软件单元测试的重要性与技术路线探讨

需积分: 34 10 下载量 91 浏览量 更新于2024-08-06 收藏 25KB DOCX 举报
"该文献综述主要探讨了软件单元测试的重要性、技术路线以及单元测试的分类。作者强调了软件测试在确保软件质量和可靠性中的关键角色,特别是在大型和复杂软件项目中。文章指出,尽管审查和分析有助于减少错误,但仍然无法避免在编码阶段引入的错误,这些错误如果未在早期阶段发现,将导致后期高昂的修复成本和潜在的灾难性后果。因此,单元测试作为软件测试的重要组成部分,旨在检测和修复单个代码单元的问题,为整个系统的质量奠定基础。 在技术路线上,单元测试可以是手动或自动进行的。手动单元测试常用于教学,而自动化测试则能更高效地验证程序单元的正确性,并在隔离环境中运行,以便更好地理解和管理代码间的依赖关系。单元测试包括静态测试和动态测试两部分: 静态测试是一种在代码编写完成后,无需执行代码即可进行的测试方法。这通常涉及代码扫描、分析和代码审查,目的是检查代码是否符合预设的编码标准和规范,由开发人员及其团队共同参与。静态测试有助于在代码执行前发现潜在问题,防止缺陷进入系统。 动态测试则涉及到运行代码以检查其行为。在单元测试的动态测试中,测试人员创建一组测试用例,这些用例覆盖了代码的各种可能执行路径,以确保每个单元都能按预期工作。动态测试可以暴露代码在实际运行时可能出现的错误,如逻辑错误、边界条件问题等。 文献进一步提到,良好的单元测试设计应确保测试的独立性,避免测试用例涵盖过多的组件,以免混淆单元测试与集成测试的界限。自动化测试框架可以帮助管理和执行这些测试,提供快速反馈,促进持续集成和持续交付(CI/CD)流程。 单元测试是软件开发过程中不可或缺的一环,它通过静态和动态测试手段确保代码单元的正确性,从而提升整个软件系统的质量和稳定性。有效的单元测试策略能帮助开发者尽早发现问题,降低维护成本,增强用户对软件的信任度。"
2018-03-21 上传
Alansari2017- A Distributed Access Control System for Cloud Federations .pdf Anon2017-Detecting Privileged Side-Channel Attacks in Shielded Execution with Déjà Vu.pdf Arnautov2016- SCONE Secure Linux Containers with Intel SGX.pdf Atamli-Reineh2015 - Securing Application with Software Partitioning.pdf B2017 -Securing Data Analytics on SGX With.pdf Bahmani2016 - Secure Multiparty Computation from SGX.pdf Barbosa2016- Foundations of Hardware-Based Attested Computation and Application to SGX.pdf Bauman2016-A Case for Protecting Computer Games With SGX.pdf Baumann2014- Shielding applications from an untrusted cloud with Haven-haven.pdf Beekman2016- Attestation Transparency Building secure Internet.pdf BehlJDistlerT2017-Hybrids on Steroids-SGX-Based High Performance BFT∗.pdf Bhardwaj2016-Fast, scalable and secure onloading of edge functions using AirBox.pdf Boneh2017 - Surnaming Schemes, Fast Verification, and Applications to SGX Technology.pdf Brekalo2016-Mitigating Password Database Breaches with Intel SGX.pdf Brenner2017- Secure Cloud Micro Services Using Intel SGX.pdf CacheZoom - how sgx amplifies the power of cache attacks.pdf ChakrabartiSLeslie-HurdRVijM -Architecture for Oversubscription of Secure Memory.pdf ChakrabartiSLeslie-HurdRVijM-Intel® Software Guard Extensions (Intel® SGX) Architecture for Oversubscription of Secure Memory in a Virtualized Environment .pdf Choi2017 - S-OpenSGX A system-level platform.pdf Costan2016-Sanctum Minimal Hardware Extensions for Strong Software.pdf Coughlin2017 -Trusted Click-Overcoming Security issues of NFV in the Cloud.pdf Dang2017-Proofs of Data Residency-Checking whether Your Cloud Files Have Been Relocated .pdf Elastic and Secure Energy Forecasting in cloud environments.pdf Fetzer2016-Building Critical Applications Using Microservice.pdf Gkantsidis2017- And Then There Were More.pdf Glamdring-Automatic Application Partitioning for Intel SGX.pdf Glimmers-Resolving the Privacy-Trust Quagmire.pdf Gotzfried2017-Cache Attacks on Intel SGX.pdf Gu2017 - Secure Live Migration of SGX Enclaves on Trusted Cloud.pdf Haider2017- Leveraging hw isolation for Process L (2).pdf Han2017-SGX-Box Enabling Visibility on Encrypted Traffic.pdf Hunt2016-Ryoan- A Distributed Sandbox for Untrusted .pdf Hutchison2011-HardIDX_ Practical and Secure Index with SGX.pdf Iron - Functional Encryption using Intel SGX.pdf Jackson2017 -Trust is in the Keys of the Beholder.pdf Jacomme2017 - Symbolic Models for Isolated Execution Environments.pdf KarandeVBaumanELinZ2017-SGX-Log-Securing System Logs With SGX.pdf Kelbert2017 - SecureCloud Secure Big Data Processing in Untrusted Clouds.pdf Leaky Cauldron on the Dark Land.pdf Leslie-Hurd2015-Verifying Linearizability of IntelR Software Guard Extensions.pdf Leveraging Intel SGX to Create a Nondisclosure Cryptographic library.pdf LightBox-SGX-assisted secure network functions.pdf Lind2016 - Teechan - Payment Channels Using TEE.pdf Lind2017 - Teechain-scalable blockchain payments using TEE.pdf Link2016-Automatic Enforcement of Expressive Security Policies using Enclaves.pdf Nguyen2017- EnGarde-Mutually-Trusted Inspection of SGX Enclaves.pdf Ohrimenko2016- Oblivious Multi-Party Machine Learning on Trusted Processors.pdf On Making Emerging TEE Accessible to Developers.pdf Paladi2016-TruSDN_ Bootstrapping Trust in Cloud Network Infrastructure.pdf Pires2016 - Secure Content-Based Routing Using SGX.pdf Pires2017- A lightweight MapReduce framework for secure processing with SGX.pdf Proof of Luck- an Efficient blockchain consensus protocol.pdf rollback and forking detection for trusted execution environments using lightweight (2).pdf Rollback and Forking Detection for Trusted Execution environments using lightweight.pdf SAFETY - Secure gwAs in Federated Environment.pdf Sasy-ZeroTrace- Oblivious Memory Primitives from Intel SGX.pdf Schuster2015- VC3-Trustworthy Data Analytics in the Cloud using SGX.pdf sec17-lee-jaehyuk.pdf sec17-lee-sangho.pdf sec17-van_bulck.pdf Seitzer2015-A Bytecode Interpreter for Secure Program Execution in Untrusted Main Memory.pdf Seo2017 - SGX-Shield -Enabling Address Space Layout Randomization for SGX Programs.pdf Shepherd2017a- Secure and Trusted Execution-Past .pdf Shinde2015 - Preventing Page Faults from Telling Your Secrets.pdf Sinha2015- Moat Verifying Confidentiality of Enclave Programs.pdf Stewin2016 - Malware Guard Extension_ Using SGX to Conceal Cache Attacks.pdf Strackx2016-Developing Secure SGX Enclaves New Challenges on the Horizon.pdf Strackx2016a - Ariadne-A Minimal Approach to State Continuity.pdf Swami2017 - Intel SGX Remote Attestation is not sufficient.pdf Tamrakar2017-The Circle Game-Scalable Private Membership Test Using Trusted Hardware.pdf Tramer2016 - Sealed-Glass Proofs.pdf Tsai2017 -Graphene-SGX.pdf Tychalas2017-SGXCrypter.pdf Volp2016-Avoiding Leakage and Synchronization Attacks through Enclave-Side Preemption Control .pdf Weichbrodt2016-AsyncShock - Exploiting Synchronisation Bugs in Intel SGX Enclaves.pdf Weiser2017 - SGXIO- Generic Trusted IO Path for Intel SGX.pdf Weisse2017 - Regaining Lost Cycles with HotCalls.pdf XingBCShanahanM2016-Intel__ Software Guard Extensions (Intel__ SGX) Software Support for Dynamic Memory Allocation inside an Enclave.pdf Xu2015-Controlled-Channel Attacks_ Deterministic Side Channels for Untrusted Operating Systems.pdf ZeroTrace- Oblivious Memory Primitives from Intel SGX.pdf Zhang2016 - Town Crier.pdf Zhang2017-REM Resource-Efficient Mining for Blockchains.pdf