Dr Toby Murray

  • Room: Level: 08 Room: 17
  • Building: Doug McDonell Building
  • Campus: Parkville

Research interests

  • Computer Security
  • Concurrent Systems
  • Formal Verification
  • Operating Systems
  • Programming Languages
  • Software Engineering

Personal webpage



Toby is a faculty member of the Department of Computing and Information Systems. His research focuses on how to build highly secure computer systems using rigorous techniques, such as formal software verification and novel programming languages. Before joining the University of Melbourne, he worked at NICTA (now Data61) where he led the team that completed the world's first proof that a general purpose operating system kernel could enforce data confidentiality, for the seL4 kernel; played a leading role in the development of the COGENT programming language for verified systems programming; and collaborated with DST Group to build and verify the security of seL4-based cross domain devices. He holds a D.Phil. in Computer Science from the University of Oxford, awarded in June 2011, and a Bachelor of Computer Science with First Class Honours from the University of Adelaide, awarded in August 2005.

Recent publications

  1. Klein G, Andronick J, Keller G, Matichuk D, Murray T, O'Connor L. Provably trustworthy systems. PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY A-MATHEMATICAL PHYSICAL AND ENGINEERING SCIENCES. Royal Society of London. 2017, Vol. 375, Issue 2104. DOI: 10.1098/rsta.2015.0404
  2. Gruetter S, Murray T. Short paper: Towards information flow reasoning about real-world C code. PLAS 2017 - Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, co-located with CCS 2017. 2017, Vol. 2017-January. DOI: 10.1145/3139337.3139345
  3. Murray T, Sabelfeld A, Bauer L. Special issue on verified information flow security. JOURNAL OF COMPUTER SECURITY. IOS Press. 2017, Vol. 25, Issue 4-5. DOI: 10.3233/JCS-0559
  4. Rizkallah C, Lim J, Nagashima Y, Sewell T, Chen Z, O'Connor L, Murray T, Keller G, Klein G. A Framework for the Automatic Formal Verification of Refinement from COGENT to C. 7th International Conference on Interactive Theorem Proving (ITP). Springer Verlag. 2016, Vol. 9807. Editors: Blanchette JC, Merz S. DOI: 10.1007/978-3-319-43144-4_20
  5. Amani S, Hixon A, Chen Z, Rizkallah C, Chubb P, O'Connor L, Beeren J, Nagashima Y, Lim J, Sewell T, Tuong J, Keller G, Murray T, Klein G, Heiser G. COGENT: Verifying High-Assurance File System Implementations. 21st International Conference on Architectural Support for Programming Languages and Operating Systems. Association for Computing Machinery Inc.. 2016, Vol. 50, Issue 2. DOI: 10.1145/2872362.2872404
  6. Murray T, Sison R, Pierzchalski E, Rizkallah C. Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference. 2016 IEEE 29TH COMPUTER SECURITY FOUNDATIONS SYMPOSIUM (CSF 2016). IEEE. 2016, Vol. 2016-August. DOI: 10.1109/CSF.2016.36
  7. Matichuk D, Murray T, Wenzel M. Eisbach: A Proof Method Language for Isabelle. 5th International Conference on Interactive Theorem Proving (ITP) held as part of the Federated Logic Conference (FLoC) part of the Vienna Summer of Logic. Springer Verlag. 2016, Vol. 56, Issue 3. DOI: 10.1007/s10817-015-9360-2
  8. Drossopoulou S, Noble J, Miller MS, Murray T. Permission and authority revisited towards a formalisation. Proceedings of the 18th Workshop on Formal Techniques for Java-Like Programs, FTfJP 2016 - Co-located with ECOOP 2016. 2016. DOI: 10.1145/2955811.2955821
  9. O'Connor L, Chen Z, Rizkallah C, Amani S, Lim J, Murray T, Nagashima Y, Sewell T, Klein G. Refinement through Restraint: Bringing Down the Cost of Verification. 21st ACM SIGPLAN International Conference on Functional Programming (ICFP). Association for Computing Machinery Inc.. 2016, Vol. 51, Issue 9. DOI: 10.1145/2951913.2951940
  10. Beaumont M, McCarthy J, Murray T. The cross domain desktop compositor: Using hardware-based video compositing for a multi-level secure user interface. 32nd Annual Computer Security Applications Conference (ACSAC). 2016, Vol. 5-9-December-2016. DOI: 10.1145/2991079.2991087
  11. Jeffery R, Staples M, Andronick J, Klein G, Murray T. An empirical research agenda for understanding formal methods productivity. Information and Software Technology. Elsevier BV. 2015, Vol. 60. DOI: 10.1016/j.infsof.2014.11.005
  12. Matichuk D, Murray T, Andronick J, Jeffery R, Klein G, Staples M. Empirical Study Towards a Leading Indicator for Cost of Formal Software Verification. 2015 IEEE ACM 37th IEEE International Conference on Software Engineering. IEEE. 2015, Vol. 1. DOI: 10.1109/ICSE.2015.85
  13. Murray T. Short paper: On high-assurance information-flow-secure programming languages. Proceedings of the 10th ACM Workshop on Programming Languages and Analysis for Security, PLAS 2015. 2015. DOI: 10.1145/2786558.2786561
  14. Amani S, Murray T. Specifying a Realistic File System. ELECTRONIC PROCEEDINGS IN THEORETICAL COMPUTER SCIENCE. 2015, Vol. 196, Issue 196. DOI: 10.4204/EPTCS.196.1
  15. Matichuk D, Wenzel M, Murray T. An Isabelle proof method language. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer Verlag. 2014, Vol. 8558 LNCS. DOI: 10.1007/978-3-319-08970-6_25

View a full list of publications on the University of Melbourne’s ‘Find An Expert’ profile