The B2Scala tool presents a Scala implementation of a Linda-like language called Bach [1], developed at the Faculty of Computer Science of the University of Namur, in the CoordiNam Laboratory, This solution offers experience within Scala for creating programs in Bach, taking advantage of the Scala ecosystem, in particular its system of types and fragments of existing programs in Scala. We are introducing on Hennessy-Milner like logic [2] to restrict the execution of programs to those that conform to these logic formulas. Our work takes the form of an illustration on the Needham-Schroeder [3] security protocol, where we succeed in revealing the man-in-the-middle attack initially identified by G. Lowe.
Contents:
As a companion to the submission of the article The B2Scala Tool: integrating Bach in Scala with Security in Mind, this page describes how to launch a test of the tool.
Information
Footnotes
[1] | Jacquet, J. M., Linden, I., & Staicu, M. O. (2012). Blackboard rules for coordinating context-aware applications in mobile ad hoc networks. arXiv preprint arXiv:1209.1421. |
[2] | Hennessy, M., Milner, R.: On Observing Nondeterminism and Concurrency. In: de Bakker, J., van Leeuwen, J. (eds.) Proceedings of the International Conference on Automata, Languages and Programming. Lecture Notes in Computer Science, vol. 85, p. 299–309. Springer (1980) |
[3] | Needham, R.M., Schroeder, M.D.: Using Encryption for Authentication in Large Networks of Computers. Communication of the ACM 21, 993–999 (1978) |
Contents :: The B2Scala Tool »