{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:42:11Z","timestamp":1776811331078,"version":"3.51.2"},"reference-count":14,"publisher":"European Society of Computational Methods in Sciences and Engineering","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCM"],"published-print":{"date-parts":[[2021,1,19]]},"abstract":"<jats:p>Integer vulnerability is a common and hidden problem of software security. Even mature software written by experienced programmers cannot avoid integer vulnerability. Therefore, it is very important for testers to detect the bugs. However, testing the bugs will face the test oracle problem. As far as we know, the metamorphic testing can effectively alleviate the test oracle problem. In this paper, a method of combinational metamorphic relations (CMR) is proposed, which solves the test oracle problem and is more effective than metamorphic relation for Integer vulnerability detection. A case study results shows that the combinational metamorphic relations are more effective in bugs-detection than the single metamorphic relations.<\/jats:p>","DOI":"10.3233\/jcm-194105","type":"journal-article","created":{"date-parts":[[2020,2,18]],"date-time":"2020-02-18T12:49:24Z","timestamp":1582030164000},"page":"1053-1061","source":"Crossref","is-referenced-by-count":1,"title":["Combinational metamorphic testing in integer vulnerabilities detection"],"prefix":"10.66113","volume":"20","author":[{"given":"Yi","family":"Yao","sequence":"first","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing, Jiangsu, China"}]},{"given":"Jialuo","family":"Liu","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing, Jiangsu, China"}]},{"given":"Jing","family":"Zhu","sequence":"additional","affiliation":[{"name":"Command and Control Engineering College, Army Engineering University of PLA, Nanjing, Jiangsu, China"},{"name":"Navy Command College Training Management Department, China"}]},{"given":"Xiaodong","family":"Gu","sequence":"additional","affiliation":[{"name":"National Airspace Management Center, China"}]}],"member":"55691","reference":[{"issue":"3","key":"10.3233\/JCM-194105_ref1","doi-asserted-by":"crossref","first-page":"343","DOI":"10.3233\/IDT-180127","article-title":"A semi-supervised learning model for intrusion detection","volume":"13","author":"Jiang","year":"2019","journal-title":"Intelligent Decision Technologies"},{"issue":"1","key":"10.3233\/JCM-194105_ref2","doi-asserted-by":"crossref","first-page":"31","DOI":"10.3233\/ICA-170555","article-title":"Sebasti\u00e1n ventura: Mining association rules on big data through MapReduce genetic programming","volume":"25","author":"Padillo","year":"2018","journal-title":"Integrated Computer-Aided Engineering"},{"key":"10.3233\/JCM-194105_ref3","unstructured":"S. Christey and R.A. Martin, Vulnerability type distributions in CVE, http:\/\/cwe.mitre.org\/documents\/vuln-trends\/index.html, 2007."},{"issue":"5","key":"10.3233\/JCM-194105_ref5","doi-asserted-by":"crossref","first-page":"866","DOI":"10.1016\/j.infsof.2012.08.008","article-title":"Metamorphic slice: An application in spectrum-based fault localization","volume":"55","author":"Xie","year":"2013","journal-title":"Information and Software Technology"},{"key":"10.3233\/JCM-194105_ref6","unstructured":"J. Regehr, Finding compiler bugs by removing dead code. http:\/\/blog.regehr.org\/archives\/1161, 2014."},{"key":"10.3233\/JCM-194105_ref7","doi-asserted-by":"publisher","first-page":"4:1","DOI":"10.1145\/3143561","article-title":"Metamorphic testing: A review of challenges and opportunities","volume":"51","author":"Chen","journal-title":"ACM Computing Surveys"},{"key":"10.3233\/JCM-194105_ref8","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.jss.2015.07.037","article-title":"METRIC: METamorphic relation identification based on the category-choice framework","volume":"116","author":"Chen","year":"2016","journal-title":"Journal of Systems and Software"},{"key":"10.3233\/JCM-194105_ref9","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/QSIC.2012.10","article-title":"A new method for constructing metamorphic relations","author":"Liu","year":"2012","journal-title":"Proceedings of the 12th International Conference on Quality Software (QSIC\u00e2\u0080\u009912)"},{"key":"10.3233\/JCM-194105_ref10","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1109\/QSIC.2013.43","article-title":"On the correlation between the effectiveness of metamorphic relations and dissimilarities of test case executions","author":"Cao","year":"2013","journal-title":"Proceedings of the 13th International Conference on Quality Software (QSIC\u00e2\u0080\u009913)"},{"issue":"5","key":"10.3233\/JCM-194105_ref11","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/s11432-015-5314-x","article-title":"A revisit of three studies related to random testing","volume":"58","author":"Chen","year":"2015","journal-title":"Science China Information Sciences"},{"issue":"1","key":"10.3233\/JCM-194105_ref12","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TSE.2013.46","article-title":"How effectively does metamorphic testing alleviate the oracle problem","volume":"40","author":"Liu","year":"2014","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.3233\/JCM-194105_ref13","unstructured":"K.S. Mishra, G.E. Kaiser and S.K. Sheth, Effectiveness of teaching metamorphic testing, Part II. Technical Report CUCS-022-13. Department of Computer Science, 2013."},{"key":"10.3233\/JCM-194105_ref14","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1109\/QSIC.2012.10","article-title":"A new method for constructing metamorphic relations","author":"Liu","year":"2012","journal-title":"Proceedings of the 12th International Conference on Quality Software (QSIC 2012)"},{"key":"10.3233\/JCM-194105_ref15","first-page":"163","article-title":"Improving integer security for systems with KINT","author":"Wang","year":"2012","journal-title":"Proc. of the 10th USENIX Conf. on Operating Systems Design and Implementation (OSDI),"}],"container-title":["Journal of Computational Methods in Sciences and Engineering"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JCM-194105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T22:06:03Z","timestamp":1776809163000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JCM-194105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,19]]},"references-count":14,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.3233\/jcm-194105","relation":{},"ISSN":["1472-7978","1875-8983"],"issn-type":[{"value":"1472-7978","type":"print"},{"value":"1875-8983","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,19]]}}}