BibTeX records: Toby C. Murray

download as .bib file

@article{DBLP:journals/tches/ChengCGMMYZ24,
  author       = {Shing Hing William Cheng and
                  Chitchanok Chuengsatiansup and
                  Daniel Genkin and
                  Dallas McNeil and
                  Toby Murray and
                  Yuval Yarom and
                  Zhiyuan Zhang},
  title        = {Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing
                  Attacks},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {3},
  pages        = {224--248},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i3.224-248},
  doi          = {10.46586/TCHES.V2024.I3.224-248},
  timestamp    = {Wed, 21 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/ChengCGMMYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/ZhangM0KMTO24,
  author       = {Mo Zhang and
                  Eduard Marin and
                  Mark Ryan and
                  Vassilis Kostakos and
                  Toby Murray and
                  Benjamin Tag and
                  David F. Oswald},
  title        = {OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band
                  Channels},
  booktitle    = {Proceedings of the 19th International Conference on Availability,
                  Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024
                  - 2 August 2024},
  pages        = {191:1--191:13},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3664476.3670876},
  doi          = {10.1145/3664476.3670876},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/ZhangM0KMTO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/YanMOPS24,
  author       = {Pengbo Yan and
                  Toby Murray and
                  Olga Ohrimenko and
                  Van{-}Thuan Pham and
                  Robert Sison},
  editor       = {Andr{\'{e}} Platzer and
                  Kristin Yvonne Rozier and
                  Matteo Pradella and
                  Matteo Rossi},
  title        = {Combining Classical and Probabilistic Independence Reasoning to Verify
                  the Security of Oblivious Algorithms},
  booktitle    = {Formal Methods - 26th International Symposium, {FM} 2024, Milan, Italy,
                  September 9-13, 2024, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14933},
  pages        = {188--205},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-71162-6\_10},
  doi          = {10.1007/978-3-031-71162-6\_10},
  timestamp    = {Tue, 17 Sep 2024 14:10:04 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/YanMOPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/PanCMP24,
  author       = {Lianglu Pan and
                  Shaanan Cohney and
                  Toby Murray and
                  Van{-}Thuan Pham},
  title        = {EDEFuzz: {A} Web {API} Fuzzer for Excessive Data Exposures},
  booktitle    = {Proceedings of the 46th {IEEE/ACM} International Conference on Software
                  Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024},
  pages        = {45:1--45:12},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3597503.3608133},
  doi          = {10.1145/3597503.3608133},
  timestamp    = {Mon, 24 Jun 2024 15:20:25 +0200},
  biburl       = {https://dblp.org/rec/conf/icse/PanCMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itp/JacksonMR24,
  author       = {Vincent Jackson and
                  Toby Murray and
                  Christine Rizkallah},
  editor       = {Yves Bertot and
                  Temur Kutsia and
                  Michael Norrish},
  title        = {A Generalised Union of Rely-Guarantee and Separation Logic Using Permission
                  Algebras},
  booktitle    = {15th International Conference on Interactive Theorem Proving, {ITP}
                  2024, September 9-14, 2024, Tbilisi, Georgia},
  series       = {LIPIcs},
  volume       = {309},
  pages        = {23:1--23:16},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2024},
  url          = {https://doi.org/10.4230/LIPIcs.ITP.2024.23},
  doi          = {10.4230/LIPICS.ITP.2024.23},
  timestamp    = {Mon, 02 Sep 2024 16:55:27 +0200},
  biburl       = {https://dblp.org/rec/conf/itp/JacksonMR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2401-17628,
  author       = {Jiankai Jin and
                  Chitchanok Chuengsatiansup and
                  Toby Murray and
                  Benjamin I. P. Rubinstein and
                  Yuval Yarom and
                  Olga Ohrimenko},
  title        = {Elephants Do Not Forget: Differential Privacy with State Continuity
                  for Privacy Budget},
  journal      = {CoRR},
  volume       = {abs/2401.17628},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2401.17628},
  doi          = {10.48550/ARXIV.2401.17628},
  eprinttype    = {arXiv},
  eprint       = {2401.17628},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2401-17628.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-03663,
  author       = {Aaron Bembenek and
                  Toby Murray},
  title        = {Symbol Correctness in Deep Neural Networks Containing Symbolic Layers},
  journal      = {CoRR},
  volume       = {abs/2402.03663},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.03663},
  doi          = {10.48550/ARXIV.2402.03663},
  eprinttype    = {arXiv},
  eprint       = {2402.03663},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-03663.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2402-11892,
  author       = {Thanh Le{-}Cong and
                  Dat Nguyen and
                  Bach Le and
                  Toby Murray},
  title        = {Evaluating Program Repair with Semantic-Preserving Transformations:
                  {A} Naturalness Assessment},
  journal      = {CoRR},
  volume       = {abs/2402.11892},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2402.11892},
  doi          = {10.48550/ARXIV.2402.11892},
  eprinttype    = {arXiv},
  eprint       = {2402.11892},
  timestamp    = {Thu, 21 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2402-11892.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2407-00514,
  author       = {Pengbo Yan and
                  Toby Murray and
                  Olga Ohrimenko and
                  Van{-}Thuan Pham and
                  Robert Sison},
  title        = {Combining Classical and Probabilistic Independence Reasoning to Verify
                  the Security of Oblivious Algorithms (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/2407.00514},
  year         = {2024},
  url          = {https://doi.org/10.48550/arXiv.2407.00514},
  doi          = {10.48550/ARXIV.2407.00514},
  eprinttype    = {arXiv},
  eprint       = {2407.00514},
  timestamp    = {Fri, 09 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2407-00514.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChengCGMMYZ24,
  author       = {Shing Hing William Cheng and
                  Chitchanok Chuengsatiansup and
                  Daniel Genkin and
                  Dallas McNeil and
                  Toby Murray and
                  Yuval Yarom and
                  Zhiyuan Zhang},
  title        = {Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {149},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/149},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/ChengCGMMYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MurrayTEN23,
  author       = {Toby Murray and
                  Mukesh Tiwari and
                  Gidon Ernst and
                  David A. Naumann},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {Assume but Verify: Deductive Verification of Leaked Information in
                  Concurrent Applications},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {1746--1760},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623141},
  doi          = {10.1145/3576915.3623141},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MurrayTEN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/SisonBMKH23,
  author       = {Robert Sison and
                  Scott Buckley and
                  Toby Murray and
                  Gerwin Klein and
                  Gernot Heiser},
  editor       = {Marsha Chechik and
                  Joost{-}Pieter Katoen and
                  Martin Leucker},
  title        = {Formalising the Prevention of Microarchitectural Timing Channels by
                  Operating Systems},
  booktitle    = {Formal Methods - 25th International Symposium, {FM} 2023, L{\"{u}}beck,
                  Germany, March 6-10, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14000},
  pages        = {103--121},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-27481-7\_8},
  doi          = {10.1007/978-3-031-27481-7\_8},
  timestamp    = {Sat, 11 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fm/SisonBMKH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fuzzing/GaoPLCMR23,
  author       = {Wentao Gao and
                  Van{-}Thuan Pham and
                  Dongge Liu and
                  Oliver Chang and
                  Toby Murray and
                  Benjamin I. P. Rubinstein},
  editor       = {Marcel B{\"{o}}hme and
                  Yannic Noller and
                  Baishakhi Ray and
                  L{\'{a}}szl{\'{o}} Szekeres},
  title        = {Beyond the Coverage Plateau: {A} Comprehensive Study of Fuzz Blockers
                  (Registered Report)},
  booktitle    = {Proceedings of the 2nd International Fuzzing Workshop, {FUZZING} 2023,
                  Seattle, WA, USA, 17 July 2023},
  pages        = {47--55},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3605157.3605177},
  doi          = {10.1145/3605157.3605177},
  timestamp    = {Mon, 17 Jul 2023 14:52:13 +0200},
  biburl       = {https://dblp.org/rec/conf/fuzzing/GaoPLCMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfem/MurrayYE23,
  author       = {Toby Murray and
                  Pengbo Yan and
                  Gidon Ernst},
  editor       = {Yi Li and
                  Sofi{\`{e}}ne Tahar},
  title        = {Compositional Vulnerability Detection with Insecurity Separation Logic},
  booktitle    = {Formal Methods and Software Engineering - 24th International Conference
                  on Formal Engineering Methods, {ICFEM} 2023, Brisbane, QLD, Australia,
                  November 21-24, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14308},
  pages        = {65--82},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-99-7584-6\_5},
  doi          = {10.1007/978-981-99-7584-6\_5},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icfem/MurrayYE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2301-09258,
  author       = {Lianglu Pan and
                  Shaanan Cohney and
                  Toby Murray and
                  Van{-}Thuan Pham},
  title        = {Detecting Excessive Data Exposures in Web Server Responses with Metamorphic
                  Fuzzing},
  journal      = {CoRR},
  volume       = {abs/2301.09258},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2301.09258},
  doi          = {10.48550/ARXIV.2301.09258},
  eprinttype    = {arXiv},
  eprint       = {2301.09258},
  timestamp    = {Thu, 26 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2301-09258.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2309-03442,
  author       = {Toby Murray and
                  Mukesh Tiwari and
                  Gidon Ernst and
                  David A. Naumann},
  title        = {Assume but Verify: Deductive Verification of Leaked Information in
                  Concurrent Applications (Extended Version)},
  journal      = {CoRR},
  volume       = {abs/2309.03442},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2309.03442},
  doi          = {10.48550/ARXIV.2309.03442},
  eprinttype    = {arXiv},
  eprint       = {2309.03442},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2309-03442.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-17046,
  author       = {Scott Buckley and
                  Robert Sison and
                  Nils Wistoff and
                  Curtis Millar and
                  Toby Murray and
                  Gerwin Klein and
                  Gernot Heiser},
  title        = {Proving the Absence of Microarchitectural Timing Channels},
  journal      = {CoRR},
  volume       = {abs/2310.17046},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.17046},
  doi          = {10.48550/ARXIV.2310.17046},
  eprinttype    = {arXiv},
  eprint       = {2310.17046},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-17046.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/MassacciSMMOMRB22,
  author       = {Fabio Massacci and
                  Antonino Sabetta and
                  Jelena Mirkovic and
                  Toby Murray and
                  Hamed Okhravi and
                  Mohammad Mannan and
                  Anderson Rocha and
                  Eric Bodden and
                  Daniel E. Geer},
  title        = {"Free" as in Freedom to Protest?},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {20},
  number       = {5},
  pages        = {16--21},
  year         = {2022},
  url          = {https://doi.org/10.1109/MSEC.2022.3185845},
  doi          = {10.1109/MSEC.2022.3185845},
  timestamp    = {Thu, 22 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeesp/MassacciSMMOMRB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isola/ErnstKM22,
  author       = {Gidon Ernst and
                  Alexander Knapp and
                  Toby Murray},
  editor       = {Tiziana Margaria and
                  Bernhard Steffen},
  title        = {A Hoare Logic with Regular Behavioral Specifications},
  booktitle    = {Leveraging Applications of Formal Methods, Verification and Validation.
                  Verification Principles - 11th International Symposium, ISoLA 2022,
                  Rhodes, Greece, October 22-30, 2022, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13701},
  pages        = {45--64},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-19849-6\_4},
  doi          = {10.1007/978-3-031-19849-6\_4},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isola/ErnstKM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcre/LiuPEMR22,
  author       = {Dongge Liu and
                  Van{-}Thuan Pham and
                  Gidon Ernst and
                  Toby Murray and
                  Benjamin I. P. Rubinstein},
  title        = {State Selection Algorithms and Their Impact on The Performance of
                  Stateful Network Protocol Fuzzing},
  booktitle    = {{IEEE} International Conference on Software Analysis, Evolution and
                  Reengineering, {SANER} 2022, Honolulu, HI, USA, March 15-18, 2022},
  pages        = {720--730},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SANER53432.2022.00089},
  doi          = {10.1109/SANER53432.2022.00089},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/wcre/LiuPEMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-06584,
  author       = {Gidon Ernst and
                  Alexander Knapp and
                  Toby Murray},
  title        = {A Hoare Logic with Regular Behavioral Specifications},
  journal      = {CoRR},
  volume       = {abs/2205.06584},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.06584},
  doi          = {10.48550/ARXIV.2205.06584},
  eprinttype    = {arXiv},
  eprint       = {2205.06584},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-06584.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fmsd/SmithCM21,
  author       = {Graeme Smith and
                  Nicholas Coughlin and
                  Toby Murray},
  title        = {Information-flow control on {ARM} and {POWER} multicore processors},
  journal      = {Formal Methods Syst. Des.},
  volume       = {58},
  number       = {1-2},
  pages        = {251--293},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10703-021-00376-2},
  doi          = {10.1007/S10703-021-00376-2},
  timestamp    = {Fri, 03 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fmsd/SmithCM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/SisonM21,
  author       = {Robert Sison and
                  Toby Murray},
  title        = {Verified secure compilation for mixed-sensitivity concurrent programs},
  journal      = {J. Funct. Program.},
  volume       = {31},
  pages        = {e18},
  year         = {2021},
  url          = {https://doi.org/10.1017/S0956796821000162},
  doi          = {10.1017/S0956796821000162},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfp/SisonM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jfp/OConnorCRJAKMSK21,
  author       = {Liam O'Connor and
                  Zilin Chen and
                  Christine Rizkallah and
                  Vincent Jackson and
                  Sidney Amani and
                  Gerwin Klein and
                  Toby Murray and
                  Thomas Sewell and
                  Gabriele Keller},
  title        = {Cogent: uniqueness types and certifying compilation},
  journal      = {J. Funct. Program.},
  volume       = {31},
  pages        = {e25},
  year         = {2021},
  url          = {https://doi.org/10.1017/S095679682100023X},
  doi          = {10.1017/S095679682100023X},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jfp/OConnorCRJAKMSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pacmpl/YanM21,
  author       = {Pengbo Yan and
                  Toby Murray},
  title        = {SecRSL: security separation logic for {C11} release-acquire concurrency},
  journal      = {Proc. {ACM} Program. Lang.},
  volume       = {5},
  number       = {{OOPSLA}},
  pages        = {1--26},
  year         = {2021},
  url          = {https://doi.org/10.1145/3485476},
  doi          = {10.1145/3485476},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/pacmpl/YanM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/PhamNTMR21,
  author       = {Van{-}Thuan Pham and
                  Manh{-}Dung Nguyen and
                  Quang{-}Trung Ta and
                  Toby Murray and
                  Benjamin I. P. Rubinstein},
  title        = {Towards Systematic and Dynamic Task Allocation for Collaborative Parallel
                  Fuzzing},
  booktitle    = {36th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2021, Melbourne, Australia, November 15-19, 2021},
  pages        = {1337--1341},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ASE51524.2021.9678810},
  doi          = {10.1109/ASE51524.2021.9678810},
  timestamp    = {Mon, 24 Jan 2022 16:18:34 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/PhamNTMR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/abs-2108-02968,
  author       = {Gidon Ernst and
                  Johannes Blau and
                  Toby Murray},
  editor       = {Jos{\'{e}} Proen{\c{c}}a and
                  Andrei Paskevich},
  title        = {Deductive Verification via the Debug Adapter Protocol},
  booktitle    = {Proceedings of the 6th Workshop on Formal Integrated Development Environment,
                  F-IDE@NFM 2021, Held online, 24-25th May 2021},
  series       = {{EPTCS}},
  volume       = {338},
  pages        = {89--96},
  year         = {2021},
  url          = {https://doi.org/10.4204/EPTCS.338.11},
  doi          = {10.4204/EPTCS.338.11},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2108-02968.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2107-05225,
  author       = {Toby Murray and
                  Pengbo Yan and
                  Gidon Ernst},
  title        = {Incremental Vulnerability Detection via Back-Propagating Symbolic
                  Execution of Insecurity Separation Logic},
  journal      = {CoRR},
  volume       = {abs/2107.05225},
  year         = {2021},
  url          = {https://arxiv.org/abs/2107.05225},
  eprinttype    = {arXiv},
  eprint       = {2107.05225},
  timestamp    = {Tue, 20 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2107-05225.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-03602,
  author       = {Pengbo Yan and
                  Toby Murray},
  title        = {SecRSL: Security Separation Logic for {C11} Release-Acquire Concurrency
                  (Extended version with technical appendices)},
  journal      = {CoRR},
  volume       = {abs/2109.03602},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.03602},
  eprinttype    = {arXiv},
  eprint       = {2109.03602},
  timestamp    = {Mon, 20 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-03602.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2112-15498,
  author       = {Dongge Liu and
                  Van{-}Thuan Pham and
                  Gidon Ernst and
                  Toby Murray and
                  Benjamin I. P. Rubinstein},
  title        = {State Selection Algorithms and Their Impact on The Performance of
                  Stateful Network Protocol Fuzzing},
  journal      = {CoRR},
  volume       = {abs/2112.15498},
  year         = {2021},
  url          = {https://arxiv.org/abs/2112.15498},
  eprinttype    = {arXiv},
  eprint       = {2112.15498},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2112-15498.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/afp/Murray20,
  author       = {Toby Murray},
  title        = {An Under-Approximate Relational Logic},
  journal      = {Arch. Formal Proofs},
  volume       = {2020},
  year         = {2020},
  url          = {https://www.isa-afp.org/entries/Relational-Incorrectness-Logic.html},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/Murray20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/HeiserMK20,
  author       = {Gernot Heiser and
                  Toby Murray and
                  Gerwin Klein},
  title        = {Towards Provable Timing-Channel Prevention},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {54},
  number       = {1},
  pages        = {1--7},
  year         = {2020},
  url          = {https://doi.org/10.1145/3421473.3421475},
  doi          = {10.1145/3421473.3421475},
  timestamp    = {Tue, 06 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sigops/HeiserMK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/SchoepeMS20,
  author       = {Daniel Schoepe and
                  Toby Murray and
                  Andrei Sabelfeld},
  title        = {{VERONICA:} Expressive and Precise Concurrent Information Flow Security},
  booktitle    = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston,
                  MA, USA, June 22-26, 2020},
  pages        = {79--94},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/CSF49147.2020.00014},
  doi          = {10.1109/CSF49147.2020.00014},
  timestamp    = {Mon, 10 Aug 2020 18:44:11 +0200},
  biburl       = {https://dblp.org/rec/conf/csfw/SchoepeMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fase/LiuEMR20,
  author       = {Dongge Liu and
                  Gidon Ernst and
                  Toby Murray and
                  Benjamin I. P. Rubinstein},
  editor       = {Heike Wehrheim and
                  Jordi Cabot},
  title        = {Legion: Best-First Concolic Testing (Competition Contribution)},
  booktitle    = {Fundamental Approaches to Software Engineering - 23rd International
                  Conference, {FASE} 2020, Held as Part of the European Joint Conferences
                  on Theory and Practice of Software, {ETAPS} 2020, Dublin, Ireland,
                  April 25-30, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12076},
  pages        = {545--549},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45234-6\_31},
  doi          = {10.1007/978-3-030-45234-6\_31},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fase/LiuEMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kbse/LiuEMR20,
  author       = {Dongge Liu and
                  Gidon Ernst and
                  Toby Murray and
                  Benjamin I. P. Rubinstein},
  title        = {{LEGION:} Best-First Concolic Testing},
  booktitle    = {35th {IEEE/ACM} International Conference on Automated Software Engineering,
                  {ASE} 2020, Melbourne, Australia, September 21-25, 2020},
  pages        = {54--65},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3324884.3416629},
  doi          = {10.1145/3324884.3416629},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/kbse/LiuEMR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2001-11142,
  author       = {Daniel Schoepe and
                  Toby Murray and
                  Andrei Sabelfeld},
  title        = {{VERONICA:} Expressive and Precise Concurrent Information Flow Security
                  (Extended Version with Technical Appendices)},
  journal      = {CoRR},
  volume       = {abs/2001.11142},
  year         = {2020},
  url          = {https://arxiv.org/abs/2001.11142},
  eprinttype    = {arXiv},
  eprint       = {2001.11142},
  timestamp    = {Mon, 03 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2001-11142.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2002-06311,
  author       = {Dongge Liu and
                  Gidon Ernst and
                  Toby Murray and
                  Benjamin I. P. Rubinstein},
  title        = {Legion: Best-First Concolic Testing},
  journal      = {CoRR},
  volume       = {abs/2002.06311},
  year         = {2020},
  url          = {https://arxiv.org/abs/2002.06311},
  eprinttype    = {arXiv},
  eprint       = {2002.06311},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2002-06311.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2003-04791,
  author       = {Toby Murray},
  title        = {An Under-Approximate Relational Logic: Heralding Logics of Insecurity,
                  Incorrect Implementation {\&} More},
  journal      = {CoRR},
  volume       = {abs/2003.04791},
  year         = {2020},
  url          = {https://arxiv.org/abs/2003.04791},
  eprinttype    = {arXiv},
  eprint       = {2003.04791},
  timestamp    = {Tue, 17 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2003-04791.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-14032,
  author       = {Robert Sison and
                  Toby Murray},
  title        = {Verified Secure Compilation for Mixed-Sensitivity Concurrent Programs},
  journal      = {CoRR},
  volume       = {abs/2010.14032},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.14032},
  eprinttype    = {arXiv},
  eprint       = {2010.14032},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-14032.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cav/ErnstM19,
  author       = {Gidon Ernst and
                  Toby Murray},
  editor       = {Isil Dillig and
                  Serdar Tasiran},
  title        = {SecCSL: Security Concurrent Separation Logic},
  booktitle    = {Computer Aided Verification - 31st International Conference, {CAV}
                  2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11562},
  pages        = {208--230},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-25543-5\_13},
  doi          = {10.1007/978-3-030-25543-5\_13},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cav/ErnstM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/YangMRP19,
  author       = {Renlord Yang and
                  Toby Murray and
                  Paul Rimba and
                  Udaya Parampalli},
  title        = {Empirically Analyzing Ethereum's Gas Mechanism},
  booktitle    = {2019 {IEEE} European Symposium on Security and Privacy Workshops,
                  EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019},
  pages        = {310--319},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/EuroSPW.2019.00041},
  doi          = {10.1109/EUROSPW.2019.00041},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/YangMRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fm/SmithCM19,
  author       = {Graeme Smith and
                  Nicholas Coughlin and
                  Toby Murray},
  editor       = {Maurice H. ter Beek and
                  Annabelle McIver and
                  Jos{\'{e}} N. Oliveira},
  title        = {Value-Dependent Information-Flow Security on Weak Memory Models},
  booktitle    = {Formal Methods - The Next 30 Years - Third World Congress, {FM} 2019,
                  Porto, Portugal, October 7-11, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11800},
  pages        = {539--555},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30942-8\_32},
  doi          = {10.1007/978-3-030-30942-8\_32},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fm/SmithCM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/HeiserKM19,
  author       = {Gernot Heiser and
                  Gerwin Klein and
                  Toby C. Murray},
  title        = {Can We Prove Time Protection?},
  booktitle    = {Proceedings of the Workshop on Hot Topics in Operating Systems, HotOS
                  2019, Bertinoro, Italy, May 13-15, 2019},
  pages        = {23--29},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317550.3321431},
  doi          = {10.1145/3317550.3321431},
  timestamp    = {Wed, 29 May 2019 13:38:37 +0200},
  biburl       = {https://dblp.org/rec/conf/hotos/HeiserKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itp/SisonM19,
  author       = {Robert Sison and
                  Toby Murray},
  editor       = {John Harrison and
                  John O'Leary and
                  Andrew Tolmach},
  title        = {Verifying That a Compiler Preserves Concurrent Value-Dependent Information-Flow
                  Security},
  booktitle    = {10th International Conference on Interactive Theorem Proving, {ITP}
                  2019, September 9-12, 2019, Portland, OR, {USA}},
  series       = {LIPIcs},
  volume       = {141},
  pages        = {27:1--27:19},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2019},
  url          = {https://doi.org/10.4230/LIPIcs.ITP.2019.27},
  doi          = {10.4230/LIPICS.ITP.2019.27},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/itp/SisonM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ecoop/2019ftfjp,
  editor       = {Toby Murray and
                  Gidon Ernst},
  title        = {Proceedings of the 21st Workshop on Formal Techniques for Java-like
                  Programs, FTfJP@ECOOP 2019, London, United Kingdom, July 15, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3340672},
  doi          = {10.1145/3340672},
  isbn         = {978-1-4503-6864-3},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ecoop/2019ftfjp.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1901-08338,
  author       = {Gernot Heiser and
                  Gerwin Klein and
                  Toby C. Murray},
  title        = {Can We Prove Time Protection?},
  journal      = {CoRR},
  volume       = {abs/1901.08338},
  year         = {2019},
  url          = {http://arxiv.org/abs/1901.08338},
  eprinttype    = {arXiv},
  eprint       = {1901.08338},
  timestamp    = {Sat, 02 Feb 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1901-08338.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-00553,
  author       = {Renlord Yang and
                  Toby Murray and
                  Paul Rimba and
                  Udaya Parampalli},
  title        = {Empirically Analyzing Ethereum's Gas Mechanism},
  journal      = {CoRR},
  volume       = {abs/1905.00553},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.00553},
  eprinttype    = {arXiv},
  eprint       = {1905.00553},
  timestamp    = {Mon, 27 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-00553.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-00713,
  author       = {Robert Sison and
                  Toby C. Murray},
  title        = {Verifying that a compiler preserves concurrent value-dependent information-flow
                  security},
  journal      = {CoRR},
  volume       = {abs/1907.00713},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.00713},
  eprinttype    = {arXiv},
  eprint       = {1907.00713},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-00713.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/KleinAFKMH18,
  author       = {Gerwin Klein and
                  June Andronick and
                  Matthew Fernandez and
                  Ihor Kuz and
                  Toby C. Murray and
                  Gernot Heiser},
  title        = {Formally verified software in the real world},
  journal      = {Commun. {ACM}},
  volume       = {61},
  number       = {10},
  pages        = {68--77},
  year         = {2018},
  url          = {https://doi.org/10.1145/3230627},
  doi          = {10.1145/3230627},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cacm/KleinAFKMH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/0001PMM18,
  author       = {James Noble and
                  Alex Potanin and
                  Toby C. Murray and
                  Mark S. Miller},
  editor       = {Peter M{\"{u}}ller and
                  Ina Schaefer},
  title        = {Abstract and Concrete Data Types vs Object Capabilities},
  booktitle    = {Principled Software Development - Essays Dedicated to Arnd Poetzsch-Heffter
                  on the Occasion of his 60th Birthday},
  pages        = {221--240},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98047-8\_14},
  doi          = {10.1007/978-3-319-98047-8\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/birthday/0001PMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/MurraySE18,
  author       = {Toby C. Murray and
                  Robert Sison and
                  Kai Engelhardt},
  title        = {{COVERN:} {A} Logic for Compositional Verification of Information
                  Flow Control},
  booktitle    = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
                  2018, London, United Kingdom, April 24-26, 2018},
  pages        = {16--30},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EuroSP.2018.00010},
  doi          = {10.1109/EUROSP.2018.00010},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/eurosp/MurraySE18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ozchi/IssaME18,
  author       = {Abdullah Issa and
                  Toby Murray and
                  Gidon Ernst},
  editor       = {George Buchanan and
                  Duncan Stevenson},
  title        = {In search of perfect users: towards understanding the usability of
                  converged multi-level secure user interfaces},
  booktitle    = {Proceedings of the 30th Australian Conference on Computer-Human Interaction,
                  OzCHI 2018, Melbourne, VIC, Australia, December 04-07, 2018},
  pages        = {572--576},
  publisher    = {{ACM}},
  year         = {2018},
  url          = {https://doi.org/10.1145/3292147.3292231},
  doi          = {10.1145/3292147.3292231},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ozchi/IssaME18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secdev/MurrayO18,
  author       = {Toby C. Murray and
                  Paul C. van Oorschot},
  title        = {{BP:} Formal Proofs, the Fine Print and Side Effects},
  booktitle    = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA,
                  USA, September 30 - October 2, 2018},
  pages        = {1--10},
  publisher    = {{IEEE} Computer Society},
  year         = {2018},
  url          = {https://doi.org/10.1109/SecDev.2018.00009},
  doi          = {10.1109/SECDEV.2018.00009},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/secdev/MurrayO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MurraySB17,
  author       = {Toby C. Murray and
                  Andrei Sabelfeld and
                  Lujo Bauer},
  title        = {Special issue on verified information flow security},
  journal      = {J. Comput. Secur.},
  volume       = {25},
  number       = {4-5},
  pages        = {319--321},
  year         = {2017},
  url          = {https://doi.org/10.3233/JCS-0559},
  doi          = {10.3233/JCS-0559},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MurraySB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/GrutterM17,
  author       = {Samuel Gr{\"{u}}tter and
                  Toby C. Murray},
  title        = {Short Paper: Towards Information Flow Reasoning about Real-World {C}
                  Code},
  booktitle    = {Proceedings of the 2017 Workshop on Programming Languages and Analysis
                  for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017},
  pages        = {43--48},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3139337.3139345},
  doi          = {10.1145/3139337.3139345},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/GrutterM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1709-05243,
  author       = {Samuel Gr{\"{u}}tter and
                  Toby C. Murray},
  title        = {VST-Flow: Fine-grained low-level reasoning about real-world {C} code},
  journal      = {CoRR},
  volume       = {abs/1709.05243},
  year         = {2017},
  url          = {http://arxiv.org/abs/1709.05243},
  eprinttype    = {arXiv},
  eprint       = {1709.05243},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1709-05243.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/afp/MurraySPR16,
  author       = {Toby C. Murray and
                  Robert Sison and
                  Edward Pierzchalski and
                  Christine Rizkallah},
  title        = {A Dependent Security Type System for Concurrent Imperative Programs},
  journal      = {Arch. Formal Proofs},
  volume       = {2016},
  year         = {2016},
  url          = {https://www.isa-afp.org/entries/Dependent\_SIFUM\_Type\_Systems.shtml},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/MurraySPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/afp/MurraySPR16a,
  author       = {Toby C. Murray and
                  Robert Sison and
                  Edward Pierzchalski and
                  Christine Rizkallah},
  title        = {Compositional Security-Preserving Refinement for Concurrent Imperative
                  Programs},
  journal      = {Arch. Formal Proofs},
  volume       = {2016},
  year         = {2016},
  url          = {https://www.isa-afp.org/entries/Dependent\_SIFUM\_Refinement.shtml},
  timestamp    = {Mon, 25 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/afp/MurraySPR16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jar/MatichukMW16,
  author       = {Daniel Matichuk and
                  Toby C. Murray and
                  Makarius Wenzel},
  title        = {Eisbach: {A} Proof Method Language for Isabelle},
  journal      = {J. Autom. Reason.},
  volume       = {56},
  number       = {3},
  pages        = {261--282},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10817-015-9360-2},
  doi          = {10.1007/S10817-015-9360-2},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jar/MatichukMW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/BeaumontMM16,
  author       = {Mark R. Beaumont and
                  Jim McCarthy and
                  Toby C. Murray},
  editor       = {Stephen Schwab and
                  William K. Robertson and
                  Davide Balzarotti},
  title        = {The cross domain desktop compositor: using hardware-based video compositing
                  for a multi-level secure user interface},
  booktitle    = {Proceedings of the 32nd Annual Conference on Computer Security Applications,
                  {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016},
  pages        = {533--545},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2991087},
  timestamp    = {Tue, 06 Nov 2018 16:59:24 +0100},
  biburl       = {https://dblp.org/rec/conf/acsac/BeaumontMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asplos/AmaniHCRCOBNLST16,
  author       = {Sidney Amani and
                  Alex Hixon and
                  Zilin Chen and
                  Christine Rizkallah and
                  Peter Chubb and
                  Liam O'Connor and
                  Joel Beeren and
                  Yutaka Nagashima and
                  Japheth Lim and
                  Thomas Sewell and
                  Joseph Tuong and
                  Gabriele Keller and
                  Toby C. Murray and
                  Gerwin Klein and
                  Gernot Heiser},
  editor       = {Tom Conte and
                  Yuanyuan Zhou},
  title        = {CoGENT: Verifying High-Assurance File System Implementations},
  booktitle    = {Proceedings of the Twenty-First International Conference on Architectural
                  Support for Programming Languages and Operating Systems, {ASPLOS}
                  2016, Atlanta, GA, USA, April 2-6, 2016},
  pages        = {175--188},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2872362.2872404},
  doi          = {10.1145/2872362.2872404},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asplos/AmaniHCRCOBNLST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MurrayS16,
  author       = {Toby C. Murray and
                  Deian Stefan},
  editor       = {Edgar R. Weippl and
                  Stefan Katzenbeisser and
                  Christopher Kruegel and
                  Andrew C. Myers and
                  Shai Halevi},
  title        = {PLAS'16: {ACM} {SIGPLAN} 11th Workshop on Programming Languages and
                  Analysis for Security},
  booktitle    = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Vienna, Austria, October 24-28, 2016},
  pages        = {1870},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2976749.2990484},
  doi          = {10.1145/2976749.2990484},
  timestamp    = {Tue, 10 Nov 2020 20:00:49 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/MurrayS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/MurraySPR16,
  author       = {Toby C. Murray and
                  Robert Sison and
                  Edward Pierzchalski and
                  Christine Rizkallah},
  title        = {Compositional Verification and Refinement of Concurrent Value-Dependent
                  Noninterference},
  booktitle    = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon,
                  Portugal, June 27 - July 1, 2016},
  pages        = {417--431},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CSF.2016.36},
  doi          = {10.1109/CSF.2016.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csfw/MurraySPR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoop/DrossopoulouNMM16,
  author       = {Sophia Drossopoulou and
                  James Noble and
                  Mark S. Miller and
                  Toby C. Murray},
  editor       = {Vladimir Klebanov},
  title        = {Permission and Authority Revisited towards a formalisation},
  booktitle    = {Proceedings of the 18th Workshop on Formal Techniques for Java-like
                  Programs, FTfJP@ECOOP 2016, Rome, Italy, July 17-22, 2016},
  pages        = {10},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {http://dl.acm.org/citation.cfm?id=2955821},
  timestamp    = {Tue, 06 Nov 2018 16:59:31 +0100},
  biburl       = {https://dblp.org/rec/conf/ecoop/DrossopoulouNMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icfp/OConnorCRALMNSK16,
  author       = {Liam O'Connor and
                  Zilin Chen and
                  Christine Rizkallah and
                  Sidney Amani and
                  Japheth Lim and
                  Toby C. Murray and
                  Yutaka Nagashima and
                  Thomas Sewell and
                  Gerwin Klein},
  editor       = {Jacques Garrigue and
                  Gabriele Keller and
                  Eijiro Sumii},
  title        = {Refinement through restraint: bringing down the cost of verification},
  booktitle    = {Proceedings of the 21st {ACM} {SIGPLAN} International Conference on
                  Functional Programming, {ICFP} 2016, Nara, Japan, September 18-22,
                  2016},
  pages        = {89--102},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2951913.2951940},
  doi          = {10.1145/2951913.2951940},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icfp/OConnorCRALMNSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itp/RizkallahLNSCOM16,
  author       = {Christine Rizkallah and
                  Japheth Lim and
                  Yutaka Nagashima and
                  Thomas Sewell and
                  Zilin Chen and
                  Liam O'Connor and
                  Toby C. Murray and
                  Gabriele Keller and
                  Gerwin Klein},
  editor       = {Jasmin Christian Blanchette and
                  Stephan Merz},
  title        = {A Framework for the Automatic Formal Verification of Refinement from {C}ogent to C.},
  booktitle    = {Interactive Theorem Proving - 7th International Conference, {ITP}
                  2016, Nancy, France, August 22-25, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9807},
  pages        = {323--340},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43144-4\_20},
  doi          = {10.1007/978-3-319-43144-4\_20},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itp/RizkallahLNSCOM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2016plas,
  editor       = {Toby C. Murray and
                  Deian Stefan},
  title        = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and
                  Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24,
                  2016},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2993600},
  doi          = {10.1145/2993600},
  isbn         = {978-1-4503-4574-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2016plas.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/OConnorRCALNSHK16,
  author       = {Liam O'Connor and
                  Christine Rizkallah and
                  Zilin Chen and
                  Sidney Amani and
                  Japheth Lim and
                  Yutaka Nagashima and
                  Thomas Sewell and
                  Alex Hixon and
                  Gabriele Keller and
                  Toby C. Murray and
                  Gerwin Klein},
  title        = {{COGENT:} Certified Compilation for a Functional Systems Language},
  journal      = {CoRR},
  volume       = {abs/1601.05520},
  year         = {2016},
  url          = {http://arxiv.org/abs/1601.05520},
  eprinttype    = {arXiv},
  eprint       = {1601.05520},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/OConnorRCALNSHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/infsof/JefferySAKM15,
  author       = {D. Ross Jeffery and
                  Mark Staples and
                  June Andronick and
                  Gerwin Klein and
                  Toby C. Murray},
  title        = {An empirical research agenda for understanding formal methods productivity},
  journal      = {Inf. Softw. Technol.},
  volume       = {60},
  pages        = {102--112},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.infsof.2014.11.005},
  doi          = {10.1016/J.INFSOF.2014.11.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/infsof/JefferySAKM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ecoop/Murray15,
  author       = {Toby C. Murray},
  editor       = {Michael Clarkson and
                  Limin Jia},
  title        = {Short Paper: On High-Assurance Information-Flow-Secure Programming
                  Languages},
  booktitle    = {Proceedings of the 10th {ACM} Workshop on Programming Languages and
                  Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July
                  4-10, 2015},
  pages        = {43--48},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2786558.2786561},
  doi          = {10.1145/2786558.2786561},
  timestamp    = {Tue, 18 Aug 2020 09:27:35 +0200},
  biburl       = {https://dblp.org/rec/conf/ecoop/Murray15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/MatichukMAJKS15,
  author       = {Daniel Matichuk and
                  Toby C. Murray and
                  June Andronick and
                  D. Ross Jeffery and
                  Gerwin Klein and
                  Mark Staples},
  editor       = {Antonia Bertolino and
                  Gerardo Canfora and
                  Sebastian G. Elbaum},
  title        = {Empirical Study Towards a Leading Indicator for Cost of Formal Software
                  Verification},
  booktitle    = {37th {IEEE/ACM} International Conference on Software Engineering,
                  {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 1},
  pages        = {722--732},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICSE.2015.85},
  doi          = {10.1109/ICSE.2015.85},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/MatichukMAJKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/corr/AmaniM15,
  author       = {Sidney Amani and
                  Toby C. Murray},
  editor       = {Rob J. van Glabbeek and
                  Jan Friso Groote and
                  Peter H{\"{o}}fner},
  title        = {Specifying a Realistic File System},
  booktitle    = {Proceedings Workshop on Models for Formal Analysis of Real Systems,
                  {MARS} 2015, Suva, Fiji, November 23, 2015},
  series       = {{EPTCS}},
  volume       = {196},
  pages        = {1--9},
  year         = {2015},
  url          = {https://doi.org/10.4204/EPTCS.196.1},
  doi          = {10.4204/EPTCS.196.1},
  timestamp    = {Fri, 27 Mar 2020 08:38:53 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/AmaniM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigops/KellerMAOCRKH14,
  author       = {Gabriele Keller and
                  Toby C. Murray and
                  Sidney Amani and
                  Liam O'Connor and
                  Zilin Chen and
                  Leonid Ryzhyk and
                  Gerwin Klein and
                  Gernot Heiser},
  title        = {File systems deserve verification too!},
  journal      = {{ACM} {SIGOPS} Oper. Syst. Rev.},
  volume       = {48},
  number       = {1},
  pages        = {58--64},
  year         = {2014},
  url          = {https://doi.org/10.1145/2626401.2626414},
  doi          = {10.1145/2626401.2626414},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sigops/KellerMAOCRKH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tocs/KleinAEMSKH14,
  author       = {Gerwin Klein and
                  June Andronick and
                  Kevin Elphinstone and
                  Toby C. Murray and
                  Thomas Sewell and
                  Rafal Kolanski and
                  Gernot Heiser},
  title        = {Comprehensive formal verification of an {OS} microkernel},
  journal      = {{ACM} Trans. Comput. Syst.},
  volume       = {32},
  number       = {1},
  pages        = {2:1--2:70},
  year         = {2014},
  url          = {https://doi.org/10.1145/2560537},
  doi          = {10.1145/2560537},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tocs/KleinAEMSKH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CockGMH14,
  author       = {David A. Cock and
                  Qian Ge and
                  Toby C. Murray and
                  Gernot Heiser},
  editor       = {Gail{-}Joon Ahn and
                  Moti Yung and
                  Ninghui Li},
  title        = {The Last Mile: An Empirical Study of Timing Channels on seL4},
  booktitle    = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Scottsdale, AZ, USA, November 3-7, 2014},
  pages        = {570--581},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2660267.2660294},
  doi          = {10.1145/2660267.2660294},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/CockGMH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esem/StaplesJAMKK14,
  author       = {Mark Staples and
                  D. Ross Jeffery and
                  June Andronick and
                  Toby C. Murray and
                  Gerwin Klein and
                  Rafal Kolanski},
  editor       = {Maurizio Morisio and
                  Tore Dyb{\aa} and
                  Marco Torchiano},
  title        = {Productivity for proof engineering},
  booktitle    = {2014 {ACM-IEEE} International Symposium on Empirical Software Engineering
                  and Measurement, {ESEM} '14, Torino, Italy, September 18-19, 2014},
  pages        = {15:1--15:4},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2652524.2652551},
  doi          = {10.1145/2652524.2652551},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esem/StaplesJAMKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itp/MatichukWM14,
  author       = {Daniel Matichuk and
                  Makarius Wenzel and
                  Toby C. Murray},
  editor       = {Gerwin Klein and
                  Ruben Gamboa},
  title        = {An Isabelle Proof Method Language},
  booktitle    = {Interactive Theorem Proving - 5th International Conference, {ITP}
                  2014, Held as Part of the Vienna Summer of Logic, {VSL} 2014, Vienna,
                  Austria, July 14-17, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8558},
  pages        = {390--405},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08970-6\_25},
  doi          = {10.1007/978-3-319-08970-6\_25},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/itp/MatichukWM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fac/Murray13,
  author       = {Toby C. Murray},
  title        = {On the limits of refinement-testing for model-checking {CSP}},
  journal      = {Formal Aspects Comput.},
  volume       = {25},
  number       = {2},
  pages        = {219--256},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00165-011-0183-6},
  doi          = {10.1007/S00165-011-0183-6},
  timestamp    = {Mon, 09 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fac/Murray13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/StaplesKKLAMJB04,
  author       = {Mark Staples and
                  Rafal Kolanski and
                  Gerwin Klein and
                  Corey Lewis and
                  June Andronick and
                  Toby C. Murray and
                  D. Ross Jeffery and
                  Len Bass},
  editor       = {David Notkin and
                  Betty H. C. Cheng and
                  Klaus Pohl},
  title        = {Formal specifications better than function points for code sizing},
  booktitle    = {35th International Conference on Software Engineering, {ICSE} '13,
                  San Francisco, CA, USA, May 18-26, 2013},
  pages        = {1257--1260},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICSE.2013.6606692},
  doi          = {10.1109/ICSE.2013.6606692},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/StaplesKKLAMJB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sosp/KellerMAOCRKH13,
  author       = {Gabriele Keller and
                  Toby C. Murray and
                  Sidney Amani and
                  Liam O'Connor and
                  Zilin Chen and
                  Leonid Ryzhyk and
                  Gerwin Klein and
                  Gernot Heiser},
  editor       = {Tim Harris and
                  Anil Madhavapeddy},
  title        = {File systems deserve verification too!},
  booktitle    = {Proceedings of the Seventh Workshop on Programming Languages and Operating
                  Systems, {PLOS} 2013, Farmington, Pennsylvania, USA, November 3-6,
                  2013},
  pages        = {1:1--1:7},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2525528.2525530},
  doi          = {10.1145/2525528.2525530},
  timestamp    = {Sun, 12 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sosp/KellerMAOCRKH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/MurrayMBGBSLGK13,
  author       = {Toby C. Murray and
                  Daniel Matichuk and
                  Matthew Brassil and
                  Peter Gammie and
                  Timothy Bourke and
                  Sean Seefried and
                  Corey Lewis and
                  Xin Gao and
                  Gerwin Klein},
  title        = {seL4: From General Purpose to a Proof of Information Flow Enforcement},
  booktitle    = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley,
                  CA, USA, May 19-22, 2013},
  pages        = {415--429},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/SP.2013.35},
  doi          = {10.1109/SP.2013.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/MurrayMBGBSLGK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/HeiserMK12,
  author       = {Gernot Heiser and
                  Toby C. Murray and
                  Gerwin Klein},
  title        = {It's Time for Trustworthy Systems},
  journal      = {{IEEE} Secur. Priv.},
  volume       = {10},
  number       = {2},
  pages        = {67--70},
  year         = {2012},
  url          = {https://doi.org/10.1109/MSP.2012.41},
  doi          = {10.1109/MSP.2012.41},
  timestamp    = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeesp/HeiserMK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpp/MurrayMBGK12,
  author       = {Toby C. Murray and
                  Daniel Matichuk and
                  Matthew Brassil and
                  Peter Gammie and
                  Gerwin Klein},
  editor       = {Chris Hawblitzel and
                  Dale Miller},
  title        = {Noninterference for Operating System Kernels},
  booktitle    = {Certified Programs and Proofs - Second International Conference, {CPP}
                  2012, Kyoto, Japan, December 13-15, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7679},
  pages        = {126--142},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35308-6\_12},
  doi          = {10.1007/978-3-642-35308-6\_12},
  timestamp    = {Wed, 07 Dec 2022 23:14:04 +0100},
  biburl       = {https://dblp.org/rec/conf/cpp/MurrayMBGK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sefm/MatichukM12,
  author       = {Daniel Matichuk and
                  Toby C. Murray},
  editor       = {George Eleftherakis and
                  Mike Hinchey and
                  Mike Holcombe},
  title        = {Extensible Specifications for Automatic Re-use of Specifications and
                  Proofs},
  booktitle    = {Software Engineering and Formal Methods - 10th International Conference,
                  {SEFM} 2012, Thessaloniki, Greece, October 1-5, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7504},
  pages        = {333--341},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33826-7\_23},
  doi          = {10.1007/978-3-642-33826-7\_23},
  timestamp    = {Sat, 05 Sep 2020 18:01:22 +0200},
  biburl       = {https://dblp.org/rec/conf/sefm/MatichukM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotos/KleinMGSW11,
  author       = {Gerwin Klein and
                  Toby C. Murray and
                  Peter Gammie and
                  Thomas Sewell and
                  Simon Winwood},
  editor       = {Matt Welsh},
  title        = {Provable Security: How Feasible Is It?},
  booktitle    = {13th Workshop on Hot Topics in Operating Systems, HotOS XIII, Napa,
                  California, USA, May 9-11, 2011},
  publisher    = {{USENIX} Association},
  year         = {2011},
  url          = {https://www.usenix.org/conference/hotosxiii/provable-security-how-feasible-it},
  timestamp    = {Wed, 04 Jul 2018 13:06:34 +0200},
  biburl       = {https://dblp.org/rec/conf/hotos/KleinMGSW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itp/SewellWGMAK11,
  author       = {Thomas Sewell and
                  Simon Winwood and
                  Peter Gammie and
                  Toby C. Murray and
                  June Andronick and
                  Gerwin Klein},
  editor       = {Marko C. J. D. van Eekelen and
                  Herman Geuvers and
                  Julien Schmaltz and
                  Freek Wiedijk},
  title        = {seL4 Enforces Integrity},
  booktitle    = {Interactive Theorem Proving - Second International Conference, {ITP}
                  2011, Berg en Dal, The Netherlands, August 22-25, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6898},
  pages        = {325--340},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22863-6\_24},
  doi          = {10.1007/978-3-642-22863-6\_24},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/itp/SewellWGMAK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/ethos/Murray10,
  author       = {Toby C. Murray},
  title        = {Analysing the security properties of object-capability patterns},
  school       = {University of Oxford, {UK}},
  year         = {2010},
  url          = {http://ora.ox.ac.uk/objects/uuid:98b0b6b6-eee1-45d5-b32e-d98d1085c612},
  timestamp    = {Tue, 05 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/ethos/Murray10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifip1-7/MurrayL09,
  author       = {Toby C. Murray and
                  Gavin Lowe},
  editor       = {Pierpaolo Degano and
                  Joshua D. Guttman},
  title        = {Analysing the Information Flow Properties of Object-Capability Patterns},
  booktitle    = {Formal Aspects in Security and Trust, 6th International Workshop,
                  {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5983},
  pages        = {81--95},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-12459-4\_7},
  doi          = {10.1007/978-3-642-12459-4\_7},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/ifip1-7/MurrayL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/MurrayG08,
  author       = {Toby C. Murray and
                  Duncan A. Grove},
  title        = {Non-delegatable authorities in capability systems},
  journal      = {J. Comput. Secur.},
  volume       = {16},
  number       = {6},
  pages        = {743--759},
  year         = {2008},
  url          = {https://doi.org/10.3233/JCS-2008-0314},
  doi          = {10.3233/JCS-2008-0314},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcs/MurrayG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:journals/entcs/MurrayL09,
  author       = {Toby C. Murray and
                  Gavin Lowe},
  editor       = {Alice Miller and
                  Muffy Calder},
  title        = {On Refinement-Closed Security Properties and Nondeterministic Compositions},
  booktitle    = {Proceedings of the Eighth International Workshop on Automated Verification
                  of Critical Systems, AVoCS 2008, Glasgow, UK, September 30 - October
                  1, 2008},
  series       = {Electronic Notes in Theoretical Computer Science},
  volume       = {250},
  number       = {2},
  pages        = {49--68},
  publisher    = {Elsevier},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.entcs.2009.08.017},
  doi          = {10.1016/J.ENTCS.2009.08.017},
  timestamp    = {Fri, 24 Feb 2023 13:53:27 +0100},
  biburl       = {https://dblp.org/rec/journals/entcs/MurrayL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsac/GroveMONJBH07,
  author       = {Duncan A. Grove and
                  Toby C. Murray and
                  Chris A. Owen and
                  Chris J. North and
                  J. A. Jones and
                  Mark R. Beaumont and
                  Bradley D. Hopkins},
  title        = {An Overview of the Annex System},
  booktitle    = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007),
                  December 10-14, 2007, Miami Beach, Florida, {USA}},
  pages        = {341--352},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ACSAC.2007.8},
  doi          = {10.1109/ACSAC.2007.8},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsac/GroveMONJBH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}