Page 78 - 《软件学报》2025年第7期
P. 78
陈元亮 等: 分布式系统动态测试技术研究综述 2999
10.1109/SP54263.2024.00109]
[22] Liu Q, Cui L, Chen HM. Key technologies and applications of Internet of Things. Computer Science, 2010, 37(6): 1–4, 10 (in Chinese
with English abstract). [doi: 10.3969/j.issn.1002-137X.2010.06.001]
[23] Lahami M, Krichen M. A survey on runtime testing of dynamically adaptable and distributed systems. Software Quality Journal, 2021,
29(2): 555–593. [doi: 10.1007/s11219-021-09558-x]
[24] Gosain A, Sharma G. A survey of dynamic program analysis techniques and tools. In: Satapathy SC, Biswal BN, Udgata SK, Mandal
JK, eds. Proc. of the 3rd Int’l Conf. on Frontiers of Intelligent Computing: Theory and Applications. Cham: Springer, 2015. 113–122.
[doi: 10.1007/978-3-319-11933-5_13]
[25] Sternberg RJ, Grigorenko EL. All testing is dynamic testing. Issues in Education, 2001, 7(2): 137–170.
[26] Fairley RE. Tutorial: Static analysis and dynamic testing of computer software. Computer, 1978, 11(4): 14–23. [doi: 10.1109/C-M.1978.
218132]
[27] Zhang J, Zhang C, Xuan JF, Xiong YF, Wang QX, Liang B, Li L, Dou WS, Chen ZB, Chen LQ, Cai Y. Recent progress in program
analysis. Ruan Jian Xue Bao/Journal of Software, 2019, 30(1): 80–109 (in Chinese with English abstract). http://www.jos.org.cn/1000-
9825/5651.htm [doi: 10.13328/j.cnki.jos.005651]
[28] Sun XD, Cheng RX, Chen JY, Ang E, Legunsen, Xu TY. Testing configuration changes in context to prevent production failures. In:
Proc. of the 14th USENIX Symp. on Operating Systems Design and Implementation. USENIX Association, 2020. 42.
[29] Wang T, Jia ZY, Li SS, Zheng S, Yu Y, Xu EC, Peng SL, Liao XK. Understanding and detecting on-the-fly configuration bugs. In:
Proc. of the 45th Int’l Conf. on Software Engineering. Melbourne: IEEE, 2023. 628–639. [doi: 10.1109/ICSE48619.2023.00062]
[30] Chen QR, Wang T, Legunsen O, Li SS, Xu TY. Understanding and discovering software configuration dependencies in cloud and
datacenter systems. In: Proc. of the 28th ACM Joint Meeting on European Software Engineering Conf. and Symp. on the Foundations of
Software Engineering. ACM, 2020. 362–374. [doi: 10.1145/3368089.3409727]
[31] Hoffmann A, Neubauer B. Deployment and configuration of distributed systems. In: Proc. of the 4th Int’l SDL and MSC Workshop on
System Analysis and Modeling. Ottawa: Springer, 2005. 1–16. [doi: 10.1007/978-3-540-31810-1_1]
[32] Oppenheimer D. The importance of understanding distributed system configuration. In: Proc. of the 2003 Conf. on Human Factors in
Computer Systems Workshop. Ft. Lauderdale: ACM Press, 2003.
[33] Barroso LA, Hölzle U, Ranganathan P. The Datacenter as A Computer: Designing Warehouse-scale Machines. 3rd ed., Cham: Springer,
2019. 189. [doi: 10.1007/978-3-031-01761-2]
[34] Shieber J. Facebook outage. 2024. https://techcrunch.com/2019/03/14/facebook-blames-a-misconfigured-server-for-yesterdays-outage/
[35] Gunawi HS, Hao MZ, Suminto RO, Laksono A, Satria AD, Adityatama J, Eliazar KJ. Why does the cloud stop computing? Lessons
from hundreds of service outages. In: Proc. of the 7th ACM Symp. on Cloud Computing. Santa Clara: ACM, 2016. 1–16. [doi: 10.1145/
2987550.2987583]
[36] Liu HP, Lu S, Musuvathi M, Nath S. What bugs cause production cloud incidents? In: Proc. of the Workshop on Hot Topics in
Operating Systems. Bertinoro: ACM, 2019. 155–162. [doi: 10.1145/3317550.3321438]
[37] Nagaraja K, Oliveira F, Bianchini R, Martin RP, Nguyen TD. Understanding and dealing with operator mistakes in internet services. In:
Proc. of the 6th Symp. on Operating Systems Design & Implementation. San Francisco: USENIX Association, 2004. 61–76.
[38] Oppenheimer D, Ganapathi A, Patterson DA. Why do Internet services fail, and what can be done about it? In: Proc. of the 4th Conf. on
USENIX Symp. on Internet Technologies and Systems. Seattle: USENIX Association, 2003. 1. [doi: 10.5555/1251460.1251461]
[39] Yuan D, Luo Y, Zhuang X, Rodrigues GR, Zhao X, Zhang YL, Jain PU, Stumm M. Simple testing can prevent most critical failures: An
analysis of production failures in distributed data-intensive systems. In: Proc. of the 11th USENIX Symp. on Operating Systems Design
and Implementation. Broomfield: USENIX Association, 2014. 249–265. [doi: 10.5555/2685048.2685068]
[40] Hale B. Why every IT practitioner should care about network change & configuration management. 2012. https://content.solarwinds.
com/creative/pdf/Whitepapers/Why_Every_IT_Practitioner_Should_Care_About_NCCM_whitepaper.pdf
[41] Cloudflare. Famous DDoS attacks in history. 2024 (in Chinese). https://www.cloudflare.com/zh-cn/learning/ddos/famous-ddos-attacks/
[42] Huang CF, Tseng YC, Wu HL. Distributed protocols for ensuring both coverage and connectivity of a wireless sensor network. ACM
Trans. on Sensor Networks (TOSN), 2007, 3(1): 5–es. [doi: 10.1145/1210669.1210674]
[43] Porambage P, Schmitt C, Kumar P, Gurtov A, Ylianttila M. Two-phase authentication protocol for wireless sensor networks in
distributed IoT applications. In: Proc. of the 2014 IEEE Wireless Communications and Networking Conf. Istanbul: IEEE, 2014.
2728–2733.
[44] Zhong WY, Yang C, Liang W, Cai JH, Chen L, Liao J, Xiong NX. Byzantine fault-tolerant consensus algorithms: A survey. Electronics,
2023, 12(18): 3801. [doi: 10.3390/electronics12183801]
[45] Distler T. Byzantine fault-tolerant state-machine replication from a systems perspective. ACM Computing Surveys (CSUR), 2021,

