Research Article

An Approach of Vulnerability Testing for Third-Party Component Based on Condition and Parameter Mutation

Table 7

The testing result of parameter mutation.

Method nameValue constraintRelational constraintTime for generating test casesNumber of all test casesNumber of test cases that find faultsdetecting rate

JudgeTriangle(int a, int b, int c) ; ; ;
;
218 ms66333951.13%
Add(int a, int b) ; 62 ms601525%
Query(String s) 422 ms9111.11%
GetCharacterCount(String s) An infinite loop is caused by data overflow9111.11%
IsAcuteTriangle(int a, int b, int c) ; ; 63 ms96454356.33%
CIsLargest(int a, int b, int c) ; ; && 157 ms61511218.21%
IsQuotient(int a, int b, int c) ; ; 250 ms98132733.33%