Research on Metamorphic Testing for Oracle Problem of Integer Bugs

  • Yi YaoEmail author
  • Song Huang
  • Mengyu Ji
Conference paper
Part of the Advances in Intelligent and Soft Computing book series (AINSC, volume 168)


The integer bugs play a vital role in functionality and security of software. For the Oracle problem, integer bugs are always ignored unless program throws an exception obviously. In this paper, a metamorphic relation is provided which is based approach to detect invisible integer bugs without oracle. It is shown in our case study that this method can detect some invisible errors which are difficult to be found in conventional approach and improve the efficiency of integer bugs detection.


metamorphic relation integer bugs integer overflows test oracle 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Heitmeyer, C.: Applying Practical Formal Methods to the Specification and Analysis of Security Properties. In: Gorodetski, V.I., Skormin, V.A., Popyack, L.J. (eds.) MMM-ACNS 2001. LNCS, vol. 2052, pp. 84–89. Springer, Heidelberg (2001)Google Scholar
  2. 2.
    Weyuker, E.J.: On testing non-testable programs. Computer Journal 25, 465–470 (1982)Google Scholar
  3. 3.
    Chen, T.Y., Cheung, S.C., Yiu, S.M.: Metamorphic testing: a new approach for generating next test cases. Technical Report HKUST-CS98-01 (1998)Google Scholar
  4. 4.
    Manolache, L.I., Kourie, D.G.: Software testing using model programs. Software: Practice and Experience 31, 1211–1236 (2001)zbMATHCrossRefGoogle Scholar
  5. 5.
    Robert, C.: Secure Coding in C and C++. Person Education (2010)Google Scholar
  6. 6.
    Zeng, F., Mao, L., Chen, Z., Cao, Q.: Mutation-based Testing of Integer Overflow Vulnerabilities. In: The 5th International Conference on Wireless Communications, Networking and Mobile Computing, WiCOM 2009, September 24-26. IEEE Press, Beijing (2009)Google Scholar
  7. 7.
    Chen, T.Y., Huang, D.H., Tse, T.H., et al.: Case studies on the selection of useful relations in metamorphic testing. In: Proceeding of the 4th Ibero-American Symposium on Software Engineering and Knowledge Engineering, JIISIC 2004, Polytechnic University of Madrid, Madrid Spain, pp. 569–583 (2004)Google Scholar
  8. 8.
    Gotlieb, A.: TCAS software verification using Constraint Programming. The Knowledge Engineering Review, vol. 00:0, pp. 1–15. Cambridge University Press (2009)Google Scholar
  9. 9.
    Wu, P., Shi, X.C., Tang, J.J., Lin, H.M., Chen, T.Y.: Metamorphic testing and special case testing: A case study. Journal of Software 16(7), 1210–1220 (2005)CrossRefGoogle Scholar
  10. 10.
    Dong, G.W., Wu, S.Z., Wang, G.S., Guo, T., Huang, Y.G.: Security Assurance with Metamorphic Testing and Genetic Algorithm. In: IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp. 368–373 (2010)Google Scholar

Copyright information

© Springer-Verlag GmbH Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Institute of Command AutomationPLA University of Science and TechnologyNanjingChina
  2. 2.Mobile Post Doctoral StationPLA University of Science and TechnologyNanjingChina

Personalised recommendations