{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,12]],"date-time":"2026-03-12T10:17:15Z","timestamp":1773310635920,"version":"3.50.1"},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"7","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2025,3]]},"abstract":"<jats:p>Relational Database Management Systems (DBMSs) provide flexible DDL (Data Definition Language) statements that enable the creation, modification, and deletion of database schemas. In addition to database schemas, relational DBMSs typically manage various schema-related information internally, e.g., schema changes, tablespace allocation, and block-level data layout. However, incorrect implementations related to schema-related information maintenance and utilization can introduce schema-related logic bugs. These bugs can cause DQL (Data Query Language) statements to return incorrect query results and DML (Data Manipulation Language) statements to create incorrect database states. Existing approaches mainly focus on detecting logic bugs in DQL statements, but are ineffective in detecting schema-related logic bugs.<\/jats:p>\n          <jats:p>\n            In this paper, we propose a novel and general testing approach, DDLCheck, to effectively detect schema-related logic bugs in relational DBMSs. We first generate a complex DDL sequence\n            <jats:italic toggle=\"yes\">\n              seq\n              <jats:sub>gen<\/jats:sub>\n            <\/jats:italic>\n            that consists of various types of DDL statements, and then synthesize a rather simple DDL sequence\n            <jats:italic toggle=\"yes\">\n              seq\n              <jats:sub>syn<\/jats:sub>\n            <\/jats:italic>\n            , which utilizes CREATE statements to create the same database schema as\n            <jats:italic toggle=\"yes\">\n              seq\n              <jats:sub>gen<\/jats:sub>\n              .\n            <\/jats:italic>\n            Executing the same SQL statements on the two databases created by\n            <jats:italic toggle=\"yes\">\n              seq\n              <jats:sub>gen<\/jats:sub>\n            <\/jats:italic>\n            and\n            <jats:italic toggle=\"yes\">\n              Seq\n              <jats:sub>syn<\/jats:sub>\n            <\/jats:italic>\n            should yield the same execution results. Any discrepancy between their execution results indicates a schema-related logic bug. To improve the testing efficiency of DDLCheck, we further design a DDL-sequence-oriented testing optimization strategy, which can help DDLCheck explore diverse schema-related information and detect schema-related logic bugs quickly. We implement and evaluate DDLCheck on six widely-used relational DBMSs. We have detected 34 bugs in these DBMSs, of which 29 bugs have been confirmed as previously unknown bugs and 9 bugs have been fixed.\n          <\/jats:p>","DOI":"10.14778\/3734839.3734861","type":"journal-article","created":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:01:06Z","timestamp":1756483266000},"page":"2281-2294","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Detecting Schema-Related Logic Bugs in Relational DBMSs via Equivalent Database Construction"],"prefix":"10.14778","volume":"18","author":[{"given":"Jiansen","family":"Song","sequence":"first","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Wensheng","family":"Dou","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Yingying","family":"Zheng","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Yu","family":"Gao","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Ziyu","family":"Cui","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]},{"given":"Jun","family":"Wei","sequence":"additional","affiliation":[{"name":"Institute of Software at CAS, China"}]}],"member":"320","published-online":{"date-parts":[[2025,8,29]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2024. CockroachDB Homepage. https:\/\/www.cockroachlabs.com\/."},{"key":"e_1_2_1_2_1","unstructured":"2024. DB-Engines Ranking. https:\/\/db-engines.com\/en\/ranking."},{"key":"e_1_2_1_3_1","unstructured":"2024. Failed to INSERT a proper value when no FOREIGN KEY violation. https:\/\/jira.mariadb.org\/browse\/MDEV-34105."},{"key":"e_1_2_1_4_1","unstructured":"2024. Inconsistent REPLACE behaviors. https:\/\/jira.mariadb.org\/browse\/MDEV-35115."},{"key":"e_1_2_1_5_1","unstructured":"2024. MariaDB Homepage. https:\/\/mariadb.org\/."},{"key":"e_1_2_1_6_1","unstructured":"2024. MySQL Customers by Industry. https:\/\/www.mysql.com\/customers\/."},{"key":"e_1_2_1_7_1","unstructured":"2024. MySQL Homepage. https:\/\/www.mysql.com."},{"key":"e_1_2_1_8_1","unstructured":"2024. PostgreSQL Homepage. https:\/\/www.postgresql.org\/."},{"key":"e_1_2_1_9_1","unstructured":"2024. SQLancer Homepage. https:\/\/github.com\/sqlancer\/sqlancer."},{"key":"e_1_2_1_10_1","unstructured":"2024. SQLite Homepage. https:\/\/www.sqlite.org\/index.html."},{"key":"e_1_2_1_11_1","unstructured":"2024. SQLsmith. https:\/\/github.com\/anse1\/sqlsmith."},{"key":"e_1_2_1_12_1","unstructured":"2024. TiDB Homepage. https:\/\/www.pingcap.com\/?from=en."},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of IEEE\/ACM International Conference on Automated Software Engineering (ASE). 238\u2013247","author":"Khalek Shadi Abdul","year":"2008","unstructured":"Shadi Abdul Khalek, Bassem Elkarablieh, Yai O. Laleye, and Sarfraz Khurshid. 2008. Query-Aware Test Generation Using a Relational Constraint Solver. In Proceedings of IEEE\/ACM International Conference on Automated Software Engineering (ASE). 238\u2013247."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639076"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3654991"},{"key":"e_1_2_1_16_1","volume-title":"Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 341\u2013352","author":"Binnig Carsten","year":"2007","unstructured":"Carsten Binnig, Donald Kossmann, Eric Lo, and M. Tamer \u00d6zsu. 2007. QA-Gen: Generating Query-Aware Test Databases. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 341\u2013352."},{"key":"e_1_2_1_17_1","volume-title":"Proceedings of International Conference on Very Large Data Bases (VLDB). 1097\u20131107","author":"Bruno Nicolas","year":"2005","unstructured":"Nicolas Bruno and Surajit Chaudhuri. 2005. Flexible Database Generators. In Proceedings of International Conference on Very Large Data Bases (VLDB). 1097\u20131107."},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of ACM SIGFIDET Workshop on Data Description, Access and Control (SIGFIDET). 249\u2013264","author":"Donald","unstructured":"Donald D. Chamberlin and Raymond F. Boyce. 1974. SEQUEL: A Structured English Query Language. In Proceedings of ACM SIGFIDET Workshop on Data Description, Access and Control (SIGFIDET). 249\u2013264."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/362384.362685"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556924"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639207"},{"key":"e_1_2_1_22_1","volume-title":"Proceedings of the VLDB Endowment (PVLDB) 18","author":"Cui Ziyu","year":"2025","unstructured":"Ziyu Cui, Wensheng Dou Dou, Yu Gao, Rui Yang, Yingying Zheng, Jiansen Song, Yuan Feng, and Jun Wei. 2025. Simple Testing Can Expose Most Critical Transaction Bugs: Understanding and Detecting Write-Specific Serializability Violations in Database Systems. Proceedings of the VLDB Endowment (PVLDB) 18 (2025)."},{"key":"e_1_2_1_23_1","first-page":"1","article-title":"Automating the database schema evolution process","volume":"22","author":"Curino Carlo","year":"2013","unstructured":"Carlo Curino, Hyun Jin Moon, Alin Deutsch, and Carlo Zaniolo. 2013. Automating the database schema evolution process. The VLDB Journal (VLDBJ) 22, 1 (Feb. 2013), 73\u201398.","journal-title":"The VLDB Journal (VLDBJ)"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00101"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639210"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of IEEE\/ACM International Conference on Automated Software Engineering (ASE). Article 49","author":"Fu Jingzhou","year":"2023","unstructured":"Jingzhou Fu, Jie Liang, Zhiyong Wu, Mingzhe Wang, and Yu Jiang. 2023. Griffin: Grammar-Free DBMS Fuzzing. In Proceedings of IEEE\/ACM International Conference on Automated Software Engineering (ASE). Article 49, 12 pages."},{"key":"e_1_2_1_27_1","volume-title":"Proceedings of IEEE\/ACM International Conference on Software Engineering (ICSE). 12","author":"Fu Ying","year":"2025","unstructured":"Ying Fu, Zhiyong Wu, Yuanliang Zhang, Jie Liang, Jingzhou Fu, Yu Jiang, Shanshan Li, and Xiangke Liao. 2025. THANOS: DBMS Bug Detection via Storage Engine Rotation Based Differential Testing. In Proceedings of IEEE\/ACM International Conference on Software Engineering (ICSE). 12."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395032.3395327"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/375663.375749"},{"key":"e_1_2_1_30_1","volume-title":"Proceedings of the International Workshop on Testing Database Systems (DBTest). Article 11","author":"Gu Zhongxian","unstructured":"Zhongxian Gu, Mohamed A. Soliman, and Florian M. Waas. 2012. Testing the accuracy of query optimizers. In Proceedings of the International Workshop on Testing Database Systems (DBTest). Article 11, 6 pages."},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of USENIX Annual Technical Conference (USENIX ATC). 345\u2013358","author":"Hao Zongyin","year":"2023","unstructured":"Zongyin Hao, Quanfeng Huang, Chengpeng Wang, Jianfeng Wang, Yushan Zhang, Rongxin Wu, and Charles Zhang. 2023. Pinolo: Detecting Logical Bugs in Database Management Systems with Approximate Query Synthesis. In Proceedings of USENIX Annual Technical Conference (USENIX ATC). 345\u2013358."},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of International Conference on Very Large Data Bases (VLDB). 1243\u20131246","author":"Houkj\u00e6r Kenneth","year":"2006","unstructured":"Kenneth Houkj\u00e6r, Kristian Torp, and Rico Wind. 2006. Simple and Realistic Data Generation. In Proceedings of International Conference on Very Large Data Bases (VLDB). 1243\u20131246."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598046"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.14778\/3415478.3415535"},{"key":"e_1_2_1_35_1","first-page":"6","article-title":"Efficient Black-Box Checking of Snapshot Isolation in Databases","volume":"16","author":"Huang Kaile","year":"2023","unstructured":"Kaile Huang, Si Liu, Zhenge Chen, Hengfeng Wei, David Basin, Haixiang Li, and Anqun Pan. 2023. Efficient Black-Box Checking of Snapshot Isolation in Databases. Proceedings of the VLDB Endowment (PVLDB) 16, 6 (feb 2023), 1264\u20131276.","journal-title":"Proceedings of the VLDB Endowment (PVLDB)"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2593683"},{"key":"e_1_2_1_37_1","volume-title":"Analysis of recovery in a database system using a write-ahead log protocol. 21, 2","author":"Jhingran Anant","year":"1992","unstructured":"Anant Jhingran and Pratap Khedkar. 1992. Analysis of recovery in a database system using a write-ahead log protocol. 21, 2 (1992), 175\u2013184."},{"key":"e_1_2_1_38_1","volume-title":"Proceedings of USENIX Security Symposium (USENIX Security). Article 277","author":"Jiang Zuming","year":"2023","unstructured":"Zuming Jiang, Jiaju Bai, and Zhendong Su. 2023. DynSQL: Stateful Fuzzing for Database Management Systems with Complex and Valid SQL Query Generation. In Proceedings of USENIX Security Symposium (USENIX Security). Article 277, 17 pages."},{"key":"e_1_2_1_39_1","volume-title":"Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 397\u2013417","author":"Jiang Zu-Ming","year":"2023","unstructured":"Zu-Ming Jiang, Si Liu, Manuel Rigger, and Zhendong Su. 2023. Detecting ***Trans-actional Bugs in Database Engines via Graph-Based Oracle Construction. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 397\u2013417."},{"key":"e_1_2_1_40_1","first-page":"1","article-title":"APOLLO: Automatic Detection and Diagnosis of Performance Regressions in Database Systems","volume":"13","author":"Jung Jinho","year":"2019","unstructured":"Jinho Jung, Hong Hu, Joy Arulraj, Taesoo Kim, and Woonhak Kang. 2019. APOLLO: Automatic Detection and Diagnosis of Performance Regressions in Database Systems. Proceedings of the VLDB Endowment (PVLDB) 13, 1 (sep 2019), 57\u201370.","journal-title":"Proceedings of the VLDB Endowment (PVLDB)"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597926.3598044"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14778\/3430915.3430918"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639112"},{"key":"e_1_2_1_44_1","volume-title":"Proceedings of USENIX Security Symposium (USENIX Security). 4309\u20134326","author":"Liang Yu","year":"2022","unstructured":"Yu Liang, Song Liu, and Hong Hu. 2022. Detecting Logical Bugs of DBMS with Coverage-based Guidance. In Proceedings of USENIX Security Symposium (USENIX Security). 4309\u20134326."},{"key":"e_1_2_1_45_1","volume-title":"Proceedings of the VLDB Endowment (PVLDB)","author":"Liu Shuang","year":"2025","unstructured":"Shuang Liu, Chenglin Tian, Jun Sun, Ruifeng Wang, Wei Lu, Yongxin Zhao, Yinxing Xue, Junjie Wang, and Xiaoyong Du. 2025. Semantic Conformance Testing of Relational DBMS. Proceedings of the VLDB Endowment (PVLDB) (2025)."},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510093"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409710"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428279"},{"key":"e_1_2_1_49_1","volume-title":"Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). Article 38","author":"Rigger Manuel","year":"2020","unstructured":"Manuel Rigger and Zhendong Su. 2020. Testing Database Engines via Pivoted Query Synthesis. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). Article 38, 16 pages."},{"key":"e_1_2_1_50_1","volume-title":"Proceedings of International Conference on Very Large Data Bases (VLDB). 618\u2013622","author":"Slutz Donald R.","year":"1998","unstructured":"Donald R. Slutz. 1998. Massive Stochastic Testing of SQL. In Proceedings of International Conference on Very Large Data Bases (VLDB). 618\u2013622."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00175"},{"key":"e_1_2_1_52_1","first-page":"8","article-title":"Detecting Metadata-Related Logic Bugs in Database Systems via Raw Database Construction","volume":"17","author":"Song Jiansen","year":"2024","unstructured":"Jiansen Song, Wensheng Dou, Yu Gao, Ziyu Cui, Yingying Zheng, Dong Wang, Wei Wang, Jun Wei, and Tao Huang. 2024. Detecting Metadata-Related Logic Bugs in Database Systems via Raw Database Construction. Proceedings of the VLDB Endowment (PVLDB) 17, 8 (may 2024), 1884\u20131897.","journal-title":"Proceedings of the VLDB Endowment (PVLDB)"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3386134"},{"key":"e_1_2_1_54_1","volume-title":"Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). Article 4, 18 pages.","author":"Tan Cheng","year":"2020","unstructured":"Cheng Tan, Changgeng Zhao, Shuai Mu, and Michael Walfish. 2020. COBRA: making transactional key-value stores verifiably serializable. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). Article 4, 18 pages."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE65448.2025.00293"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588909"},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 1215\u20131218","author":"Vartak Manasi","unstructured":"Manasi Vartak, Venkatesh Raghavan, and Elke A. Rundensteiner. 2010. QRelX: Generating Meaningful Queries That Provide Cardinality Assurance. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 1215\u20131218."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3728953"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion58688.2023.00041"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3650212.3680392"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST60714.2024.00012"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534409"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417260"},{"key":"e_1_2_1_64_1","first-page":"4","article-title":"Testing Graph Database Systems via Graph-Aware Metamorphic Relations","volume":"17","author":"Zhuang Zeyang","year":"2024","unstructured":"Zeyang Zhuang, Penghui Li, Pingchuan Ma, Wei Meng, and Shuai Wang. 2024. Testing Graph Database Systems via Graph-Aware Metamorphic Relations. Proceedings of the VLDB Endowment (PVLDB) 17, 4 (mar 2024), 836\u2013848.","journal-title":"Proceedings of the VLDB Endowment (PVLDB)"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3734839.3734861","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:01:26Z","timestamp":1756483286000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3734839.3734861"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3]]},"references-count":64,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2025,3]]}},"alternative-id":["10.14778\/3734839.3734861"],"URL":"https:\/\/doi.org\/10.14778\/3734839.3734861","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2025,3]]},"assertion":[{"value":"2025-08-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}