... | @@ -18,11 +18,11 @@ After navigating to this URL, the user is presented with a Log In Page (see the |
... | @@ -18,11 +18,11 @@ After navigating to this URL, the user is presented with a Log In Page (see the |
|
|
|
|
|
If the credentials are correct, the user is redirected to the Projects page of the SDK4ED Dashboard (see figure below). In order for the user to analyse the dependability of a specific software project, they need first to select the desired project by clicking on its tile, which is displayed on the *Projects * page. Suppose that the user wants to analyse the dependability of the *Holisun *project. In order to do this, the user should navigate to the Projects page of the SDK4ED Dashboard, click on the *Holisun* tile in order to select it, and then click on the arrow next to the *Run Central Analysis* button, in order to select the services that they would like to execute (see figure below). In order to run only a dependability analysis, from the displayed list the user must check only the checkboxes that are related to the services of the Dependability Toolbox. More specifically, the user needs to check: (i) the Security checkbox, in order to invoke the Quantitative Security Assessment web service, (ii) the Vulnerability checkbox, in order to invoke the Vulnerability Prediction web service, and (iii) the Optimal Checkpoint checkbox, in order to invoke the Optimal Checkpoint web service. After having selected these three options, the user must click on the *Run Central Analysis* button, in order to trigger the analysis.
|
|
If the credentials are correct, the user is redirected to the Projects page of the SDK4ED Dashboard (see figure below). In order for the user to analyse the dependability of a specific software project, they need first to select the desired project by clicking on its tile, which is displayed on the *Projects * page. Suppose that the user wants to analyse the dependability of the *Holisun *project. In order to do this, the user should navigate to the Projects page of the SDK4ED Dashboard, click on the *Holisun* tile in order to select it, and then click on the arrow next to the *Run Central Analysis* button, in order to select the services that they would like to execute (see figure below). In order to run only a dependability analysis, from the displayed list the user must check only the checkboxes that are related to the services of the Dependability Toolbox. More specifically, the user needs to check: (i) the Security checkbox, in order to invoke the Quantitative Security Assessment web service, (ii) the Vulnerability checkbox, in order to invoke the Vulnerability Prediction web service, and (iii) the Optimal Checkpoint checkbox, in order to invoke the Optimal Checkpoint web service. After having selected these three options, the user must click on the *Run Central Analysis* button, in order to trigger the analysis.
|
|
|
|
|
|
![DT-NEW-1](uploads/026827e8bed53330c4492a61f96cce91/DT-NEW-1.PNG)
|
|
![DT-NEW-1](uploads/e324af3406ec38363f09e7fda13d4762/DT-NEW-1.PNG)
|
|
|
|
|
|
After clicking on the Run Central Analysis button, the analysis is triggered and the status of the analysis is presented on the screen. The analysis is complete when the status of the three services of the Dependability Toolbox is marked as finished (see figure below)
|
|
After clicking on the Run Central Analysis button, the analysis is triggered and the status of the analysis is presented on the screen. The analysis is complete when the status of the three services of the Dependability Toolbox is marked as finished (see figure below)
|
|
|
|
|
|
![DT-NEW-2](uploads/026827e8bed53330c4492a61f96cce91/DT-NEW-2.PNG)
|
|
![DT-NEW-2](uploads/97150f2ba0983629a72cbfa9fbfb804b/DT-NEW-2.PNG)
|
|
|
|
|
|
When the analysis is complete the user can navigate to the individual pages of the SDK4ED Dashboard, in order to inspect the results. In order to do so, the user has to click on the Dependability menu item at the top right part of the page (see the red arrow in the figure below). Upon click, a drop-down list is presented with two options, namely Security and Optimal Checkpoint. The first option will navigate the user to the Security page of the SDK4ED Dashboard, which allows the user to inspect the produced results of the security-relevant web services of the Dependability Toolbox, i.e., the Quantitative Security Assessment and the Vulnerability Prediction. The second option will navigate the user to the Optimal Checkpoint page, which allows the user to inspect the results of the reliability-related web service of the Dependability Toolbox, i.e., the service that calculates the optimum checkpoint interval for long loops.
|
|
When the analysis is complete the user can navigate to the individual pages of the SDK4ED Dashboard, in order to inspect the results. In order to do so, the user has to click on the Dependability menu item at the top right part of the page (see the red arrow in the figure below). Upon click, a drop-down list is presented with two options, namely Security and Optimal Checkpoint. The first option will navigate the user to the Security page of the SDK4ED Dashboard, which allows the user to inspect the produced results of the security-relevant web services of the Dependability Toolbox, i.e., the Quantitative Security Assessment and the Vulnerability Prediction. The second option will navigate the user to the Optimal Checkpoint page, which allows the user to inspect the results of the reliability-related web service of the Dependability Toolbox, i.e., the service that calculates the optimum checkpoint interval for long loops.
|
|
|
|
|
... | @@ -34,7 +34,7 @@ The Security page of the SDK4ED Dashboard contains the results of the security-r |
... | @@ -34,7 +34,7 @@ The Security page of the SDK4ED Dashboard contains the results of the security-r |
|
|
|
|
|
At the first part of the page, the results of the Quantitative Security Assessment web service for the "Holisun" project are presented (see figure below). As can be seen by this figure, the overall Security Index of the analysed application is shown both in a numerical and in a discrete form (i.e., stars). In addition to this, two radar charts are provided, showing the individual scores of the Security Properties and Security Characteristics.
|
|
At the first part of the page, the results of the Quantitative Security Assessment web service for the "Holisun" project are presented (see figure below). As can be seen by this figure, the overall Security Index of the analysed application is shown both in a numerical and in a discrete form (i.e., stars). In addition to this, two radar charts are provided, showing the individual scores of the Security Properties and Security Characteristics.
|
|
|
|
|
|
![DT-3](uploads/b3cdb36d02abb89d9726719182d06392/DT-3.PNG)
|
|
![DT-NEW-3](uploads/0bb864753daf8a6e9d39a1163a004df3/DT-NEW-3.PNG)
|
|
|
|
|
|
Apart from these high-level charts, a detailed table with the specific security issues that were identified through static analysis (and used for the calculation of the high-level scores presented above) is also provided on the same page. A screenshot of this table (containing the results of the "Holisun" project) is presented below:
|
|
Apart from these high-level charts, a detailed table with the specific security issues that were identified through static analysis (and used for the calculation of the high-level scores presented above) is also provided on the same page. A screenshot of this table (containing the results of the "Holisun" project) is presented below:
|
|
|
|
|
... | | ... | |