default search action
BibTeX records: Toby C. Murray
@article{DBLP:journals/tches/ChengCGMMYZ24, author = {Shing Hing William Cheng and Chitchanok Chuengsatiansup and Daniel Genkin and Dallas McNeil and Toby Murray and Yuval Yarom and Zhiyuan Zhang}, title = {Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {3}, pages = {224--248}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i3.224-248}, doi = {10.46586/TCHES.V2024.I3.224-248}, timestamp = {Wed, 21 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/ChengCGMMYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/ZhangM0KMTO24, author = {Mo Zhang and Eduard Marin and Mark Ryan and Vassilis Kostakos and Toby Murray and Benjamin Tag and David F. Oswald}, title = {OOBKey: Key Exchange with Implantable Medical Devices Using Out-Of-Band Channels}, booktitle = {Proceedings of the 19th International Conference on Availability, Reliability and Security, {ARES} 2024, Vienna, Austria, 30 July 2024 - 2 August 2024}, pages = {191:1--191:13}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3664476.3670876}, doi = {10.1145/3664476.3670876}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/ZhangM0KMTO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/YanMOPS24, author = {Pengbo Yan and Toby Murray and Olga Ohrimenko and Van{-}Thuan Pham and Robert Sison}, editor = {Andr{\'{e}} Platzer and Kristin Yvonne Rozier and Matteo Pradella and Matteo Rossi}, title = {Combining Classical and Probabilistic Independence Reasoning to Verify the Security of Oblivious Algorithms}, booktitle = {Formal Methods - 26th International Symposium, {FM} 2024, Milan, Italy, September 9-13, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14933}, pages = {188--205}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-71162-6\_10}, doi = {10.1007/978-3-031-71162-6\_10}, timestamp = {Tue, 17 Sep 2024 14:10:04 +0200}, biburl = {https://dblp.org/rec/conf/fm/YanMOPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/PanCMP24, author = {Lianglu Pan and Shaanan Cohney and Toby Murray and Van{-}Thuan Pham}, title = {EDEFuzz: {A} Web {API} Fuzzer for Excessive Data Exposures}, booktitle = {Proceedings of the 46th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2024, Lisbon, Portugal, April 14-20, 2024}, pages = {45:1--45:12}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3597503.3608133}, doi = {10.1145/3597503.3608133}, timestamp = {Mon, 24 Jun 2024 15:20:25 +0200}, biburl = {https://dblp.org/rec/conf/icse/PanCMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itp/JacksonMR24, author = {Vincent Jackson and Toby Murray and Christine Rizkallah}, editor = {Yves Bertot and Temur Kutsia and Michael Norrish}, title = {A Generalised Union of Rely-Guarantee and Separation Logic Using Permission Algebras}, booktitle = {15th International Conference on Interactive Theorem Proving, {ITP} 2024, September 9-14, 2024, Tbilisi, Georgia}, series = {LIPIcs}, volume = {309}, pages = {23:1--23:16}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2024}, url = {https://doi.org/10.4230/LIPIcs.ITP.2024.23}, doi = {10.4230/LIPICS.ITP.2024.23}, timestamp = {Mon, 02 Sep 2024 16:55:27 +0200}, biburl = {https://dblp.org/rec/conf/itp/JacksonMR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2401-17628, author = {Jiankai Jin and Chitchanok Chuengsatiansup and Toby Murray and Benjamin I. P. Rubinstein and Yuval Yarom and Olga Ohrimenko}, title = {Elephants Do Not Forget: Differential Privacy with State Continuity for Privacy Budget}, journal = {CoRR}, volume = {abs/2401.17628}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2401.17628}, doi = {10.48550/ARXIV.2401.17628}, eprinttype = {arXiv}, eprint = {2401.17628}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2401-17628.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-03663, author = {Aaron Bembenek and Toby Murray}, title = {Symbol Correctness in Deep Neural Networks Containing Symbolic Layers}, journal = {CoRR}, volume = {abs/2402.03663}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.03663}, doi = {10.48550/ARXIV.2402.03663}, eprinttype = {arXiv}, eprint = {2402.03663}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-03663.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2402-11892, author = {Thanh Le{-}Cong and Dat Nguyen and Bach Le and Toby Murray}, title = {Evaluating Program Repair with Semantic-Preserving Transformations: {A} Naturalness Assessment}, journal = {CoRR}, volume = {abs/2402.11892}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2402.11892}, doi = {10.48550/ARXIV.2402.11892}, eprinttype = {arXiv}, eprint = {2402.11892}, timestamp = {Thu, 21 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2402-11892.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2407-00514, author = {Pengbo Yan and Toby Murray and Olga Ohrimenko and Van{-}Thuan Pham and Robert Sison}, title = {Combining Classical and Probabilistic Independence Reasoning to Verify the Security of Oblivious Algorithms (Extended Version)}, journal = {CoRR}, volume = {abs/2407.00514}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2407.00514}, doi = {10.48550/ARXIV.2407.00514}, eprinttype = {arXiv}, eprint = {2407.00514}, timestamp = {Fri, 09 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2407-00514.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChengCGMMYZ24, author = {Shing Hing William Cheng and Chitchanok Chuengsatiansup and Daniel Genkin and Dallas McNeil and Toby Murray and Yuval Yarom and Zhiyuan Zhang}, title = {Evict+Spec+Time: Exploiting Out-of-Order Execution to Improve Cache-Timing Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {149}, year = {2024}, url = {https://eprint.iacr.org/2024/149}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/ChengCGMMYZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MurrayTEN23, author = {Toby Murray and Mukesh Tiwari and Gidon Ernst and David A. Naumann}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {1746--1760}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623141}, doi = {10.1145/3576915.3623141}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MurrayTEN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/SisonBMKH23, author = {Robert Sison and Scott Buckley and Toby Murray and Gerwin Klein and Gernot Heiser}, editor = {Marsha Chechik and Joost{-}Pieter Katoen and Martin Leucker}, title = {Formalising the Prevention of Microarchitectural Timing Channels by Operating Systems}, booktitle = {Formal Methods - 25th International Symposium, {FM} 2023, L{\"{u}}beck, Germany, March 6-10, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14000}, pages = {103--121}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-27481-7\_8}, doi = {10.1007/978-3-031-27481-7\_8}, timestamp = {Sat, 11 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fm/SisonBMKH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fuzzing/GaoPLCMR23, author = {Wentao Gao and Van{-}Thuan Pham and Dongge Liu and Oliver Chang and Toby Murray and Benjamin I. P. Rubinstein}, editor = {Marcel B{\"{o}}hme and Yannic Noller and Baishakhi Ray and L{\'{a}}szl{\'{o}} Szekeres}, title = {Beyond the Coverage Plateau: {A} Comprehensive Study of Fuzz Blockers (Registered Report)}, booktitle = {Proceedings of the 2nd International Fuzzing Workshop, {FUZZING} 2023, Seattle, WA, USA, 17 July 2023}, pages = {47--55}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3605157.3605177}, doi = {10.1145/3605157.3605177}, timestamp = {Mon, 17 Jul 2023 14:52:13 +0200}, biburl = {https://dblp.org/rec/conf/fuzzing/GaoPLCMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfem/MurrayYE23, author = {Toby Murray and Pengbo Yan and Gidon Ernst}, editor = {Yi Li and Sofi{\`{e}}ne Tahar}, title = {Compositional Vulnerability Detection with Insecurity Separation Logic}, booktitle = {Formal Methods and Software Engineering - 24th International Conference on Formal Engineering Methods, {ICFEM} 2023, Brisbane, QLD, Australia, November 21-24, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14308}, pages = {65--82}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7584-6\_5}, doi = {10.1007/978-981-99-7584-6\_5}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icfem/MurrayYE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2301-09258, author = {Lianglu Pan and Shaanan Cohney and Toby Murray and Van{-}Thuan Pham}, title = {Detecting Excessive Data Exposures in Web Server Responses with Metamorphic Fuzzing}, journal = {CoRR}, volume = {abs/2301.09258}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2301.09258}, doi = {10.48550/ARXIV.2301.09258}, eprinttype = {arXiv}, eprint = {2301.09258}, timestamp = {Thu, 26 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2301-09258.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-03442, author = {Toby Murray and Mukesh Tiwari and Gidon Ernst and David A. Naumann}, title = {Assume but Verify: Deductive Verification of Leaked Information in Concurrent Applications (Extended Version)}, journal = {CoRR}, volume = {abs/2309.03442}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.03442}, doi = {10.48550/ARXIV.2309.03442}, eprinttype = {arXiv}, eprint = {2309.03442}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-03442.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-17046, author = {Scott Buckley and Robert Sison and Nils Wistoff and Curtis Millar and Toby Murray and Gerwin Klein and Gernot Heiser}, title = {Proving the Absence of Microarchitectural Timing Channels}, journal = {CoRR}, volume = {abs/2310.17046}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.17046}, doi = {10.48550/ARXIV.2310.17046}, eprinttype = {arXiv}, eprint = {2310.17046}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-17046.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/MassacciSMMOMRB22, author = {Fabio Massacci and Antonino Sabetta and Jelena Mirkovic and Toby Murray and Hamed Okhravi and Mohammad Mannan and Anderson Rocha and Eric Bodden and Daniel E. Geer}, title = {"Free" as in Freedom to Protest?}, journal = {{IEEE} Secur. Priv.}, volume = {20}, number = {5}, pages = {16--21}, year = {2022}, url = {https://doi.org/10.1109/MSEC.2022.3185845}, doi = {10.1109/MSEC.2022.3185845}, timestamp = {Thu, 22 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeesp/MassacciSMMOMRB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isola/ErnstKM22, author = {Gidon Ernst and Alexander Knapp and Toby Murray}, editor = {Tiziana Margaria and Bernhard Steffen}, title = {A Hoare Logic with Regular Behavioral Specifications}, booktitle = {Leveraging Applications of Formal Methods, Verification and Validation. Verification Principles - 11th International Symposium, ISoLA 2022, Rhodes, Greece, October 22-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13701}, pages = {45--64}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-19849-6\_4}, doi = {10.1007/978-3-031-19849-6\_4}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isola/ErnstKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcre/LiuPEMR22, author = {Dongge Liu and Van{-}Thuan Pham and Gidon Ernst and Toby Murray and Benjamin I. P. Rubinstein}, title = {State Selection Algorithms and Their Impact on The Performance of Stateful Network Protocol Fuzzing}, booktitle = {{IEEE} International Conference on Software Analysis, Evolution and Reengineering, {SANER} 2022, Honolulu, HI, USA, March 15-18, 2022}, pages = {720--730}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SANER53432.2022.00089}, doi = {10.1109/SANER53432.2022.00089}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcre/LiuPEMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-06584, author = {Gidon Ernst and Alexander Knapp and Toby Murray}, title = {A Hoare Logic with Regular Behavioral Specifications}, journal = {CoRR}, volume = {abs/2205.06584}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.06584}, doi = {10.48550/ARXIV.2205.06584}, eprinttype = {arXiv}, eprint = {2205.06584}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-06584.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fmsd/SmithCM21, author = {Graeme Smith and Nicholas Coughlin and Toby Murray}, title = {Information-flow control on {ARM} and {POWER} multicore processors}, journal = {Formal Methods Syst. Des.}, volume = {58}, number = {1-2}, pages = {251--293}, year = {2021}, url = {https://doi.org/10.1007/s10703-021-00376-2}, doi = {10.1007/S10703-021-00376-2}, timestamp = {Fri, 03 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fmsd/SmithCM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/SisonM21, author = {Robert Sison and Toby Murray}, title = {Verified secure compilation for mixed-sensitivity concurrent programs}, journal = {J. Funct. Program.}, volume = {31}, pages = {e18}, year = {2021}, url = {https://doi.org/10.1017/S0956796821000162}, doi = {10.1017/S0956796821000162}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/SisonM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfp/OConnorCRJAKMSK21, author = {Liam O'Connor and Zilin Chen and Christine Rizkallah and Vincent Jackson and Sidney Amani and Gerwin Klein and Toby Murray and Thomas Sewell and Gabriele Keller}, title = {Cogent: uniqueness types and certifying compilation}, journal = {J. Funct. Program.}, volume = {31}, pages = {e25}, year = {2021}, url = {https://doi.org/10.1017/S095679682100023X}, doi = {10.1017/S095679682100023X}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfp/OConnorCRJAKMSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pacmpl/YanM21, author = {Pengbo Yan and Toby Murray}, title = {SecRSL: security separation logic for {C11} release-acquire concurrency}, journal = {Proc. {ACM} Program. Lang.}, volume = {5}, number = {{OOPSLA}}, pages = {1--26}, year = {2021}, url = {https://doi.org/10.1145/3485476}, doi = {10.1145/3485476}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/pacmpl/YanM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/PhamNTMR21, author = {Van{-}Thuan Pham and Manh{-}Dung Nguyen and Quang{-}Trung Ta and Toby Murray and Benjamin I. P. Rubinstein}, title = {Towards Systematic and Dynamic Task Allocation for Collaborative Parallel Fuzzing}, booktitle = {36th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2021, Melbourne, Australia, November 15-19, 2021}, pages = {1337--1341}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ASE51524.2021.9678810}, doi = {10.1109/ASE51524.2021.9678810}, timestamp = {Mon, 24 Jan 2022 16:18:34 +0100}, biburl = {https://dblp.org/rec/conf/kbse/PhamNTMR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/abs-2108-02968, author = {Gidon Ernst and Johannes Blau and Toby Murray}, editor = {Jos{\'{e}} Proen{\c{c}}a and Andrei Paskevich}, title = {Deductive Verification via the Debug Adapter Protocol}, booktitle = {Proceedings of the 6th Workshop on Formal Integrated Development Environment, F-IDE@NFM 2021, Held online, 24-25th May 2021}, series = {{EPTCS}}, volume = {338}, pages = {89--96}, year = {2021}, url = {https://doi.org/10.4204/EPTCS.338.11}, doi = {10.4204/EPTCS.338.11}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2108-02968.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2107-05225, author = {Toby Murray and Pengbo Yan and Gidon Ernst}, title = {Incremental Vulnerability Detection via Back-Propagating Symbolic Execution of Insecurity Separation Logic}, journal = {CoRR}, volume = {abs/2107.05225}, year = {2021}, url = {https://arxiv.org/abs/2107.05225}, eprinttype = {arXiv}, eprint = {2107.05225}, timestamp = {Tue, 20 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2107-05225.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-03602, author = {Pengbo Yan and Toby Murray}, title = {SecRSL: Security Separation Logic for {C11} Release-Acquire Concurrency (Extended version with technical appendices)}, journal = {CoRR}, volume = {abs/2109.03602}, year = {2021}, url = {https://arxiv.org/abs/2109.03602}, eprinttype = {arXiv}, eprint = {2109.03602}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-03602.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2112-15498, author = {Dongge Liu and Van{-}Thuan Pham and Gidon Ernst and Toby Murray and Benjamin I. P. Rubinstein}, title = {State Selection Algorithms and Their Impact on The Performance of Stateful Network Protocol Fuzzing}, journal = {CoRR}, volume = {abs/2112.15498}, year = {2021}, url = {https://arxiv.org/abs/2112.15498}, eprinttype = {arXiv}, eprint = {2112.15498}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2112-15498.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/Murray20, author = {Toby Murray}, title = {An Under-Approximate Relational Logic}, journal = {Arch. Formal Proofs}, volume = {2020}, year = {2020}, url = {https://www.isa-afp.org/entries/Relational-Incorrectness-Logic.html}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/Murray20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/HeiserMK20, author = {Gernot Heiser and Toby Murray and Gerwin Klein}, title = {Towards Provable Timing-Channel Prevention}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {54}, number = {1}, pages = {1--7}, year = {2020}, url = {https://doi.org/10.1145/3421473.3421475}, doi = {10.1145/3421473.3421475}, timestamp = {Tue, 06 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sigops/HeiserMK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/SchoepeMS20, author = {Daniel Schoepe and Toby Murray and Andrei Sabelfeld}, title = {{VERONICA:} Expressive and Precise Concurrent Information Flow Security}, booktitle = {33rd {IEEE} Computer Security Foundations Symposium, {CSF} 2020, Boston, MA, USA, June 22-26, 2020}, pages = {79--94}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/CSF49147.2020.00014}, doi = {10.1109/CSF49147.2020.00014}, timestamp = {Mon, 10 Aug 2020 18:44:11 +0200}, biburl = {https://dblp.org/rec/conf/csfw/SchoepeMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fase/LiuEMR20, author = {Dongge Liu and Gidon Ernst and Toby Murray and Benjamin I. P. Rubinstein}, editor = {Heike Wehrheim and Jordi Cabot}, title = {Legion: Best-First Concolic Testing (Competition Contribution)}, booktitle = {Fundamental Approaches to Software Engineering - 23rd International Conference, {FASE} 2020, Held as Part of the European Joint Conferences on Theory and Practice of Software, {ETAPS} 2020, Dublin, Ireland, April 25-30, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12076}, pages = {545--549}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45234-6\_31}, doi = {10.1007/978-3-030-45234-6\_31}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fase/LiuEMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kbse/LiuEMR20, author = {Dongge Liu and Gidon Ernst and Toby Murray and Benjamin I. P. Rubinstein}, title = {{LEGION:} Best-First Concolic Testing}, booktitle = {35th {IEEE/ACM} International Conference on Automated Software Engineering, {ASE} 2020, Melbourne, Australia, September 21-25, 2020}, pages = {54--65}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1145/3324884.3416629}, doi = {10.1145/3324884.3416629}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kbse/LiuEMR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2001-11142, author = {Daniel Schoepe and Toby Murray and Andrei Sabelfeld}, title = {{VERONICA:} Expressive and Precise Concurrent Information Flow Security (Extended Version with Technical Appendices)}, journal = {CoRR}, volume = {abs/2001.11142}, year = {2020}, url = {https://arxiv.org/abs/2001.11142}, eprinttype = {arXiv}, eprint = {2001.11142}, timestamp = {Mon, 03 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2001-11142.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2002-06311, author = {Dongge Liu and Gidon Ernst and Toby Murray and Benjamin I. P. Rubinstein}, title = {Legion: Best-First Concolic Testing}, journal = {CoRR}, volume = {abs/2002.06311}, year = {2020}, url = {https://arxiv.org/abs/2002.06311}, eprinttype = {arXiv}, eprint = {2002.06311}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2002-06311.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2003-04791, author = {Toby Murray}, title = {An Under-Approximate Relational Logic: Heralding Logics of Insecurity, Incorrect Implementation {\&} More}, journal = {CoRR}, volume = {abs/2003.04791}, year = {2020}, url = {https://arxiv.org/abs/2003.04791}, eprinttype = {arXiv}, eprint = {2003.04791}, timestamp = {Tue, 17 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2003-04791.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-14032, author = {Robert Sison and Toby Murray}, title = {Verified Secure Compilation for Mixed-Sensitivity Concurrent Programs}, journal = {CoRR}, volume = {abs/2010.14032}, year = {2020}, url = {https://arxiv.org/abs/2010.14032}, eprinttype = {arXiv}, eprint = {2010.14032}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-14032.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cav/ErnstM19, author = {Gidon Ernst and Toby Murray}, editor = {Isil Dillig and Serdar Tasiran}, title = {SecCSL: Security Concurrent Separation Logic}, booktitle = {Computer Aided Verification - 31st International Conference, {CAV} 2019, New York City, NY, USA, July 15-18, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11562}, pages = {208--230}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25543-5\_13}, doi = {10.1007/978-3-030-25543-5\_13}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cav/ErnstM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/YangMRP19, author = {Renlord Yang and Toby Murray and Paul Rimba and Udaya Parampalli}, title = {Empirically Analyzing Ethereum's Gas Mechanism}, booktitle = {2019 {IEEE} European Symposium on Security and Privacy Workshops, EuroS{\&}P Workshops 2019, Stockholm, Sweden, June 17-19, 2019}, pages = {310--319}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/EuroSPW.2019.00041}, doi = {10.1109/EUROSPW.2019.00041}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/YangMRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fm/SmithCM19, author = {Graeme Smith and Nicholas Coughlin and Toby Murray}, editor = {Maurice H. ter Beek and Annabelle McIver and Jos{\'{e}} N. Oliveira}, title = {Value-Dependent Information-Flow Security on Weak Memory Models}, booktitle = {Formal Methods - The Next 30 Years - Third World Congress, {FM} 2019, Porto, Portugal, October 7-11, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11800}, pages = {539--555}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30942-8\_32}, doi = {10.1007/978-3-030-30942-8\_32}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fm/SmithCM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/HeiserKM19, author = {Gernot Heiser and Gerwin Klein and Toby C. Murray}, title = {Can We Prove Time Protection?}, booktitle = {Proceedings of the Workshop on Hot Topics in Operating Systems, HotOS 2019, Bertinoro, Italy, May 13-15, 2019}, pages = {23--29}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3317550.3321431}, doi = {10.1145/3317550.3321431}, timestamp = {Wed, 29 May 2019 13:38:37 +0200}, biburl = {https://dblp.org/rec/conf/hotos/HeiserKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itp/SisonM19, author = {Robert Sison and Toby Murray}, editor = {John Harrison and John O'Leary and Andrew Tolmach}, title = {Verifying That a Compiler Preserves Concurrent Value-Dependent Information-Flow Security}, booktitle = {10th International Conference on Interactive Theorem Proving, {ITP} 2019, September 9-12, 2019, Portland, OR, {USA}}, series = {LIPIcs}, volume = {141}, pages = {27:1--27:19}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2019}, url = {https://doi.org/10.4230/LIPIcs.ITP.2019.27}, doi = {10.4230/LIPICS.ITP.2019.27}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/itp/SisonM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ecoop/2019ftfjp, editor = {Toby Murray and Gidon Ernst}, title = {Proceedings of the 21st Workshop on Formal Techniques for Java-like Programs, FTfJP@ECOOP 2019, London, United Kingdom, July 15, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3340672}, doi = {10.1145/3340672}, isbn = {978-1-4503-6864-3}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/2019ftfjp.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1901-08338, author = {Gernot Heiser and Gerwin Klein and Toby C. Murray}, title = {Can We Prove Time Protection?}, journal = {CoRR}, volume = {abs/1901.08338}, year = {2019}, url = {http://arxiv.org/abs/1901.08338}, eprinttype = {arXiv}, eprint = {1901.08338}, timestamp = {Sat, 02 Feb 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1901-08338.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-00553, author = {Renlord Yang and Toby Murray and Paul Rimba and Udaya Parampalli}, title = {Empirically Analyzing Ethereum's Gas Mechanism}, journal = {CoRR}, volume = {abs/1905.00553}, year = {2019}, url = {http://arxiv.org/abs/1905.00553}, eprinttype = {arXiv}, eprint = {1905.00553}, timestamp = {Mon, 27 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-00553.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-00713, author = {Robert Sison and Toby C. Murray}, title = {Verifying that a compiler preserves concurrent value-dependent information-flow security}, journal = {CoRR}, volume = {abs/1907.00713}, year = {2019}, url = {http://arxiv.org/abs/1907.00713}, eprinttype = {arXiv}, eprint = {1907.00713}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-00713.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/KleinAFKMH18, author = {Gerwin Klein and June Andronick and Matthew Fernandez and Ihor Kuz and Toby C. Murray and Gernot Heiser}, title = {Formally verified software in the real world}, journal = {Commun. {ACM}}, volume = {61}, number = {10}, pages = {68--77}, year = {2018}, url = {https://doi.org/10.1145/3230627}, doi = {10.1145/3230627}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cacm/KleinAFKMH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/0001PMM18, author = {James Noble and Alex Potanin and Toby C. Murray and Mark S. Miller}, editor = {Peter M{\"{u}}ller and Ina Schaefer}, title = {Abstract and Concrete Data Types vs Object Capabilities}, booktitle = {Principled Software Development - Essays Dedicated to Arnd Poetzsch-Heffter on the Occasion of his 60th Birthday}, pages = {221--240}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98047-8\_14}, doi = {10.1007/978-3-319-98047-8\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/birthday/0001PMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/MurraySE18, author = {Toby C. Murray and Robert Sison and Kai Engelhardt}, title = {{COVERN:} {A} Logic for Compositional Verification of Information Flow Control}, booktitle = {2018 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2018, London, United Kingdom, April 24-26, 2018}, pages = {16--30}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EuroSP.2018.00010}, doi = {10.1109/EUROSP.2018.00010}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/eurosp/MurraySE18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ozchi/IssaME18, author = {Abdullah Issa and Toby Murray and Gidon Ernst}, editor = {George Buchanan and Duncan Stevenson}, title = {In search of perfect users: towards understanding the usability of converged multi-level secure user interfaces}, booktitle = {Proceedings of the 30th Australian Conference on Computer-Human Interaction, OzCHI 2018, Melbourne, VIC, Australia, December 04-07, 2018}, pages = {572--576}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3292147.3292231}, doi = {10.1145/3292147.3292231}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ozchi/IssaME18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secdev/MurrayO18, author = {Toby C. Murray and Paul C. van Oorschot}, title = {{BP:} Formal Proofs, the Fine Print and Side Effects}, booktitle = {2018 {IEEE} Cybersecurity Development, SecDev 2018, Cambridge, MA, USA, September 30 - October 2, 2018}, pages = {1--10}, publisher = {{IEEE} Computer Society}, year = {2018}, url = {https://doi.org/10.1109/SecDev.2018.00009}, doi = {10.1109/SECDEV.2018.00009}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/secdev/MurrayO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MurraySB17, author = {Toby C. Murray and Andrei Sabelfeld and Lujo Bauer}, title = {Special issue on verified information flow security}, journal = {J. Comput. Secur.}, volume = {25}, number = {4-5}, pages = {319--321}, year = {2017}, url = {https://doi.org/10.3233/JCS-0559}, doi = {10.3233/JCS-0559}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MurraySB17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/GrutterM17, author = {Samuel Gr{\"{u}}tter and Toby C. Murray}, title = {Short Paper: Towards Information Flow Reasoning about Real-World {C} Code}, booktitle = {Proceedings of the 2017 Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2017, Dallas, TX, USA, October 30, 2017}, pages = {43--48}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3139337.3139345}, doi = {10.1145/3139337.3139345}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/GrutterM17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1709-05243, author = {Samuel Gr{\"{u}}tter and Toby C. Murray}, title = {VST-Flow: Fine-grained low-level reasoning about real-world {C} code}, journal = {CoRR}, volume = {abs/1709.05243}, year = {2017}, url = {http://arxiv.org/abs/1709.05243}, eprinttype = {arXiv}, eprint = {1709.05243}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1709-05243.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/MurraySPR16, author = {Toby C. Murray and Robert Sison and Edward Pierzchalski and Christine Rizkallah}, title = {A Dependent Security Type System for Concurrent Imperative Programs}, journal = {Arch. Formal Proofs}, volume = {2016}, year = {2016}, url = {https://www.isa-afp.org/entries/Dependent\_SIFUM\_Type\_Systems.shtml}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/MurraySPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/afp/MurraySPR16a, author = {Toby C. Murray and Robert Sison and Edward Pierzchalski and Christine Rizkallah}, title = {Compositional Security-Preserving Refinement for Concurrent Imperative Programs}, journal = {Arch. Formal Proofs}, volume = {2016}, year = {2016}, url = {https://www.isa-afp.org/entries/Dependent\_SIFUM\_Refinement.shtml}, timestamp = {Mon, 25 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/afp/MurraySPR16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jar/MatichukMW16, author = {Daniel Matichuk and Toby C. Murray and Makarius Wenzel}, title = {Eisbach: {A} Proof Method Language for Isabelle}, journal = {J. Autom. Reason.}, volume = {56}, number = {3}, pages = {261--282}, year = {2016}, url = {https://doi.org/10.1007/s10817-015-9360-2}, doi = {10.1007/S10817-015-9360-2}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jar/MatichukMW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/BeaumontMM16, author = {Mark R. Beaumont and Jim McCarthy and Toby C. Murray}, editor = {Stephen Schwab and William K. Robertson and Davide Balzarotti}, title = {The cross domain desktop compositor: using hardware-based video compositing for a multi-level secure user interface}, booktitle = {Proceedings of the 32nd Annual Conference on Computer Security Applications, {ACSAC} 2016, Los Angeles, CA, USA, December 5-9, 2016}, pages = {533--545}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2991087}, timestamp = {Tue, 06 Nov 2018 16:59:24 +0100}, biburl = {https://dblp.org/rec/conf/acsac/BeaumontMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asplos/AmaniHCRCOBNLST16, author = {Sidney Amani and Alex Hixon and Zilin Chen and Christine Rizkallah and Peter Chubb and Liam O'Connor and Joel Beeren and Yutaka Nagashima and Japheth Lim and Thomas Sewell and Joseph Tuong and Gabriele Keller and Toby C. Murray and Gerwin Klein and Gernot Heiser}, editor = {Tom Conte and Yuanyuan Zhou}, title = {CoGENT: Verifying High-Assurance File System Implementations}, booktitle = {Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems, {ASPLOS} 2016, Atlanta, GA, USA, April 2-6, 2016}, pages = {175--188}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2872362.2872404}, doi = {10.1145/2872362.2872404}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asplos/AmaniHCRCOBNLST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MurrayS16, author = {Toby C. Murray and Deian Stefan}, editor = {Edgar R. Weippl and Stefan Katzenbeisser and Christopher Kruegel and Andrew C. Myers and Shai Halevi}, title = {PLAS'16: {ACM} {SIGPLAN} 11th Workshop on Programming Languages and Analysis for Security}, booktitle = {Proceedings of the 2016 {ACM} {SIGSAC} Conference on Computer and Communications Security, Vienna, Austria, October 24-28, 2016}, pages = {1870}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2976749.2990484}, doi = {10.1145/2976749.2990484}, timestamp = {Tue, 10 Nov 2020 20:00:49 +0100}, biburl = {https://dblp.org/rec/conf/ccs/MurrayS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csfw/MurraySPR16, author = {Toby C. Murray and Robert Sison and Edward Pierzchalski and Christine Rizkallah}, title = {Compositional Verification and Refinement of Concurrent Value-Dependent Noninterference}, booktitle = {{IEEE} 29th Computer Security Foundations Symposium, {CSF} 2016, Lisbon, Portugal, June 27 - July 1, 2016}, pages = {417--431}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CSF.2016.36}, doi = {10.1109/CSF.2016.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csfw/MurraySPR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/DrossopoulouNMM16, author = {Sophia Drossopoulou and James Noble and Mark S. Miller and Toby C. Murray}, editor = {Vladimir Klebanov}, title = {Permission and Authority Revisited towards a formalisation}, booktitle = {Proceedings of the 18th Workshop on Formal Techniques for Java-like Programs, FTfJP@ECOOP 2016, Rome, Italy, July 17-22, 2016}, pages = {10}, publisher = {{ACM}}, year = {2016}, url = {http://dl.acm.org/citation.cfm?id=2955821}, timestamp = {Tue, 06 Nov 2018 16:59:31 +0100}, biburl = {https://dblp.org/rec/conf/ecoop/DrossopoulouNMM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icfp/OConnorCRALMNSK16, author = {Liam O'Connor and Zilin Chen and Christine Rizkallah and Sidney Amani and Japheth Lim and Toby C. Murray and Yutaka Nagashima and Thomas Sewell and Gerwin Klein}, editor = {Jacques Garrigue and Gabriele Keller and Eijiro Sumii}, title = {Refinement through restraint: bringing down the cost of verification}, booktitle = {Proceedings of the 21st {ACM} {SIGPLAN} International Conference on Functional Programming, {ICFP} 2016, Nara, Japan, September 18-22, 2016}, pages = {89--102}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2951913.2951940}, doi = {10.1145/2951913.2951940}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icfp/OConnorCRALMNSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itp/RizkallahLNSCOM16, author = {Christine Rizkallah and Japheth Lim and Yutaka Nagashima and Thomas Sewell and Zilin Chen and Liam O'Connor and Toby C. Murray and Gabriele Keller and Gerwin Klein}, editor = {Jasmin Christian Blanchette and Stephan Merz}, title = {A Framework for the Automatic Formal Verification of Refinement from {C}ogent to C.}, booktitle = {Interactive Theorem Proving - 7th International Conference, {ITP} 2016, Nancy, France, August 22-25, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9807}, pages = {323--340}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43144-4\_20}, doi = {10.1007/978-3-319-43144-4\_20}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itp/RizkallahLNSCOM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2016plas, editor = {Toby C. Murray and Deian Stefan}, title = {Proceedings of the 2016 {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@CCS 2016, Vienna, Austria, October 24, 2016}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2993600}, doi = {10.1145/2993600}, isbn = {978-1-4503-4574-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2016plas.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/OConnorRCALNSHK16, author = {Liam O'Connor and Christine Rizkallah and Zilin Chen and Sidney Amani and Japheth Lim and Yutaka Nagashima and Thomas Sewell and Alex Hixon and Gabriele Keller and Toby C. Murray and Gerwin Klein}, title = {{COGENT:} Certified Compilation for a Functional Systems Language}, journal = {CoRR}, volume = {abs/1601.05520}, year = {2016}, url = {http://arxiv.org/abs/1601.05520}, eprinttype = {arXiv}, eprint = {1601.05520}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/OConnorRCALNSHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/JefferySAKM15, author = {D. Ross Jeffery and Mark Staples and June Andronick and Gerwin Klein and Toby C. Murray}, title = {An empirical research agenda for understanding formal methods productivity}, journal = {Inf. Softw. Technol.}, volume = {60}, pages = {102--112}, year = {2015}, url = {https://doi.org/10.1016/j.infsof.2014.11.005}, doi = {10.1016/J.INFSOF.2014.11.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/JefferySAKM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ecoop/Murray15, author = {Toby C. Murray}, editor = {Michael Clarkson and Limin Jia}, title = {Short Paper: On High-Assurance Information-Flow-Secure Programming Languages}, booktitle = {Proceedings of the 10th {ACM} Workshop on Programming Languages and Analysis for Security, PLAS@ECOOP 2015, Prague, Czech Republic, July 4-10, 2015}, pages = {43--48}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2786558.2786561}, doi = {10.1145/2786558.2786561}, timestamp = {Tue, 18 Aug 2020 09:27:35 +0200}, biburl = {https://dblp.org/rec/conf/ecoop/Murray15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/MatichukMAJKS15, author = {Daniel Matichuk and Toby C. Murray and June Andronick and D. Ross Jeffery and Gerwin Klein and Mark Staples}, editor = {Antonia Bertolino and Gerardo Canfora and Sebastian G. Elbaum}, title = {Empirical Study Towards a Leading Indicator for Cost of Formal Software Verification}, booktitle = {37th {IEEE/ACM} International Conference on Software Engineering, {ICSE} 2015, Florence, Italy, May 16-24, 2015, Volume 1}, pages = {722--732}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/ICSE.2015.85}, doi = {10.1109/ICSE.2015.85}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/MatichukMAJKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/corr/AmaniM15, author = {Sidney Amani and Toby C. Murray}, editor = {Rob J. van Glabbeek and Jan Friso Groote and Peter H{\"{o}}fner}, title = {Specifying a Realistic File System}, booktitle = {Proceedings Workshop on Models for Formal Analysis of Real Systems, {MARS} 2015, Suva, Fiji, November 23, 2015}, series = {{EPTCS}}, volume = {196}, pages = {1--9}, year = {2015}, url = {https://doi.org/10.4204/EPTCS.196.1}, doi = {10.4204/EPTCS.196.1}, timestamp = {Fri, 27 Mar 2020 08:38:53 +0100}, biburl = {https://dblp.org/rec/journals/corr/AmaniM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sigops/KellerMAOCRKH14, author = {Gabriele Keller and Toby C. Murray and Sidney Amani and Liam O'Connor and Zilin Chen and Leonid Ryzhyk and Gerwin Klein and Gernot Heiser}, title = {File systems deserve verification too!}, journal = {{ACM} {SIGOPS} Oper. Syst. Rev.}, volume = {48}, number = {1}, pages = {58--64}, year = {2014}, url = {https://doi.org/10.1145/2626401.2626414}, doi = {10.1145/2626401.2626414}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sigops/KellerMAOCRKH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tocs/KleinAEMSKH14, author = {Gerwin Klein and June Andronick and Kevin Elphinstone and Toby C. Murray and Thomas Sewell and Rafal Kolanski and Gernot Heiser}, title = {Comprehensive formal verification of an {OS} microkernel}, journal = {{ACM} Trans. Comput. Syst.}, volume = {32}, number = {1}, pages = {2:1--2:70}, year = {2014}, url = {https://doi.org/10.1145/2560537}, doi = {10.1145/2560537}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tocs/KleinAEMSKH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CockGMH14, author = {David A. Cock and Qian Ge and Toby C. Murray and Gernot Heiser}, editor = {Gail{-}Joon Ahn and Moti Yung and Ninghui Li}, title = {The Last Mile: An Empirical Study of Timing Channels on seL4}, booktitle = {Proceedings of the 2014 {ACM} {SIGSAC} Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014}, pages = {570--581}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2660267.2660294}, doi = {10.1145/2660267.2660294}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CockGMH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esem/StaplesJAMKK14, author = {Mark Staples and D. Ross Jeffery and June Andronick and Toby C. Murray and Gerwin Klein and Rafal Kolanski}, editor = {Maurizio Morisio and Tore Dyb{\aa} and Marco Torchiano}, title = {Productivity for proof engineering}, booktitle = {2014 {ACM-IEEE} International Symposium on Empirical Software Engineering and Measurement, {ESEM} '14, Torino, Italy, September 18-19, 2014}, pages = {15:1--15:4}, publisher = {{ACM}}, year = {2014}, url = {https://doi.org/10.1145/2652524.2652551}, doi = {10.1145/2652524.2652551}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esem/StaplesJAMKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itp/MatichukWM14, author = {Daniel Matichuk and Makarius Wenzel and Toby C. Murray}, editor = {Gerwin Klein and Ruben Gamboa}, title = {An Isabelle Proof Method Language}, booktitle = {Interactive Theorem Proving - 5th International Conference, {ITP} 2014, Held as Part of the Vienna Summer of Logic, {VSL} 2014, Vienna, Austria, July 14-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8558}, pages = {390--405}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08970-6\_25}, doi = {10.1007/978-3-319-08970-6\_25}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/itp/MatichukWM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fac/Murray13, author = {Toby C. Murray}, title = {On the limits of refinement-testing for model-checking {CSP}}, journal = {Formal Aspects Comput.}, volume = {25}, number = {2}, pages = {219--256}, year = {2013}, url = {https://doi.org/10.1007/s00165-011-0183-6}, doi = {10.1007/S00165-011-0183-6}, timestamp = {Mon, 09 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fac/Murray13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/StaplesKKLAMJB04, author = {Mark Staples and Rafal Kolanski and Gerwin Klein and Corey Lewis and June Andronick and Toby C. Murray and D. Ross Jeffery and Len Bass}, editor = {David Notkin and Betty H. C. Cheng and Klaus Pohl}, title = {Formal specifications better than function points for code sizing}, booktitle = {35th International Conference on Software Engineering, {ICSE} '13, San Francisco, CA, USA, May 18-26, 2013}, pages = {1257--1260}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ICSE.2013.6606692}, doi = {10.1109/ICSE.2013.6606692}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/StaplesKKLAMJB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sosp/KellerMAOCRKH13, author = {Gabriele Keller and Toby C. Murray and Sidney Amani and Liam O'Connor and Zilin Chen and Leonid Ryzhyk and Gerwin Klein and Gernot Heiser}, editor = {Tim Harris and Anil Madhavapeddy}, title = {File systems deserve verification too!}, booktitle = {Proceedings of the Seventh Workshop on Programming Languages and Operating Systems, {PLOS} 2013, Farmington, Pennsylvania, USA, November 3-6, 2013}, pages = {1:1--1:7}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2525528.2525530}, doi = {10.1145/2525528.2525530}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sosp/KellerMAOCRKH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/MurrayMBGBSLGK13, author = {Toby C. Murray and Daniel Matichuk and Matthew Brassil and Peter Gammie and Timothy Bourke and Sean Seefried and Corey Lewis and Xin Gao and Gerwin Klein}, title = {seL4: From General Purpose to a Proof of Information Flow Enforcement}, booktitle = {2013 {IEEE} Symposium on Security and Privacy, {SP} 2013, Berkeley, CA, USA, May 19-22, 2013}, pages = {415--429}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/SP.2013.35}, doi = {10.1109/SP.2013.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/MurrayMBGBSLGK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeesp/HeiserMK12, author = {Gernot Heiser and Toby C. Murray and Gerwin Klein}, title = {It's Time for Trustworthy Systems}, journal = {{IEEE} Secur. Priv.}, volume = {10}, number = {2}, pages = {67--70}, year = {2012}, url = {https://doi.org/10.1109/MSP.2012.41}, doi = {10.1109/MSP.2012.41}, timestamp = {Sun, 15 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeesp/HeiserMK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpp/MurrayMBGK12, author = {Toby C. Murray and Daniel Matichuk and Matthew Brassil and Peter Gammie and Gerwin Klein}, editor = {Chris Hawblitzel and Dale Miller}, title = {Noninterference for Operating System Kernels}, booktitle = {Certified Programs and Proofs - Second International Conference, {CPP} 2012, Kyoto, Japan, December 13-15, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7679}, pages = {126--142}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35308-6\_12}, doi = {10.1007/978-3-642-35308-6\_12}, timestamp = {Wed, 07 Dec 2022 23:14:04 +0100}, biburl = {https://dblp.org/rec/conf/cpp/MurrayMBGK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sefm/MatichukM12, author = {Daniel Matichuk and Toby C. Murray}, editor = {George Eleftherakis and Mike Hinchey and Mike Holcombe}, title = {Extensible Specifications for Automatic Re-use of Specifications and Proofs}, booktitle = {Software Engineering and Formal Methods - 10th International Conference, {SEFM} 2012, Thessaloniki, Greece, October 1-5, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7504}, pages = {333--341}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33826-7\_23}, doi = {10.1007/978-3-642-33826-7\_23}, timestamp = {Sat, 05 Sep 2020 18:01:22 +0200}, biburl = {https://dblp.org/rec/conf/sefm/MatichukM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hotos/KleinMGSW11, author = {Gerwin Klein and Toby C. Murray and Peter Gammie and Thomas Sewell and Simon Winwood}, editor = {Matt Welsh}, title = {Provable Security: How Feasible Is It?}, booktitle = {13th Workshop on Hot Topics in Operating Systems, HotOS XIII, Napa, California, USA, May 9-11, 2011}, publisher = {{USENIX} Association}, year = {2011}, url = {https://www.usenix.org/conference/hotosxiii/provable-security-how-feasible-it}, timestamp = {Wed, 04 Jul 2018 13:06:34 +0200}, biburl = {https://dblp.org/rec/conf/hotos/KleinMGSW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itp/SewellWGMAK11, author = {Thomas Sewell and Simon Winwood and Peter Gammie and Toby C. Murray and June Andronick and Gerwin Klein}, editor = {Marko C. J. D. van Eekelen and Herman Geuvers and Julien Schmaltz and Freek Wiedijk}, title = {seL4 Enforces Integrity}, booktitle = {Interactive Theorem Proving - Second International Conference, {ITP} 2011, Berg en Dal, The Netherlands, August 22-25, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6898}, pages = {325--340}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22863-6\_24}, doi = {10.1007/978-3-642-22863-6\_24}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/itp/SewellWGMAK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/ethos/Murray10, author = {Toby C. Murray}, title = {Analysing the security properties of object-capability patterns}, school = {University of Oxford, {UK}}, year = {2010}, url = {http://ora.ox.ac.uk/objects/uuid:98b0b6b6-eee1-45d5-b32e-d98d1085c612}, timestamp = {Tue, 05 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/ethos/Murray10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip1-7/MurrayL09, author = {Toby C. Murray and Gavin Lowe}, editor = {Pierpaolo Degano and Joshua D. Guttman}, title = {Analysing the Information Flow Properties of Object-Capability Patterns}, booktitle = {Formal Aspects in Security and Trust, 6th International Workshop, {FAST} 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5983}, pages = {81--95}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-12459-4\_7}, doi = {10.1007/978-3-642-12459-4\_7}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/ifip1-7/MurrayL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MurrayG08, author = {Toby C. Murray and Duncan A. Grove}, title = {Non-delegatable authorities in capability systems}, journal = {J. Comput. Secur.}, volume = {16}, number = {6}, pages = {743--759}, year = {2008}, url = {https://doi.org/10.3233/JCS-2008-0314}, doi = {10.3233/JCS-2008-0314}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MurrayG08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:journals/entcs/MurrayL09, author = {Toby C. Murray and Gavin Lowe}, editor = {Alice Miller and Muffy Calder}, title = {On Refinement-Closed Security Properties and Nondeterministic Compositions}, booktitle = {Proceedings of the Eighth International Workshop on Automated Verification of Critical Systems, AVoCS 2008, Glasgow, UK, September 30 - October 1, 2008}, series = {Electronic Notes in Theoretical Computer Science}, volume = {250}, number = {2}, pages = {49--68}, publisher = {Elsevier}, year = {2008}, url = {https://doi.org/10.1016/j.entcs.2009.08.017}, doi = {10.1016/J.ENTCS.2009.08.017}, timestamp = {Fri, 24 Feb 2023 13:53:27 +0100}, biburl = {https://dblp.org/rec/journals/entcs/MurrayL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsac/GroveMONJBH07, author = {Duncan A. Grove and Toby C. Murray and Chris A. Owen and Chris J. North and J. A. Jones and Mark R. Beaumont and Bradley D. Hopkins}, title = {An Overview of the Annex System}, booktitle = {23rd Annual Computer Security Applications Conference {(ACSAC} 2007), December 10-14, 2007, Miami Beach, Florida, {USA}}, pages = {341--352}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ACSAC.2007.8}, doi = {10.1109/ACSAC.2007.8}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsac/GroveMONJBH07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.