: 10.1109/CSF.2016.36
  12. Matichuk D, Murray T, Wenzel M. Eisbach: A Proof Method Language for Isabelle. 5th International Conference on Interactive Theorem Proving (ITP) held as part of the Federated Logic Conference (FLoC) part of the Vienna Summer of Logic. Springer Verlag. 2016, Vol. 56, Issue 3. DOI: 10.1007/s10817-015-9360-2
  13. Drossopoulou S, Noble J, Miller MS, Murray T. Permission and authority revisited towards a formalisation. Proceedings of the 18th Workshop on Formal Techniques for Java-Like Programs, FTfJP 2016 - Co-located with ECOOP 2016. 2016. DOI: 10.1145/2955811.2955821
  14. O'Connor L, Chen Z, Rizkallah C, Amani S, Lim J, Murray T, Nagashima Y, Sewell T, Klein G. Refinement through Restraint: Bringing Down the Cost of Verification. 21st ACM SIGPLAN International Conference on Functional Programming (ICFP). Association for Computing Machinery Inc.. 2016, Vol. 51, Issue 9. Editors: Garrigue J, Keller G, Sumii E. DOI: 10.1145/2951913.2951940
  15. Beaumont M, McCarthy J, Murray T. The cross domain desktop compositor: Using hardware-based video compositing for a multi-level secure user interface. 32nd Annual Computer Security Applications Conference (ACSAC). 2016, Vol. 5-9-December-2016. DOI: 10.1145/2991079.2991087

View a full list of publications on the University of Melbourne’s ‘Find An Expert’ profile