Mutation Analysis for SQL Database Applications

被引:0
|
作者
Cabeca, Andrea Goncalves [1 ]
Jino, Mario [2 ]
Leitao-Junior, Plinio S. [3 ]
机构
[1] KPO Consulting Serv, IT Dept, Sao Paulo, Brazil
[2] Univ Estadual Campinas, FEEC, DCA, Campinas, SP, Brazil
[3] Univ Fed Goias, Inst Informat, Goiania, Go, Brazil
关键词
software testing; quality assurance; database testing; SQL; mutation testing;
D O I
10.1109/ICSEA.2009.30
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Testing database applications is crucial for ensuring good quality software as undetected faults can result in unrecoverable data corruption. SQL is the most widely used interface language for relational database systems. Our approach aims to achieve better testing by selecting fault-revealing databases. We propose the use of mutation analysis on SQL statements and discuss two scenarios for applying strong and weak mutation techniques. Experiments using real applications, real faults and real data were performed to: (i) evaluate the applicability of the approach, and (ii) compare fault-revealing abilities of input databases.
引用
收藏
页码:146 / +
页数:2
相关论文
共 50 条
  • [1] Specification and development of database applications based on Z and SQL
    Shahreza, Maryam Lotfi
    Moeini, Ali
    Mesbah, Rahmat Ollah
    [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION MANAGEMENT AND ENGINEERING, PROCEEDINGS, 2009, : 399 - +
  • [2] Profiling database applications to detect SQL injection attacks
    Bertino, Elisa
    Kamra, Ashish
    Early, James P.
    [J]. 2007 IEEE INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE, VOLS 1 AND 2, 2007, : 449 - +
  • [3] Shrinking a Database to Perform SQL Mutation Tests Using an Evolutionary Algorithm
    Loureiro Moncao, Ana Claudia B.
    Camilo-Junior, Celso G.
    Queiroz, Leonardo T.
    Rodrigues, Cassio L.
    Sa Leitao-Junior, Plinio de
    Vincenzi, Auri M. R.
    [J]. 2013 IEEE CONGRESS ON EVOLUTIONARY COMPUTATION (CEC), 2013, : 2533 - 2539
  • [4] As an Example in SQL SERVER Database Security Analysis
    Wang, Huanjing
    Zhang, Haiyan
    [J]. ACC 2009: ETP/IITA WORLD CONGRESS IN APPLIED COMPUTING, COMPUTER SCIENCE, AND COMPUTER ENGINEERING, 2009, : 438 - 442
  • [5] New SQL standard for object-relational database applications
    Pardede, E
    Rahayu, JW
    Taniar, D
    [J]. STANDARDIZATION AND INNOVATION IN INFORMATION TECHNOLOGY, PROCEEDINGS, 2003, : 191 - 203
  • [6] Extracting Equivalent SQL from Imperative Code in Database Applications
    Emani, K. Venkatesh
    Bhattacharya, Subhro
    Ramachandra, Karthik
    Sudarshan, S.
    [J]. SIGMOD'16: PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2016, : 1781 - 1796
  • [7] Mutation testing for java database applications
    Zhou, Chixiang
    Frankl, Phyllis
    [J]. Proceedings - 2nd International Conference on Software Testing, Verification, and Validation, ICST 2009, 2009, : 396 - 405
  • [8] iConSMutate: Concolic Testing of Database Applications Using Existing Database States Guided by SQL Mutants
    Sarkar, Tanmoy
    Basu, Samik
    Wong, Johnny
    [J]. 2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 479 - 484
  • [9] Migrating from SQL to NOSQL Database: Practices and Analysis
    Yassine, Fatima
    Awad, Mamoun Adel
    [J]. PROCEEDINGS OF THE 2018 13TH INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY (IIT), 2018, : 58 - 62
  • [10] A Review of Database Forensic Analysis For SQL Injection Attack
    Rahman, Muhammad Razif A. B.
    Abd Manaf, Azizah
    [J]. VISION 2020: SUSTAINABLE GROWTH, ECONOMIC DEVELOPMENT, AND GLOBAL COMPETITIVENESS, VOLS 1-5, 2014, : 201 - 206