B2Scala in Security documentation

B2Scala tool: Integrating Bach in Scala with Security in Mind

Contents   ::   The B2Scala Tool  »

B2Scala tool: Integrating Bach in Scala with Security in Mind

The B2Scala tool presents a Scala implementation of a Linda-like language called Bach [1], developed at the Faculty of Computer Science of the University of Namur, in the CoordiNam Laboratory, This solution offers experience within Scala for creating programs in Bach, taking advantage of the Scala ecosystem, in particular its system of types and fragments of existing programs in Scala. We are introducing on Hennessy-Milner like logic [2] to restrict the execution of programs to those that conform to these logic formulas. Our work takes the form of an illustration on the Needham-Schroeder [3] security protocol, where we succeed in revealing the man-in-the-middle attack initially identified by G. Lowe.

alternate text

Needham-Schroeder security protocol

Testing the tool

As a companion to the submission of the article The B2Scala Tool: integrating Bach in Scala with Security in Mind, this page describes how to launch a test of the tool.

Information

  • Release: 1.0
  • Date: March 2024
  • Authors: Doha Ouardi, Manel Barkallah and Jean-Marie. Jacquet, Namur University - Belgium
  • Target: users and developers
  • For more information on our work, please visit : B2Scala.

Footnotes

[1]Jacquet, J. M., Linden, I., & Staicu, M. O. (2012). Blackboard rules for coordinating context-aware applications in mobile ad hoc networks. arXiv preprint arXiv:1209.1421.
[2]Hennessy, M., Milner, R.: On Observing Nondeterminism and Concurrency. In: de Bakker, J., van Leeuwen, J. (eds.) Proceedings of the International Conference on Automata, Languages and Programming. Lecture Notes in Computer Science, vol. 85, p. 299–309. Springer (1980)
[3]Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Communication of the ACM 21, 993–999 (1978)

Contents   ::   The B2Scala Tool  »