diff --git a/src/main/java/ui/window/JDialogBUSNode.java b/src/main/java/ui/window/JDialogBUSNode.java index d4854cec1844e25e221b6b902d251270153fb2f1..261a1452b7717d64b2c270de69dc8264dfe657c3 100644 --- a/src/main/java/ui/window/JDialogBUSNode.java +++ b/src/main/java/ui/window/JDialogBUSNode.java @@ -188,6 +188,11 @@ public class JDialogBUSNode extends JDialogBase implements ActionListener { panel2.add(privacy, c2); privacy.makeEndHelpButton(helpStrings[0], mgui, mgui.getHelpManager(), panel2, c2); + c2.gridwidth = GridBagConstraints.REMAINDER; + panel2.add(new JLabel("Beware: a private bus ensures only confidentiality", SwingConstants.CENTER), c2); + panel2.add(new JLabel("and integrity/weak authenticity (so: not strong authenticity)", SwingConstants.CENTER), c2); + panel2.add(new JLabel(" "), c2); + c2.gridwidth = 1; panel2.add(new JLabel("Reference Attack:", SwingConstants.RIGHT), c2); refAttacks = new TGComboBoxWithHelp<>(refs); diff --git a/src/main/resources/help/bus.html b/src/main/resources/help/bus.html index 078f067bef66b595c9f7e37d0867695dacc613dd..e7ad45ca4d3f69ae5044751d6ebbe60f806fa50d 100644 --- a/src/main/resources/help/bus.html +++ b/src/main/resources/help/bus.html @@ -11,8 +11,11 @@ div.columns{display: flex; gap: min(4vw, 1.5em);} div.column{flex: auto; overflow-x: auto;} div.hanging-indent{margin-left: 1.5em; text-indent: -1.5em;} - ul.task-list{list-style: none;} + /* The extra [class] is a hack that increases specificity enough to + override a similar rule in reveal.js */ + ul.task-list[class]{list-style: none;} ul.task-list li input[type="checkbox"] { + font-size: inherit; width: 0.8em; margin: 0 0.8em 0.2em -1.6em; vertical-align: middle; @@ -20,9 +23,6 @@ .display.math{display: block; text-align: center; margin: 0.5rem auto;} </style> <link rel="stylesheet" href="help.css" /> - <!--[if lt IE 9]> - <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.3/html5shiv-printshiv.min.js"></script> - <![endif]--> </head> <body> <h1 id="bus">Bus</h1> @@ -31,13 +31,13 @@ <p>They have the following attributes.</p> <ul> <li>A name</li> -<li>An arbitration policy capturing how simultaneous trafsre request are -handled</li> +<li>An arbitration policy capturing how simultaneous transfer requests +are handled</li> <li>A data size in byte.</li> <li>A pipeline size expressing the number of cycles spent by one transfer in this bus</li> <li>A slice time, i.e. the maximum number of cycles a transfer can use -before being preempted./ not taken into account, so ponly for +before being preempted./ not taken into account, so only for documentation. Rather use the ’burst sizeâ€</li> <li>A burst size: this represents the maximum size of a transfer before it is preempted if another request is pending.</li> @@ -45,13 +45,13 @@ it is preempted if another request is pending.</li> memory and the main clock of the architecture</li> <li>A bus privacy. A public bus can be spied at, i.e., an attacker can read messages, modify messages, and inject messages. In a private bus, -an attacker can retrieve messages and reinject only the same messages. -An attacker cannot read the content of messages in private channel, nor -he/she can modify the content of these messages. Thus, confidentiality -and integrity is guaranteed, but not uathenticity. To garantee -authenticity, one had to use, for instance, nonces, to avoid message -being replayed.</li> -<li>A reference attack specifies which attack of attakc trees this bus +an attacker can retrieve messages and reinject only the same messages +(replay attack). An attacker cannot read the content of messages in +private channel, nor he/she can modify the content of these messages. +Thus, confidentiality and integrity is guaranteed, but not authenticity. +To guarantee authenticity, one has to use, for instance, nonces, to +avoid message being replayed.</li> +<li>A reference attack specifies which attack of attack trees this bus relates to.</li> </ul> </body> diff --git a/src/main/resources/help/bus.md b/src/main/resources/help/bus.md index 21f47059720f34963d51db373883b08ddaf45722..5ec407a52320edde5456ed38bcf7c1e3646a3d6d 100644 --- a/src/main/resources/help/bus.md +++ b/src/main/resources/help/bus.md @@ -7,13 +7,13 @@ Bus nodes connect other nodes together. They have the following attributes. - A name -- An arbitration policy capturing how simultaneous trafsre request are handled +- An arbitration policy capturing how simultaneous transfer requests are handled - A data size in byte. - A pipeline size expressing the number of cycles spent by one transfer in this bus -- A slice time, i.e. the maximum number of cycles a transfer can use before being preempted./ not taken into account, so ponly for documentation. Rather use the 'burst size" +- A slice time, i.e. the maximum number of cycles a transfer can use before being preempted./ not taken into account, so only for documentation. Rather use the 'burst size" - A burst size: this represents the maximum size of a transfer before it is preempted if another request is pending. - A clock divider expresses the relation between the clock of the memory and the main clock of the architecture -- A bus privacy. A public bus can be spied at, i.e., an attacker can read messages, modify messages, and inject messages. In a private bus, an attacker can retrieve messages and reinject only the same messages. An attacker cannot read the content of messages in private channel, nor he/she can modify the content of these messages. Thus, confidentiality and integrity is guaranteed, but not uathenticity. To garantee authenticity, one had to use, for instance, nonces, to avoid message being replayed. -- A reference attack specifies which attack of attakc trees this bus relates to. +- A bus privacy. A public bus can be spied at, i.e., an attacker can read messages, modify messages, and inject messages. In a private bus, an attacker can retrieve messages and reinject only the same messages (replay attack). An attacker cannot read the content of messages in private channel, nor he/she can modify the content of these messages. Thus, confidentiality and integrity is guaranteed, but not authenticity. To guarantee authenticity, one has to use, for instance, nonces, to avoid message being replayed. +- A reference attack specifies which attack of attack trees this bus relates to.