... | ... | @@ -16,21 +16,25 @@ After navigating to this URL, the user is presented with a Log In Page (see the |
|
|
![DT-0](uploads/c40cea0dec503ee5f355217d3f194adb/DT-0.PNG)
|
|
|
|
|
|
|
|
|
If the credentials are correct, the user is redirected to the *Home Page* of the *SDK4ED Dashboard* (see figure below). In order to navigate to the Dependability Toolbox front-end, the user has to click on the *Dependability* Menu Item at the top right part of the page (see the red arrow in the figure below). Upon click, a drop-down list is presented with two options, namely "Security" and "Optimal Checkpoint". The first option will navigate the user to the "Security" page of the SDK4ED Dashboard, which allows the user to invoke the security-relevant web services of the Dependability Toolbox. The second option will navigate the user to the "Optimal Checkpoint" page, which allows the user to invoke the reliability-related web service of the Dependability Toolbox, i.e., the service that calculates the optimum checkpoint interval for long loops.
|
|
|
If the credentials are correct, the user is redirected to the Projects page of the SDK4ED Dashboard (see figure below). In order for the user to analyse the dependability of a specific software project, they need first to select the desired project by clicking on its tile, which is displayed on the *Projects * page. Suppose that the user wants to analyse the dependability of the *Holisun *project. In order to do this, the user should navigate to the Projects page of the SDK4ED Dashboard, click on the *Holisun* tile in order to select it, and then click on the arrow next to the *Run Central Analysis* button, in order to select the services that they would like to execute (see figure below). In order to run only a dependability analysis, from the displayed list the user must check only the checkboxes that are related to the services of the Dependability Toolbox. More specifically, the user needs to check: (i) the Security checkbox, in order to invoke the Quantitative Security Assessment web service, (ii) the Vulnerability checkbox, in order to invoke the Vulnerability Prediction web service, and (iii) the Optimal Checkpoint checkbox, in order to invoke the Optimal Checkpoint web service. After having selected these three options, the user must click on the *Run Central Analysis* button, in order to trigger the analysis.
|
|
|
|
|
|
![DT-1](uploads/026827e8bed53330c4492a61f96cce91/DT-1.PNG)
|
|
|
![DT-NEW-1](uploads/026827e8bed53330c4492a61f96cce91/DT-NEW-1.PNG)
|
|
|
|
|
|
# Security Page
|
|
|
After clicking on the Run Central Analysis button, the analysis is triggered and the status of the analysis is presented on the screen. The analysis is complete when the status of the three services of the Dependability Toolbox is marked as finished (see figure below)
|
|
|
|
|
|
Suppose that the user selects the "Security" option from the drop-down list. Then he/she is navigated to the page presented in the figure below.
|
|
|
![DT-NEW-2](uploads/026827e8bed53330c4492a61f96cce91/DT-NEW-2.PNG)
|
|
|
|
|
|
![DT-2](uploads/be44e5952c1f3f140b8cf6f5f7a8ff31/DT-2.PNG)
|
|
|
When the analysis is complete the user can navigate to the individual pages of the SDK4ED Dashboard, in order to inspect the results. In order to do so, the user has to click on the Dependability menu item at the top right part of the page (see the red arrow in the figure below). Upon click, a drop-down list is presented with two options, namely Security and Optimal Checkpoint. The first option will navigate the user to the Security page of the SDK4ED Dashboard, which allows the user to inspect the produced results of the security-relevant web services of the Dependability Toolbox, i.e., the Quantitative Security Assessment and the Vulnerability Prediction. The second option will navigate the user to the Optimal Checkpoint page, which allows the user to inspect the results of the reliability-related web service of the Dependability Toolbox, i.e., the service that calculates the optimum checkpoint interval for long loops.
|
|
|
|
|
|
![DT-NEW-3](uploads/026827e8bed53330c4492a61f96cce91/DT-NEW-3.PNG)
|
|
|
|
|
|
As can be seen by the figure above, the page provides a drop-down list for selecting a software project and two buttons, namely ”Last Analysis” and ”New Analysis” (the displayed projects in the example are the three projects provided by the use case providers of the SDK4ED Project). By clicking on the ”Last Analysis” button, the latest assessment results that are associated with the selected software project are presented to the user. If the ”New Analysis” button is clicked, a new analysis of the selected software application is performed, by invoking the *Quantitative Security Assessment* and *Vulnerability Prediction* web services of the Dependability Toolbox back-end (see the [Description](dependability-toolbox-description) and [Usage](dependability-toolbox-usage) Wiki Pages for more information regarding these services). In either case, the assessment results of the selected software application are parsed and presented to the user through different types of visualizations.
|
|
|
# Security Page
|
|
|
|
|
|
The Security page of the SDK4ED Dashboard contains the results of the security-related services of the Dependability Toolbox. As described in the previous section, the user must select the project that he/she would like to inspect its security and then navigate to the Security page as displayed in the figure below. Suppose that the user selects the "Holisun" project from the Projects page and then clicks on the Security option from the drop-down list presented in the figure below. The user is redirected to the Security page of the SDK4ED Dashboard, which has been updated with the results of the latest security analysis of the Holisun project.
|
|
|
|
|
|
Suppose that the user selects the "Holisun" project from the drop-down list and then clicks either on the "Last Analysis" or on the "New Analysis" button. Behind the scenes the appropriate web services are invoked and when the results are ready the page is rendered in order to visualize them. The results of the "Holisun" Project are presented in the following figures.
|
|
|
At the first part of the page, the results of the Quantitative Security Assessment web service for the "Holisun" project are presented (see figure below). As can be seen by this figure, the overall Security Index of the analysed application is shown both in a numerical and in a discrete form (i.e., stars). In addition to this, two radar charts are provided, showing the individual scores of the Security Properties and Security Characteristics.
|
|
|
|
|
|
At the top part of the page, the results of the *Quantitative Security Assessment* web service for the "Holisun" project are presented (see the figure below). As can be seen by this figure, the overall *Security Index* of the analyzed application is shown both in a numerical and in a discrete form (i.e., stars). In addition to this, two radar charts are provided, showing the individual scores of the *Security Properties* and *Security Characteristics*.
|
|
|
![DT-2](uploads/be44e5952c1f3f140b8cf6f5f7a8ff31/DT-2.PNG)
|
|
|
|
|
|
![DT-3](uploads/b3cdb36d02abb89d9726719182d06392/DT-3.PNG)
|
|
|
|
... | ... | |