Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Máté Kovács is active.

Publication


Featured researches published by Máté Kovács.


verification model checking and abstract interpretation | 2012

Model checking information flow in reactive systems

Rayna Dimitrova; Bernd Finkbeiner; Máté Kovács; Markus N. Rabe; Helmut Seidl

Most analysis methods for information flow properties do not consider temporal restrictions. In practice, however, such properties rarely occur statically, but have to consider constraints such as when and under which conditions a variable has to be kept secret. In this paper, we propose a natural integration of information flow properties into linear-time temporal logics (LTL). We add a new modal operator, the hide operator, expressing that the observable behavior of a system is independent of the valuations of a secret variable. We provide a complexity analysis for the model checking problem of the resulting logic SecLTL and we identify an expressive fragment for which this question is efficiently decidable. We also show that the path based nature of the hide operator allows for seamless integration into branching time logics.


Electronic Notes in Theoretical Computer Science | 2008

Simulation and Formal Analysis of Workflow Models

Máté Kovács; László Gönczy

We present a framework for the simulation and formal analysis of workflow models. We discuss (i) how a workflow model, implemented in the BPEL language, can be transformed into a dataflow network model, (ii) how potentially incorrect execution paths can be incorporated, and (iii) how the properties of a workflow can be formally verified using the SPIN model checker. For the several model transformation steps from workflow to analysis models, we use graph transformations.


Electronic Notes in Theoretical Computer Science | 2007

Modeling and Verification of Reliable Messaging by Graph Transformation Systems

László Gönczy; Máté Kovács; Dániel Varró

Due to the increasing need of highly dependable services in Service-Oriented Architectures (SOA), service-level agreements include more and more frequently such non-functional aspects as security, safety, availability, reliability, etc. Whenever a service can no longer be provided with the required QoS, the service requester needs to switch dynamically to a new service having adequate service parameters after exchanging a sequence of messages. In the current paper, we first extend the core SOA metamodel with parameters required for reliable messaging in services. Then we model reconfigurations for reliable message delivery by graph transformation rules. Finally, we carry out a formal verification of the proposed rule set by combining analysis tools for graph transformation and labeled transition systems.


computer and communications security | 2013

Relational abstract interpretation for the verification of 2-hypersafety properties

Máté Kovács; Helmut Seidl; Bernd Finkbeiner

Information flow properties of programs can be formalized as hyperproperties specifying the relation of multiple executions. In this paper, we therefore introduce a framework for proving 2-hypersafety properties by means of abstract interpretation. The main idea is to apply abstract interpretation on the self-compositions of the control flow graphs of programs. As a result, our method is inherently capable of analyzing relational properties of even dissimilar programs. Constructing self-compositions of control flow graphs is nontrivial. Therefore, we present an algorithm for constructing quality self-compositions driven by a tree distance measure between the abstract syntax trees of subprograms. Finally, we demonstrate the applicability of the approach by proving intricate information flow properties of programs written in a simple language for tree manipulation motivated by the Web Services Business Process Execution Language.


Proceedings of the 2007 workshop on Engineering fault tolerant systems | 2007

Formal modeling of BPEL workflows including fault and compensation handling

Máté Kovács; Dániel Varró; László Gönczy

Electronically executed business processes are frequently implemented using the Business Process Execution Language (BPEL). These workflows may be in control of crucial business processes of an organization, in the same time existing model checking approaches are still immature i.e. they either seem to loose to much information during the generation of the analysis model, or the state space explosion prevents from model checking. We present a formal modeling technique for BPEL workflows including fault and compensation handling providing exact semantics with a state space size that allows for model checking. Additionally, error propagation among variables is supported so the effect of a faulty activity on the entire process can be examined.


language and automata theory and applications | 2014

Interprocedural Information Flow Analysis of XML Processors

Helmut Seidl; Máté Kovács

A crucial issue when providing publicly accessible web services is that sensitive data should only be accessible by authorized users. Accessibility of data within an application or information flow can conveniently be formalized as a 2-hyperproperty of a program. Here, we present a technique to interprocedurally analyze information flow in XML processors. Our approach is based on general techniques for program matching, and relational abstract interpretation of the resulting 2-programs. In case of XML processors, the abstract relational semantics then can be practically analyzed by means of finite tree automata.


software engineering for resilient systems | 2008

An integrated framework for the dependability evaluation of distributed mobile applications

Máté Kovács; Paolo Lollini; István Majzik; Andrea Bondavalli


Computer Systems: Science & Engineering | 2008

Formal analysis of BPEL workflows with compensation by model checking

Máté Kovács; Dániel Varró; László Gönczy


Annals of Nuclear Energy | 2014

Thermal–hydraulic analyses and experimental modelling of MSFR

Bogdán Yamaji; Attila Aszódi; Máté Kovács; Gyula Csom


Archive | 2014

Information Flow Security in Tree-Manipulating Processes

Máté Kovács

Collaboration


Dive into the Máté Kovács's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

István Majzik

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar

László Gönczy

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dániel Varró

Budapest University of Technology and Economics

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge