• DocumentCode
    588644
  • Title

    Mutation Testing of Event Processing Queries

  • Author

    Gutierrez-Madronal, L. ; Shahriar, Hossain ; Zulkernine, Mohammad ; Dominguez-Jimenez, J.J. ; Medina-Bulo, Inmaculada

  • Author_Institution
    Dept. of Comput. Languages & Syst., Univ. of Cadiz, Cádiz, Spain
  • fYear
    2012
  • fDate
    27-30 Nov. 2012
  • Firstpage
    21
  • Lastpage
    30
  • Abstract
    Event processing queries are intended to process continuous event streams. These queries are partially similar to traditional SQL queries, but provide the facilities to express rich features (e.g., pattern expression, sliding window of length and time). An error while implementing a query may result in abnormal program behaviors and lost business opportunities. Moreover, queries can be generated with unsanitized inputs and the structure of intended queries might be altered. Thus, a tester needs to test the behavior of queries in presence of malicious inputs. Mutation testing has been found to be effective to assess test suites quality and generating new test cases. Unfortunately, there is no effort to perform mutation testing of event processing queries. In this work, we propose mutation-based testing of event processing queries. We choose Event Processing Language (EPL) as our case study and develop necessary mutation operators and killing criteria to generate high quality event streams and malicious inputs. Our proposed operators modify different features of EPL queries (pattern expression, windows of length and time, batch processing of events). We develop an architecture to generate mutants for EPL and perform mutation analysis. We evaluate our proposed EPL mutation testing approach with a set of developed benchmark containing diverse types EPL queries. The evaluation results indicate that the proposed operators and mutant killing criteria are effective to generate test cases capable of revealing anomalous program behaviors (e.g., event notification failure, delay of event reporting, unexpected event), and SQL injection attacks. Moreover, the approach incurs less manual effort and can complement other testing approach such as random testing.
  • Keywords
    SQL; program testing; query processing; security of data; software quality; EPL mutation testing approach; EPL queries; SQL injection attacks; SQL queries; abnormal program behaviors; anomalous program behaviors; continuous event streams; event processing language; event processing queries; high quality event streams; killing criteria; lost business opportunities; mutation analysis; mutation-based testing; random testing; test cases; test suites quality; unsanitized inputs; Batch production systems; Delay; Educational institutions; Engines; Observers; Pattern matching; Testing; Event Processing Language; Event stream; Mutation testing; Test suite adequacy;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Software Reliability Engineering (ISSRE), 2012 IEEE 23rd International Symposium on
  • Conference_Location
    Dallas, TX
  • ISSN
    1071-9458
  • Print_ISBN
    978-1-4673-4638-2
  • Type

    conf

  • DOI
    10.1109/ISSRE.2012.20
  • Filename
    6405401