... | ... | @@ -13,10 +13,12 @@ After navigating to this URL, the user is presented with a Login Page (see the f |
|
|
![DT-0](uploads/c40cea0dec503ee5f355217d3f194adb/DT-0.PNG)
|
|
|
|
|
|
|
|
|
If the credentials are correct, the user is redirected to the *Home Page* of the *SDK4ED Dashboard* (see figure below). In order to navigate to the Dependability Toolbox front-end, the user has to click on the *Dependability* Menu Item at the top right part of the page (see the red arrow in the figure below). Upon click, a drop-down list is presented with two options, namely "Security" and "Optimal Checkpoints". The first option will navigate the user to the "Security" page of the SDK4ED Dashboard, which allows the user to invoke the security-relevant web services of the Dependability Toolbox. The second option will navigate the user to the "Optimal Checkpoint" page, which allows the user to invoke the reliability-related web service of the Dependability Toolbox, i.e., the service that calculates the optimum checkpoint interval for long loops.
|
|
|
If the credentials are correct, the user is redirected to the *Home Page* of the *SDK4ED Dashboard* (see figure below). In order to navigate to the Dependability Toolbox front-end, the user has to click on the *Dependability* Menu Item at the top right part of the page (see the red arrow in the figure below). Upon click, a drop-down list is presented with two options, namely "Security" and "Optimal Checkpoint". The first option will navigate the user to the "Security" page of the SDK4ED Dashboard, which allows the user to invoke the security-relevant web services of the Dependability Toolbox. The second option will navigate the user to the "Optimal Checkpoint" page, which allows the user to invoke the reliability-related web service of the Dependability Toolbox, i.e., the service that calculates the optimum checkpoint interval for long loops.
|
|
|
|
|
|
![DT-1](uploads/026827e8bed53330c4492a61f96cce91/DT-1.PNG)
|
|
|
|
|
|
# Security Page
|
|
|
|
|
|
Suppose that the user selects the "Security" option from the drop-down list. Then he/she is navigated to the page presented in the figure below.
|
|
|
|
|
|
![DT-2](uploads/be44e5952c1f3f140b8cf6f5f7a8ff31/DT-2.PNG)
|
... | ... | @@ -44,3 +46,21 @@ In this heatmap each rectangle corresponds to a specific source code file of the |
|
|
The detailed results of the vulnerability prediction analysis are also provided in the form of a table (see figure below). Each line of the table contains information for a specific source code file of the analyzed software project, including its vulnerability status and its probability of containing vulnerabilities. The table also allows the user to rank the source code files based on their probability to contain vulnerabilities. This is expected to facilitate the prioritization of the testing and fortification efforts of the software developers, by allocating limited test resources to high risk (i.e., potentially vulnerable) areas. For example, more exhaustive security testing can be applied to source code files that are more likely to contain vulnerabilities.
|
|
|
|
|
|
![DT-6](uploads/e57241c975b7c639e1d0fa1eaa1a8c63/DT-6.PNG)
|
|
|
|
|
|
# Optimal Checkpoint
|
|
|
|
|
|
Suppose that the user selects the "Optimal Checkpoint" option from the drop-down list of the Dependability Menu Item. Then he/she is navigated to the page presented in the figure below.
|
|
|
|
|
|
![DT-7](uploads/78d254c1a9f29c359d0df71cf52ce0bf/DT-7.PNG)
|
|
|
|
|
|
Similarly to the Security Page the user needs to choose one of the available software project to analyze from the "Select Project" drop-down list. For the purposes of the present walkthrough , and in order to be in line with the examples presented in the previous section, we select the "Holisun" software project from the drop-down list and we click the "New Analysis" button. Behind the scenes the *Optimum Checkpoint Recommendation* web service is invoked for the "Holisun" project (see the [Usage](dependability-toolbox-usage) Wiki page for more information regarding this web service). When the analysis is complete, the page is rendered and the results are visualized.
|
|
|
|
|
|
At the top part of the page (see figure below), the checkpoint interval that minimizes the execution time of the application is presented, along with some detailed results that were produced by the analysis and that were necessary for the calculation of the optimum checkpoint interval.
|
|
|
|
|
|
![DT-8](uploads/5c8719781a3bb01eac96470899889b82/DT-8.PNG)
|
|
|
|
|
|
At the lower part of the page (see figure below), the checkpoint interval that minimizes the energy consumption of the application is presented, along with some detailed results that were produced by the analysis and that were necessary for the calculation of the optimum checkpoint interval.
|
|
|
|
|
|
![DT-9](uploads/1bdf8806d3655e3efd588e8102bf3177/DT-9.PNG)
|
|
|
|
|
|
|