Automatic generation of database instances for white-box testing

被引:24
|
作者
Zhang, B [1 ]
Xu, C [1 ]
Cheung, SC [1 ]
机构
[1] Chinese Acad Sci, Inst Software, Comp Sci Lab, Beijing 100080, Peoples R China
关键词
database applications; embedded SQL; constraint solving; automatic test data generation; software testing;
D O I
10.1109/CMPSAC.2001.960612
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Testing is a critical activity for database application programs as faults if undetected could lead to unrecoverable data loss. Database application programs typically contain statements written in an imperative programming language with embedded data manipulation commands, such as SQL. However relatively little study has been made in the testing of database application programs. In particular, few testing techniques explicitly consider the inclusion of database instances in the selection of test cases and the generation of test data input. In this paper we study the generation of database instances that respect the semantics of SQL statements embedded in a database application program. The paper also describes a supporting tool which generates a set of constraints. These constraints collectively represent a property against which the program is tested. Database instances for program testing can be derived by solving the set of constraints using existing constraint solvers.
引用
收藏
页码:161 / 165
页数:3
相关论文
共 50 条
  • [41] Black-Box and White-Box Test Case Generation for RESTful APIs: Enemies or Allies?
    Martin-Lopez, Alberto
    Arcuri, Andrea
    Segura, Sergio
    Ruiz-Cortes, Antonio
    [J]. 2021 IEEE 32ND INTERNATIONAL SYMPOSIUM ON SOFTWARE RELIABILITY ENGINEERING (ISSRE 2021), 2021, : 231 - 241
  • [42] On the security goals of white-box cryptography
    Bock E.A.
    Amadori A.
    Brzuska C.
    Michiels W.
    [J]. 1600, Ruhr-University of Bochum (2020): : 327 - 357
  • [43] On Security of a White-Box Implementation of SHARK
    Shi, Yang
    Fan, Hongfei
    [J]. INFORMATION SECURITY, ISC 2015, 2015, 9290 : 455 - 471
  • [44] White-box cryptography and an AES implementation
    Chow, S
    Eisen, P
    Johnson, H
    Van Orschot, PC
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2003, 2595 : 250 - 270
  • [45] White-box Implementation and Analysis of SIMON
    Luo, Yi-Nuo
    Chen, Jie
    Wang, Chao
    [J]. Ruan Jian Xue Bao/Journal of Software, 2024, 35 (11): : 5263 - 5278
  • [46] On the Linear Transformation in White-Box Cryptography
    Lee, Seungkwang
    Jho, Nam-Su
    Kim, Myungchul
    [J]. IEEE ACCESS, 2020, 8 : 51684 - 51691
  • [47] White-box Implementation of Stream Cipher
    Fukushima, Kazuhide
    Hidano, Seira
    Kiyomoto, Shinsaku
    [J]. ICISSP: PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2017, : 263 - 269
  • [48] Efficient and Provable White-Box Primitives
    Fouque, Pierre-Alain
    Karpman, Pierre
    Kirchner, Paul
    Minaud, Brice
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 159 - 188
  • [49] White-Box AES Implementation Revisited
    Baek, Chung Hun
    Cheon, Jung Hee
    Hong, Hyunsook
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (03) : 273 - 287
  • [50] A New White-box Cryptographic Scheme
    Lin, Ting-Ting
    Lai, Xue-Jia
    Xue, Wei-Jia
    Jia, Yin
    [J]. 2015 INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND INFORMATION SYSTEM (SEIS 2015), 2015, : 373 - 378