The B2Scala Tool: Integrating Bach in Scala with Security in Mind

Résultats de recherche: Contribution dans un livre/un catalogue/un rapport/dans les actes d'une conférenceChapitre (revu par des pairs)Revue par des pairs

8 Téléchargements (Pure)

Résumé

Process algebras have been widely used to verify security protocols in a formal manner. However they mostly focus on synchronous communication based on the exchange of messages. We present an alternative approach relying on asynchronous communication obtained through information available on a shared space. More precisely this paper first proposes an embedding in Scala of a Linda-like language, called Bach. It consists of a Domain Specific Language, internal to Scala, that allows us to experiment programs developed in Bach while benefiting from the Scala eco-system, in particular from its type system as well as program fragments developed in Scala. Moreover, we introduce a logic that allows to restrict the executions of programs to those meeting logic formulae. Our work is illustrated on the Needham-Schroeder security protocol, for which we manage to automatically rediscover the man-in-the-middle attack first put in evidence by G. Lowe.

langue originaleAnglais
titreProceedings ICE 2024
Pages58-76
Nombre de pages19
Volume414
Les DOIs
Etat de la publicationPublié - 11 déc. 2024
Evénement17th Interaction and Concurrency Experience, ICE 2024 - Groningen, Pays-Bas
Durée: 21 juin 2024 → …

Série de publications

NomElectronic Proceedings in Theoretical Computer Science, EPTCS
EditeurOpen Publishing Association
ISSN (imprimé)2075-2180

Une conférence

Une conférence17th Interaction and Concurrency Experience, ICE 2024
Pays/TerritoirePays-Bas
La villeGroningen
période21/06/24 → …

Empreinte digitale

Examiner les sujets de recherche de « The B2Scala Tool: Integrating Bach in Scala with Security in Mind ». Ensemble, ils forment une empreinte digitale unique.

Contient cette citation