Research Article
An Approach of Vulnerability Testing for Third-Party Component Based on Condition and Parameter Mutation
Table 7
The testing result of parameter mutation.
| Method name | Value constraint | Relational constraint | Time for generating test cases | Number of all test cases | Number of test cases that find faults | detecting rate |
| JudgeTriangle(int a, int b, int c) | ; ; | ; ;
| 218 ms | 663 | 339 | 51.13% | Add(int a, int b) | ; | | 62 ms | 60 | 15 | 25% | Query(String s) | — | — | 422 ms | 9 | 1 | 11.11% | GetCharacterCount(String s) | — | — | An infinite loop is caused by data overflow | 9 | 1 | 11.11% | IsAcuteTriangle(int a, int b, int c) | ; ; | | 63 ms | 964 | 543 | 56.33% | CIsLargest(int a, int b, int c) | ; ; | && | 157 ms | 615 | 112 | 18.21% | IsQuotient(int a, int b, int c) | ; ; | | 250 ms | 981 | 327 | 33.33% |
|
|