Dr Toby Murray

  • Room: Level: 08 Room: 17
  • Building: Doug McDonell Building
  • Campus: Parkville

Research interests

  • Computer Security
  • Concurrent Systems
  • Formal Verification
  • Operating Systems
  • Programming Languages
  • Software Engineering

Personal webpage



Toby is a faculty member of the Department of Computing and Information Systems. His research focuses on how to build highly secure computer systems using rigorous techniques, such as formal software verification and novel programming languages. Before joining the University of Melbourne, he worked at NICTA (now Data61) where he led the team that completed the world's first proof that a general purpose operating system kernel could enforce data confidentiality, for the seL4 kernel; played a leading role in the development of the COGENT programming language for verified systems programming; and collaborated with DST Group to build and verify the security of seL4-based cross domain devices. He holds a D.Phil. in Computer Science from the University of Oxford, awarded in June 2011, and a Bachelor of Computer Science with First Class Honours from the University of Adelaide, awarded in August 2005.

Recent publications

  1. Murray T, Sison R, Engelhardt K. COVERN: A Logic for Compositional Verification of Information Flow Control. Proceedings - 3rd IEEE European Symposium on Security and Privacy, EURO S and P 2018. 2018. DOI: 10.1109/EuroSP.2018.00010
  2. Klein G, Andronick J, Keller G, Matichuk D, Murray T, O'Connor L. Provably trustworthy systems. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES. Royal Society of London. 2017, Vol. 375, Issue 2104. DOI: 10.1098/rsta.2015.0404
  3. Gruetter S, Murray T. Short paper: Towards information flow reasoning about real-world C code. PLAS 2017 - Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, co-located with CCS 2017. 2017, Vol. 2017-January. DOI: 10.1145/3139337.3139345
  4. Murray T, Sabelfeld A, Bauer L. Special issue on verified information flow security. JOURNAL OF COMPUTER SECURITY. IOS Press. 2017, Vol. 25, Issue 4-5. DOI: 10.3233/JCS-0559
  5. Rizkallah C, Lim J, Nagashima Y, Sewell T, Chen Z, O'Connor L, Murray T, Keller G, Klein G. A Framework for the Automatic Formal Verification of Refinement from COGENT to C. 7th International Conference on Interactive Theorem Proving (ITP). Springer Verlag. 2016, Vol. 9807. Editors: Blanchette JC, Merz S. DOI: 10.1007/978-3-319-43144-4_20
  6. Amani S, Hixon A, Chen Z, Rizkallah C, Chubb P, O'Connor L, Beeren J, Nagashima Y, Lim J, Sewell T, Tuong J, Keller G, Murray T, Klein G, Heiser G. COGENT: Verifying High-Assurance File System Implementations. 21st International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery Inc.. 2016, Vol. 50, Issue 2. DOI: 10.1145/2872362.2872404
  7. Murray T, Sison R, Pierzchalski E, Rizkallah C. Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference. 2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016). IEEE. 2016, Vol. 2016-August. DOI: 10.1109/CSF.2016.36
  8. Matichuk D, Murray T, Wenzel M. Eisbach: A Proof Method Language for Isabelle. 5th International Conference on Interactive Theorem Proving (ITP) held as part of the Federated Logic Conference (FLoC) part of the Vienna Summer of Logic. Springer Verlag. 2016, Vol. 56, Issue 3. DOI: 10.1007/s10817-015-9360-2
  9. Drossopoulou S, Noble J, Miller MS, Murray T. Permission and authority revisited towards a formalisation. Proceedings of the 18th Workshop on Formal Techniques for Java-Like Programs, FTfJP 2016 - Co-located with ECOOP 2016. 2016. DOI: 10.1145/2955811.2955821
  10. O'Connor L, Chen Z, Rizkallah C, Amani S, Lim J, Murray T, Nagashima Y, Sewell T, Klein G. Refinement through Restraint: Bringing Down the Cost of Verification. 21st ACM SIGPLAN International Conference on Functional Programming (ICFP). Association for Computing Machinery Inc.. 2016, Vol. 51, Issue 9. DOI: 10.1145/2951913.2951940
  11. Beaumont M, McCarthy J, Murray T. The cross domain desktop compositor: Using hardware-based video compositing for a multi-level secure user interface. 32nd Annual Computer Security Applications Conference (ACSAC). 2016, Vol. 5-9-December-2016. DOI: 10.1145/2991079.2991087
  12. Jeffery R, Staples M, Andronick J, Klein G, Murray T. An empirical research agenda for understanding formal methods productivity. Information and Software Technology. Elsevier BV. 2015, Vol. 60. DOI: 10.1016/j.infsof.2014.11.005
  13. Matichuk D, Murray T, Andronick J, Jeffery R, Klein G, Staples M. Empirical Study Towards a Leading Indicator for Cost of Formal Software Verification. 2015 IEEE ACM 37th IEEE International Conference on Software Engineering. IEEE. 2015, Vol. 1. DOI: 10.1109/ICSE.2015.85
  14. Murray T. Short paper: On high-assurance information-flow-secure programming languages. Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security, PLAS 2015. 2015. DOI: 10.1145/2786558.2786561
  15. Amani S, Murray T. Specifying a Realistic File System. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE. 2015, Vol. 196, Issue 196. DOI: 10.4204/EPTCS.196.1

View a full list of publications on the University of Melbourne’s ‘Find An Expert’ profile