Protocol implementation generator

  • Authors:
  • Jose Quaresma;Christian W. Probst

  • Affiliations:
  • Technical University of Denmark, Denmark;Technical University of Denmark, Denmark

  • Venue:
  • NordSec'10 Proceedings of the 15th Nordic conference on Information Security Technology for Applications
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Users expect communication systems to guarantee, amongst others, privacy and integrity of their data. These can be ensured by using well-established protocols; the best protocol, however, is useless if not all parties involved in a communication have a correct implementation of the protocol and all necessary tools. In this paper, we present the Protocol Implementation Generator (PiG), a framework that can be used to add protocol generation to protocol negotiation, or to easily share and implement new protocols throughout a network. PiG enables the sharing, verification, and translation of communication protocols. With it, partners can suggest a new protocol by sending its specification. After formally verifying the specification, each partner generates an implementation, which can then be used for establishing communication. We also present a practical realisation of the Protocol Implementation Generator framework based on the LySatool and a translator from the LySa language into C or Java.