{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T08:59:56Z","timestamp":1775638796037,"version":"3.50.1"},"reference-count":73,"publisher":"Association for Computing Machinery (ACM)","issue":"8","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2024,4]]},"abstract":"<jats:p>\n            Database Management Systems (DBMSs) are widely used to efficiently store and retrieve data. DBMSs usually support various metadata, e.g., integrity constraints for ensuring data integrity and indexes for locating data. DBMSs can further utilize these metadata to optimize query evaluation. However, incorrect metadata-related optimizations can introduce metadata-related logic bugs, which can cause a DBMS to return an incorrect query result for a given query. In this paper, we propose a general and effective testing approach,\n            <jats:italic>Raw database construction<\/jats:italic>\n            (Radar), to detect metadata-related logic bugs in DBMSs. Given a database\n            <jats:italic>db<\/jats:italic>\n            containing some metadata, Radar first constructs a raw database\n            <jats:italic>rawDb<\/jats:italic>\n            , which wipes out the metadata in\n            <jats:italic>db<\/jats:italic>\n            and contains the same data as\n            <jats:italic>db.<\/jats:italic>\n            Since\n            <jats:italic>db<\/jats:italic>\n            and\n            <jats:italic>rawDb<\/jats:italic>\n            have the same data, they should return the same query result for a given query. Any inconsistency in their returned query results indicates a metadata-related logic bug. To effectively detect metadata-related logic bugs, we further propose a metadata-oriented testing optimization strategy to focus on testing previously unseen metadata, thus detecting more metadata-related logic bugs quickly. We implement and evaluate Radar on five widely-used DBMSs, and have detected 42 bugs, of which 38 have been confirmed as new bugs and 16 have been fixed by DBMS developers.\n          <\/jats:p>","DOI":"10.14778\/3659437.3659445","type":"journal-article","created":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T16:22:27Z","timestamp":1717172547000},"page":"1884-1897","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Detecting Metadata-Related Logic Bugs in Database Systems via Raw Database Construction"],"prefix":"10.14778","volume":"17","author":[{"given":"Jiansen","family":"Song","sequence":"first","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Wensheng","family":"Dou","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Yu","family":"Gao","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Ziyu","family":"Cui","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Yingying","family":"Zheng","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Dong","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Jun","family":"Wei","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Tao","family":"Huang","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,31]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2023. AFL: American Fuzzy Lop. http:\/\/lcamtuf.coredump.cx\/afl\/."},{"key":"e_1_2_1_2_1","unstructured":"2023. Amazon DynamoDB. https:\/\/aws.amazon.com\/cn\/dynamodb\/."},{"key":"e_1_2_1_3_1","unstructured":"2023. Avoiding Full Table Scans. https:\/\/dev.mysql.com\/doc\/refman\/8.0\/en\/table-scan-avoidance.html."},{"key":"e_1_2_1_4_1","unstructured":"2023. Azure Cosmos DB. https:\/\/azure.microsoft.com\/."},{"key":"e_1_2_1_5_1","unstructured":"2023. CockroachDB Homepage. https:\/\/www.cockroachlabs.com\/."},{"key":"e_1_2_1_6_1","unstructured":"2023. Database Topic in GitHub. https:\/\/github.com\/topics\/database."},{"key":"e_1_2_1_7_1","unstructured":"2023. Datastore. https:\/\/cloud.google.com\/datastore."},{"key":"e_1_2_1_8_1","unstructured":"2023. DB-Engines Ranking. https:\/\/db-engines.com\/en\/ranking."},{"key":"e_1_2_1_9_1","unstructured":"2023. Function Cast in MySQL. https:\/\/dev.mysql.com\/doc\/refman\/5.7\/en\/cast-functions.html."},{"key":"e_1_2_1_10_1","unstructured":"2023. go-randgen. https:\/\/github.com\/pingcap\/go-randgen."},{"key":"e_1_2_1_11_1","unstructured":"2023. Incompatible query results with UNHEX function. https:\/\/github.com\/pingcap\/tidb\/issues\/45378."},{"key":"e_1_2_1_12_1","unstructured":"2023. IS NULL Optimization. https:\/\/dev.mysql.com\/doc\/refman\/8.0\/en\/is-null-optimization.html."},{"key":"e_1_2_1_13_1","unstructured":"2023. Manifest log in RocksDB. https:\/\/github.com\/facebook\/rocksdb\/wiki\/MANIFEST."},{"key":"e_1_2_1_14_1","unstructured":"2023. MariaDB Homepage. https:\/\/mariadb.org\/."},{"key":"e_1_2_1_15_1","unstructured":"2023. MongoDB. https:\/\/www.mongodb.com\/."},{"key":"e_1_2_1_16_1","unstructured":"2023. MySQL CREATE INDEX Statement. https:\/\/dev.mysql.com\/doc\/refman\/8.0\/en\/create-index.html."},{"key":"e_1_2_1_17_1","unstructured":"2023. MySQL Homepage. https:\/\/www.mysql.com."},{"key":"e_1_2_1_18_1","unstructured":"2023. Neo4j Homepage. https:\/\/neo4j.com\/."},{"key":"e_1_2_1_19_1","unstructured":"2023. PostgreSQL Homepage. https:\/\/www.postgresql.org\/."},{"key":"e_1_2_1_20_1","unstructured":"2023. Quirks Caveats and Gotchas In SQLite. https:\/\/www.sqlite.org\/quirks.html."},{"key":"e_1_2_1_21_1","unstructured":"2023. SQLancer Homepage. https:\/\/github.com\/sqlancer\/sqlancer."},{"key":"e_1_2_1_22_1","unstructured":"2023. SQLite Homepage. https:\/\/www.sqlite.org\/index.html."},{"key":"e_1_2_1_23_1","unstructured":"2023. SQLsmith. https:\/\/github.com\/anse1\/sqlsmith."},{"key":"e_1_2_1_24_1","unstructured":"2023. TiDB Homepage. https:\/\/www.pingcap.com\/?from=en."},{"key":"e_1_2_1_25_1","unstructured":"2023. TigerGraph. https:\/\/www.tigergraph.com\/."},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of IEEE\/ACM International Conference on Automated Software Engineering (ASE). 238--247","author":"Khalek Shadi Abdul","year":"2008","unstructured":"Shadi Abdul Khalek, Bassem Elkarablieh, Yai O. Laleye, and Sarfraz Khurshid. 2008. Query-Aware Test Generation Using a Relational Constraint Solver. In Proceedings of IEEE\/ACM International Conference on Automated Software Engineering (ASE). 238--247."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00174"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of International Conference on Software Engineering (ICSE). Article 133","author":"Ba Jinsheng","year":"2024","unstructured":"Jinsheng Ba and Manuel Rigger. 2024. CERT: Finding Performance Issues in Database Systems Through the Lens of Cardinality Estimation. In Proceedings of International Conference on Software Engineering (ICSE). Article 133, 13 pages."},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of International Conference on Management of Data (SIGMOD) (jun","author":"Ba Jinsheng","year":"2024","unstructured":"Jinsheng Ba and Manuel Rigger. 2024. Keep It Simple: Testing Databases via Differential Query Plans. Proceedings of International Conference on Management of Data (SIGMOD) (jun 2024)."},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 341--352","author":"Binnig Carsten","year":"2007","unstructured":"Carsten Binnig, Donald Kossmann, Eric Lo, and M. Tamer \u00d6zsu. 2007. QA-Gen: Generating Query-Aware Test Databases. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 341--352."},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of International Conference on Very Large Data Bases (VLDB). 1097--1107","author":"Bruno Nicolas","year":"2005","unstructured":"Nicolas Bruno and Surajit Chaudhuri. 2005. Flexible Database Generators. In Proceedings of International Conference on Very Large Data Bases (VLDB). 1097--1107."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/78922.78924"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of ACM SIGFIDET Workshop on Data Description, Access and Control (SIGFIDET). 249--264","author":"Donald","unstructured":"Donald D. Chamberlin and Raymond F. Boyce. 1974. SEQUEL: A Structured English Query Language. In Proceedings of ACM SIGFIDET Workshop on Data Description, Access and Control (SIGFIDET). 249--264."},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the Workshop on Testing Database Systems. Article 6, 5 pages.","author":"Chen Xinyue","year":"2020","unstructured":"Xinyue Chen, Chenglong Wang, and Alvin Cheung. 2020. Testing Query Execution Engines with Mutations. In Proceedings of the Workshop on Testing Database Systems. Article 6, 5 pages."},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/362384.362685"},{"key":"e_1_2_1_36_1","volume-title":"Proceedings of IEEE\/ACM International Conference on Automated Software Engineering (ASE). Article 35","author":"Cui Ziyu","year":"2023","unstructured":"Ziyu Cui, Wensheng Dou, Qianwang Dai, Jiansen Song, Wei Wang, Jun Wei, and Dan Ye. 2023. Differentially Testing Database Transactions for Fun and Profit. In Proceedings of IEEE\/ACM International Conference on Automated Software Engineering (ASE). Article 35, 12 pages."},{"key":"e_1_2_1_37_1","volume-title":"Proceedings of International Conference on Software Engineering (ICSE). Article 163","author":"Cui Ziyu","year":"2024","unstructured":"Ziyu Cui, Wensheng Dou, Yu Gao, Dong Wang, Jiansen Song, Yingying Zheng, Tao Wang, Rui Yang, Kang Xu, Yixin Hu, Jun Wei, and Tao Huang. 2024. Understanding Transaction Bugs in Database Systems. In Proceedings of International Conference on Software Engineering (ICSE). Article 163, 13 pages."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00101"},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of International Conference on Software Engineering (ICSE). Article 146","author":"Fu Jingzhou","year":"2024","unstructured":"Jingzhou Fu, Jie Liang, Zhiyong Wu, and Yu Jiang. 2024. Sedar: Obtaining High-Quality Seeds for DBMS Fuzzing via Cross-DBMS SQL Transfer. In Proceedings of International Conference on Software Engineering (ICSE). Article 146, 12 pages."},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of IEEE\/ACM International Conference on Automated Software Engineering (ASE). Article 49","author":"Fu Jingzhou","year":"2023","unstructured":"Jingzhou Fu, Jie Liang, Zhiyong Wu, Mingzhe Wang, and Yu Jiang. 2023. Griffin: Grammar-Free DBMS Fuzzing. In Proceedings of IEEE\/ACM International Conference on Automated Software Engineering (ASE). Article 49, 12 pages."},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of International Conference on Management of Data (SIGMOD)","volume":"30","author":"Godfrey Parke","year":"2001","unstructured":"Parke Godfrey, Jarek Gryz, and Calisto Zuzarte. 2001. Exploiting Constraint-like Data Characterizations in Query Optimization. In Proceedings of International Conference on Management of Data (SIGMOD), Vol. 30. 582--592."},{"key":"e_1_2_1_42_1","volume-title":"Weinberger","author":"Gray Jim","year":"1994","unstructured":"Jim Gray, Prakash Sundaresan, Susanne Englert, Ken Baclawski, and Peter J. Weinberger. 1994. Quickly Generating Billion-Record Synthetic Databases. 23, 2 (may 1994), 243--252."},{"key":"e_1_2_1_43_1","volume-title":"Proceedings of USENIX Annual Technical Conference (USENIX ATC). 345--358","author":"Hao Zongyin","year":"2023","unstructured":"Zongyin Hao, Quanfeng Huang, Chengpeng Wang, Jianfeng Wang, Yushan Zhang, Rongxin Wu, and Charles Zhang. 2023. Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis. In Proceedings of USENIX Annual Technical Conference (USENIX ATC). 345--358."},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of International Conference on Very Large Data Bases (VLDB). 1243--1246","author":"Houkj\u00e6r Kenneth","year":"2006","unstructured":"Kenneth Houkj\u00e6r, Kristian Torp, and Rico Wind. 2006. Simple and Realistic Data Generation. In Proceedings of International Conference on Very Large Data Bases (VLDB). 1243--1246."},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 163--174","author":"Hua Ziyue","year":"2023","unstructured":"Ziyue Hua, Wei Lin, Luyao Ren, Zongyang Li, Lu Zhang, Wenpin Jiao, and Tao Xie. 2023. GDsmith: Detecting Bugs in Cypher Graph Database Engines. In Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 163--174."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14778\/3415478.3415535"},{"key":"e_1_2_1_47_1","volume-title":"Proceedings of International Conference on Management of Data (SIGMOD). 1015--1026","author":"Ileana Ioana","year":"2014","unstructured":"Ioana Ileana, Bogdan Cautis, Alin Deutsch, and Yannis Katsis. 2014. Complete yet Practical Search for Minimal Query Reformulations under Constraints. In Proceedings of International Conference on Management of Data (SIGMOD). 1015--1026."},{"key":"e_1_2_1_48_1","volume-title":"Analysis of recovery in a database system using a write-ahead log protocol. 21, 2","author":"Jhingran Anant","year":"1992","unstructured":"Anant Jhingran and Pratap Khedkar. 1992. Analysis of recovery in a database system using a write-ahead log protocol. 21, 2 (1992), 175--184."},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of International Conference on Software Engineering (ICSE). Article 46","author":"Jiang Yuancheng","unstructured":"Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland H. C. Yap, Zhenkai Liang, and Manuel Rigger. 2024. Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation. In Proceedings of International Conference on Software Engineering (ICSE). Article 46, 12 pages."},{"key":"e_1_2_1_50_1","volume-title":"Proceedings of USENIX Security Symposium (USENIX Security). Article 277","author":"Jiang Zuming","year":"2023","unstructured":"Zuming Jiang, Jiaju Bai, and Zhendong Su. 2023. DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation. In Proceedings of USENIX Security Symposium (USENIX Security). Article 277, 17 pages."},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 397--417","author":"Jiang Zu-Ming","year":"2023","unstructured":"Zu-Ming Jiang, Si Liu, Manuel Rigger, and Zhendong Su. 2023. Detecting Trans-actional Bugs in Database Engines via Graph-Based Oracle Construction. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 397--417."},{"key":"e_1_2_1_52_1","first-page":"1","article-title":"APOLLO: Automatic Detection and Diagnosis of Performance Regressions in Database Systems","volume":"13","author":"Jung Jinho","year":"2019","unstructured":"Jinho Jung, Hong Hu, Joy Arulraj, Taesoo Kim, and Woonhak Kang. 2019. APOLLO: Automatic Detection and Diagnosis of Performance Regressions in Database Systems. Proceedings of the VLDB Endowment (PVLDB) 13, 1 (sep 2019), 57--70.","journal-title":"Proceedings of the VLDB Endowment (PVLDB)"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 140--149","author":"Kamm Matteo","year":"2023","unstructured":"Matteo Kamm, Manuel Rigger, Chengyu Zhang, and Zhendong Su. 2023. Testing Graph Database Engines via Query Partitioning. In Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 140--149."},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 140--149","author":"Kamm Matteo","year":"2023","unstructured":"Matteo Kamm, Manuel Rigger, Chengyu Zhang, and Zhendong Su. 2023. Testing Graph Database Engines via Query Partitioning. In Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 140--149."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.14778\/3430915.3430918"},{"key":"e_1_2_1_56_1","volume-title":"Proceedings of IEEE International Conference on Data Engineering (ICDE). 668--681","author":"Liang Jie","year":"2023","unstructured":"Jie Liang, Yaoguang Chen, Zhiyong Wu, Jingzhou Fu, Mingzhe Wang, Yu Jiang, Xiangdong Huang, Ting Chen, Jiashui Wang, and Jiajia Li. 2023. Sequence-Oriented DBMS Fuzzing. In Proceedings of IEEE International Conference on Data Engineering (ICDE). 668--681."},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of International Conference on Software Engineering (ICSE). Article 135","author":"Liang Jie","year":"2024","unstructured":"Jie Liang, Zhiyong Wu, Jingzhou Fu, Mingzhe Wang, Chengnian Sun, and Yu Jiang. 2024. Mozi: Discovering DBMS Bugs via Configuration-Based Equivalent Transformation. In Proceedings of International Conference on Software Engineering (ICSE). Article 135, 12 pages."},{"key":"e_1_2_1_58_1","volume-title":"Proceedings of USENIX Security Symposium (USENIX Security). 4309--4326","author":"Liang Yu","year":"2022","unstructured":"Yu Liang, Song Liu, and Hong Hu. 2022. Detecting Logical Bugs of DBMS with Coverage-based Guidance. In Proceedings of USENIX Security Symposium (USENIX Security). 4309--4326."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510093"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01232186"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409710"},{"key":"e_1_2_1_62_1","volume-title":"Proceedings of ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA)","volume":"4","author":"Rigger Manuel","year":"2020","unstructured":"Manuel Rigger and Zhendong Su. 2020. Finding Bugs in Database Systems via Query Partitioning. In Proceedings of ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA), Vol. 4. Article 211, 30 pages."},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). Article 38","author":"Rigger Manuel","year":"2020","unstructured":"Manuel Rigger and Zhendong Su. 2020. Testing Database Engines via Pivoted Query Synthesis. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). Article 38, 16 pages."},{"key":"e_1_2_1_64_1","first-page":"4","article-title":"A Method for Automatic Rule Derivation to Support Semantic Query Optimization","volume":"17","author":"Siegel Michael","year":"1992","unstructured":"Michael Siegel, Edward Sciore, and Sharon Salveter. 1992. A Method for Automatic Rule Derivation to Support Semantic Query Optimization. ACM Transactions on Database Systems (TODS) 17, 4 (dec 1992), 563--600.","journal-title":"ACM Transactions on Database Systems (TODS)"},{"key":"e_1_2_1_65_1","volume-title":"Proceedings of International Conference on Very Large Data Bases (VLDB). 618--622","author":"Slutz Donald R.","year":"1998","unstructured":"Donald R. Slutz. 1998. Massive Stochastic Testing of SQL. In Proceedings of International Conference on Very Large Data Bases (VLDB). 618--622."},{"key":"e_1_2_1_66_1","volume-title":"Proceedings of IEEE\/ACM International Conference on Software Engineering (ICSE). 2072--2084","author":"Song Jiansen","year":"2023","unstructured":"Jiansen Song, Wensheng Dou, Ziyu Cui, Qianwang Dai, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2023. Testing Database Systems via Differential Query Execution. In Proceedings of IEEE\/ACM International Conference on Software Engineering (ICSE). 2072--2084."},{"key":"e_1_2_1_67_1","volume-title":"Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). Article 4, 18 pages.","author":"Tan Cheng","year":"2020","unstructured":"Cheng Tan, Changgeng Zhao, Shuai Mu, and Michael Walfish. 2020. COBRA: making transactional key-value stores verifiably serializable. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). Article 4, 18 pages."},{"key":"e_1_2_1_68_1","volume-title":"Article 55","author":"Tang Xiu","year":"2023","unstructured":"Xiu Tang, Sai Wu, Dongxiang Zhang, Feifei Li, and Gang Chen. 2023. Detecting Logic Bugs of Join Optimizations in DBMS. 1, 1, Article 55 (2023), 26 pages."},{"key":"e_1_2_1_69_1","volume-title":"Proceedings of IEEE\/ACM International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). 328--337","author":"Wang Mingzhe","year":"2021","unstructured":"Mingzhe Wang, Zhiyong Wu, Xinyi Xu, Jie Liang, Chijin Zhou, Huafeng Zhang, and Yu Jiang. 2021. Industry Practice of Coverage-Guided Enterprise-Level DBMS Fuzzing. In Proceedings of IEEE\/ACM International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). 328--337."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion58688.2023.00041"},{"key":"e_1_2_1_71_1","volume-title":"Proceedings of IEEE International Conference on Software Testing, Verification and Validation (ICST)","author":"Zheng Yingying","year":"2024","unstructured":"Yingying Zheng, Wensheng Dou, Lei Tang, Ziyu Cui, Jiansen Song, Ziyue Cheng, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2024. Differential Optimization Testing of Gremlin-Based Graph Database Systems. Proceedings of IEEE International Conference on Software Testing, Verification and Validation (ICST) (2024)."},{"key":"e_1_2_1_72_1","volume-title":"Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 302--313","author":"Zheng Yingying","year":"2022","unstructured":"Yingying Zheng, Wensheng Dou, Yicheng Wang, Zheng Qin, Lei Tang, Yu Gao, Dong Wang, Wei Wang, and Jun Wei. 2022. Finding Bugs in Gremlin-Based Graph Database Systems via Randomized Differential Testing. In Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 302--313."},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS). 58--71","author":"Zhong Rui","year":"2020","unstructured":"Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, and Dinghao Wu. 2020. SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS). 58--71."}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3659437.3659445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T16:24:57Z","timestamp":1717172697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3659437.3659445"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4]]},"references-count":73,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2024,4]]}},"alternative-id":["10.14778\/3659437.3659445"],"URL":"https:\/\/doi.org\/10.14778\/3659437.3659445","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2024,4]]},"assertion":[{"value":"2024-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}