2011 Fourth IEEE International Conference on Software Testing, Verification and Validation 2011
DOI: 10.1109/icst.2011.63
|View full text |Cite
|
Sign up to set email alerts
|

Inferential Checking for Mutants Modifying Database States

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…Our earlier work using only mutants of SELECT statements [1] demonstrated similar results. In addition, in order to visualize the relationship among the three variables, we drew a series of side-by-side three-dimensional scatter plots on the two versions of data sets, shown in Figure 2 7 . The horizontal axes represent size and coverage and the vertical axis represents effectiveness (mutation score).…”
Section: Data Analysis and Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Our earlier work using only mutants of SELECT statements [1] demonstrated similar results. In addition, in order to visualize the relationship among the three variables, we drew a series of side-by-side three-dimensional scatter plots on the two versions of data sets, shown in Figure 2 7 . The horizontal axes represent size and coverage and the vertical axis represents effectiveness (mutation score).…”
Section: Data Analysis and Resultsmentioning
confidence: 99%
“…We subsequently developed JDAMA to apply their SQL mutation in the context of Java/JDBC programs [6], [1]. In addition, we proposed a new approach inferential checking [7] to incorporating updating commands (UPDATE, DELETE, and INSERT) for Java database applications. In this paper, we employed these related papers to aid our experiments.…”
Section: Test Effectiveness Of An Adequacy Criterionmentioning
confidence: 99%
See 1 more Smart Citation
“…In the fault-based category the existing works range from the development of sets of mutants for SQL queries [17], [18] or schemas [19], [20], [21] to the evaluation of the fault-detection effectiveness with tools [22], [23], [24], [25], fault-localization [26] and empirical studies [27]. Others are application specific, mainly with the goal of detecting SQL injection vulnerabilities [28], [29], [30] and preventing them [31].…”
Section: Test Coverage For Database Applicationsmentioning
confidence: 99%
“…JDAMA currently only handles SQL SELECT statements. Recent research on extending it to handle SQL statements that modify database state (UPDATE, DELETE, and INSERT) is described in the paper of Zhou et al 28. The implementation of the instrumenter extends a Soot abstract class BodyTransformer.…”
Section: Jdama Design and Implementationmentioning
confidence: 99%