The B2Scala Tool: Integrating Bach in Scala with Security in Mind

Research output: Contribution in Book/Catalog/Report/Conference proceedingChapter (peer-reviewed)peer-review

5 Downloads (Pure)

Abstract

Process algebras have been widely used to verify security protocols in a formal manner. However they mostly focus on synchronous communication based on the exchange of messages. We present an alternative approach relying on asynchronous communication obtained through information available on a shared space. More precisely this paper first proposes an embedding in Scala of a Linda-like language, called Bach. It consists of a Domain Specific Language, internal to Scala, that allows us to experiment programs developed in Bach while benefiting from the Scala eco-system, in particular from its type system as well as program fragments developed in Scala. Moreover, we introduce a logic that allows to restrict the executions of programs to those meeting logic formulae. Our work is illustrated on the Needham-Schroeder security protocol, for which we manage to automatically rediscover the man-in-the-middle attack first put in evidence by G. Lowe.

Original languageEnglish
Title of host publicationProceedings ICE 2024
Pages58-76
Number of pages19
Volume414
DOIs
Publication statusPublished - 11 Dec 2024
Event17th Interaction and Concurrency Experience, ICE 2024 - Groningen, Netherlands
Duration: 21 Jun 2024 → …

Publication series

NameElectronic Proceedings in Theoretical Computer Science, EPTCS
PublisherOpen Publishing Association
ISSN (Print)2075-2180

Conference

Conference17th Interaction and Concurrency Experience, ICE 2024
Country/TerritoryNetherlands
CityGroningen
Period21/06/24 → …

Fingerprint

Dive into the research topics of 'The B2Scala Tool: Integrating Bach in Scala with Security in Mind'. Together they form a unique fingerprint.

Cite this