Detecting Isolation Anomalies in Relational DBMSs

Relational Database Management Systems (DBMSs) utilize transactions to ensure data consistency and integrity, while providing multiple isolation levels to strike a balance between consistency and performance. However, isolation anomalies in relational DBMSs can undermine their claimed isolation leve...

Full description

Saved in:
Bibliographic Details
Published in:Proceedings of the ACM on software engineering Vol. 2; no. ISSTA; pp. 1725 - 1747
Main Authors: Yang, Rui, Cui, Ziyu, Dou, Wensheng, Gao, Yu, Song, Jiansen, Xie, Xudong, Wei, Jun
Format: Journal Article
Language:English
Published: New York, NY, USA ACM 22.06.2025
Subjects:
ISSN:2994-970X, 2994-970X
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Relational Database Management Systems (DBMSs) utilize transactions to ensure data consistency and integrity, while providing multiple isolation levels to strike a balance between consistency and performance. However, isolation anomalies in relational DBMSs can undermine their claimed isolation levels, and lead to severe consequences, e.g., incorrect query results and database states. Existing isolation checkers can only work on simple key-value-like data models and the associated read(key) and write(key,value) operations. Therefore, they cannot be directly applied to relational DBMSs that support relational data models and complex SQL operations. In this paper, we propose a novel black-box Isolation checker for Relational DBMSs, IsoRel, which can support relational data models and complex SQL operations. To infer dependencies among transactions in relational DBMSs, we first design an isolation-agnostic SQL statement instrumentation approach to record the data rows accessed by each SQL statement by utilizing two auxiliary columns in each database table. We then utilize the recorded data rows of each SQL statement to construct a transaction dependency graph for relational transactions, and identify isolation anomalies based on anomaly patterns. We evaluate IsoRel on five widely-used relational DBMSs, i.e., MySQL, PostgreSQL, MariaDB, CockroachDB, and TiDB, and all their supported isolation levels. Our evaluation reveals a total of 48 unique isolation anomalies that violate the isolation levels defined by Adya.
AbstractList Relational Database Management Systems (DBMSs) utilize transactions to ensure data consistency and integrity, while providing multiple isolation levels to strike a balance between consistency and performance. However, isolation anomalies in relational DBMSs can undermine their claimed isolation levels, and lead to severe consequences, e.g., incorrect query results and database states. Existing isolation checkers can only work on simple key - value -like data models and the associated read ( key ) and write ( key , value ) operations. Therefore, they cannot be directly applied to relational DBMSs that support relational data models and complex SQL operations. In this paper, we propose a novel black-box Iso lation checker for Rel ational DBMSs , IsoRel, which can support relational data models and complex SQL operations. To infer dependencies among transactions in relational DBMSs, we first design an isolation-agnostic SQL statement instrumentation approach to record the data rows accessed by each SQL statement by utilizing two auxiliary columns in each database table. We then utilize the recorded data rows of each SQL statement to construct a transaction dependency graph for relational transactions, and identify isolation anomalies based on anomaly patterns. We evaluate IsoRel on five widely-used relational DBMSs, i.e., MySQL, PostgreSQL, MariaDB, CockroachDB, and TiDB, and all their supported isolation levels. Our evaluation reveals a total of 48 unique isolation anomalies that violate the isolation levels defined by Adya.
Relational Database Management Systems (DBMSs) utilize transactions to ensure data consistency and integrity, while providing multiple isolation levels to strike a balance between consistency and performance. However, isolation anomalies in relational DBMSs can undermine their claimed isolation levels, and lead to severe consequences, e.g., incorrect query results and database states. Existing isolation checkers can only work on simple key-value-like data models and the associated read(key) and write(key,value) operations. Therefore, they cannot be directly applied to relational DBMSs that support relational data models and complex SQL operations. In this paper, we propose a novel black-box Isolation checker for Relational DBMSs, IsoRel, which can support relational data models and complex SQL operations. To infer dependencies among transactions in relational DBMSs, we first design an isolation-agnostic SQL statement instrumentation approach to record the data rows accessed by each SQL statement by utilizing two auxiliary columns in each database table. We then utilize the recorded data rows of each SQL statement to construct a transaction dependency graph for relational transactions, and identify isolation anomalies based on anomaly patterns. We evaluate IsoRel on five widely-used relational DBMSs, i.e., MySQL, PostgreSQL, MariaDB, CockroachDB, and TiDB, and all their supported isolation levels. Our evaluation reveals a total of 48 unique isolation anomalies that violate the isolation levels defined by Adya.
ArticleNumber ISSTA076
Author Wei, Jun
Gao, Yu
Cui, Ziyu
Song, Jiansen
Yang, Rui
Dou, Wensheng
Xie, Xudong
Author_xml – sequence: 1
  givenname: Rui
  orcidid: 0009-0009-5428-2852
  surname: Yang
  fullname: Yang, Rui
  email: yangrui22@otcaix.iscas.ac.cn
  organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China
– sequence: 2
  givenname: Ziyu
  orcidid: 0009-0004-7462-194X
  surname: Cui
  fullname: Cui, Ziyu
  email: cuiziyu20@otcaix.iscas.ac.cn
  organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China
– sequence: 3
  givenname: Wensheng
  orcidid: 0000-0002-3323-0449
  surname: Dou
  fullname: Dou, Wensheng
  email: wsdou@otcaix.iscas.ac.cn
  organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China
– sequence: 4
  givenname: Yu
  orcidid: 0009-0009-8312-6736
  surname: Gao
  fullname: Gao, Yu
  email: gaoyu15@otcaix.iscas.ac.cn
  organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China
– sequence: 5
  givenname: Jiansen
  orcidid: 0009-0003-0401-2033
  surname: Song
  fullname: Song, Jiansen
  email: songjiansen20@otcaix.iscas.ac.cn
  organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China
– sequence: 6
  givenname: Xudong
  orcidid: 0009-0003-3367-5995
  surname: Xie
  fullname: Xie, Xudong
  email: xiexudong23@otcaix.iscas.ac.cn
  organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China
– sequence: 7
  givenname: Jun
  orcidid: 0000-0002-8561-2481
  surname: Wei
  fullname: Wei, Jun
  email: wj@otcaix.iscas.ac.cn
  organization: Institute of Software Chinese Academy of Sciences, Beijing, China, University of Chinese Academy of Sciences, Beijing, China
BookMark eNptj0tLxDAUhYOM4DgO7l1156p6kzZNshxnfAyMCD7AXbl5SaRNpenGf-9oRxFxdS7nfhzOOSST2EVHyDGFM0pLfl4IJhUv9siUKVXmSsDz5Nd9QOYpvQLA1qFUwJTQlRucGUJ8ydapa3AIXcwWsWuxCS5lIWb3bnSxyVYXtw_piOx7bJKb73RGnq4uH5c3-ebuer1cbHKkjBU5lVJaq7zmAiQYWSnPKivQOodelM5rXSEwbUttLXCubcGwkkoL4yh4XszI6Zhr-i6l3vn6rQ8t9u81hfpzbL0buyXzP6QJw1fnocfQ_MOfjDya9if0-_kBzO1e4A
CitedBy_id crossref_primary_10_14778_3734839_3734861
crossref_primary_10_14778_3742728_3742747
Cites_doi 10.14778/3583140.3583145
10.1145/507338.507354
10.1145/289.291
10.1137/0201010
10.14778/3659437.3659445
10.14778/3430915.3430918
10.5555/573304
10.1145/3533767.3534409
10.14778/2732232.2732237
10.1109/ICDE.2000.839388
10.1145/362384.362685
10.1145/1247480.1247520
10.1145/3368089.3409710
10.1145/3428279
10.1109/TKDE.2006.190
10.1145/3360591
ContentType Journal Article
Copyright Owner/Author
Copyright_xml – notice: Owner/Author
DBID AAYXX
CITATION
DOI 10.1145/3728953
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList CrossRef

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2994-970X
EndPage 1747
ExternalDocumentID 10_1145_3728953
3728953
GroupedDBID AAKMM
ACM
AEJOY
AKRVB
ALMA_UNASSIGNED_HOLDINGS
LHSKQ
M~E
AAYXX
CITATION
ID FETCH-LOGICAL-a1223-1888dd9fb57080c869f26d7adeeaf74efbb6a02bd4bdd055bd32a689b7ce10f53
ISSN 2994-970X
IngestDate Sat Nov 29 07:43:49 EST 2025
Tue Nov 18 22:04:26 EST 2025
Mon Jul 14 20:48:58 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue ISSTA
Keywords isolation level
Database transaction
isolation anomaly
Language English
License This work is licensed under Creative Commons Attribution International 4.0.
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-a1223-1888dd9fb57080c869f26d7adeeaf74efbb6a02bd4bdd055bd32a689b7ce10f53
ORCID 0009-0009-8312-6736
0009-0003-0401-2033
0000-0002-3323-0449
0009-0004-7462-194X
0009-0003-3367-5995
0000-0002-8561-2481
0009-0009-5428-2852
OpenAccessLink https://dl.acm.org/doi/10.1145/3728953
PageCount 23
ParticipantIDs crossref_primary_10_1145_3728953
crossref_citationtrail_10_1145_3728953
acm_primary_3728953
PublicationCentury 2000
PublicationDate 20250622
2025-06-22
PublicationDateYYYYMMDD 2025-06-22
PublicationDate_xml – month: 06
  year: 2025
  text: 20250622
  day: 22
PublicationDecade 2020
PublicationPlace New York, NY, USA
PublicationPlace_xml – name: New York, NY, USA
PublicationTitle Proceedings of the ACM on software engineering
PublicationTitleAbbrev ACM PACMSE
PublicationYear 2025
Publisher ACM
Publisher_xml – name: ACM
References Lucas Brutschy, Dimitar Dimitrov, Peter Müller, and Martin Vechev. 2017. Serializability for Eventual Consistency: Criterion, Analysis, and Applications. In Proceedings of ACM SIGPLAN Symposium on Principles of Programming Languages (POPL). 458–472.
Manuel Rigger and Zhendong Su. 2020. Testing Database Engines via Pivoted Query Synthesis. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 667–682.
Donald R. Slutz. 1998. Massive Stochastic Testing of SQL. In Proceedings of International Conference on Very Large Data Bases (VLDB). 618–622.
Kyle Kingsbury and Peter Alvaro. 2020. Elle: Inferring Isolation Anomalies from Experimental Observations. In Proceedings of the VLDB Endowment (VLDB). 14, 268–280.
Yingying Zheng, Wensheng Dou, Lei Tang, Ziyu Cui, Yu Gao, Jiansen Song, Liang Xu, Jiaxin Zhu, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2024. Testing Gremlin-Based Graph Database Systems via Query Disassembling. In Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 1695–1707.
Nicolas Bruno, Surajit Chaudhuri, and Dilys Thomas. 2006. Generating Queries with Cardinality Constraints for DBMS Testing. IEEE Transactions on Knowledge and Data Engineering (TKDE), 18, 12 (2006), 1721–1725.
2024. PostgreSQL 12.3. https://jepsen.io/analyses/postgresql-12.3?file=postgresql-12.3
Carsten Binnig, Donald Kossmann, Eric Lo, and M. Tamer Özsu. 2007. QAGen: Generating Query-Aware Test Databases. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 341–352.
Nicolas Bruno and Surajit Chaudhuri. 2005. Flexible Database Generators. In Proceedings of International Conference on Very Large Data Bases (VLDB). 1097–1107.
Philip M Lewis, Arthur Bernstein, and Michael Kifer. 2002. Databases and Transaction Processing: An Application-Oriented Approach. ACM SIGMOD Record, 31, 1 (2002), 74–75.
Ziyu Cui, Wensheng Dou, Qianwang Dai, Jiansen Song, Wei Wang, Jun Wei, and Dan Ye. 2022. Differentially Testing Database Transactions for Fun and Profit. In Proceedings of IEEE/ACM International Conference on Automated Software Engineering (ASE). 35:1–35:12.
Yingying Zheng, Wensheng Dou, Lei Tang, Ziyu Cui, Jiansen Song, Ziyue Cheng, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2024. Differential Optimization Testing of Gremlin-Based Graph Database Systems. In Proceedings of IEEE International Conference on Software Testing, Verification and Validation (ICST). 25–36.
Atul Adya, Barbara Liskov, and Patrick O’Neil. 2000. Generalized Isolation Level Definitions. In Proceedings of International Conference on Data Engineering (ICDE). 67–78.
Robert Tarjan. 1972. Depth-First Search and Linear Graph Algorithms. SIAM J. Comput., 1, 2 (1972), 146–160.
Zu-Ming Jiang, Si Liu, Manuel Rigger, and Zhendong Su. 2023. Detecting Transactional Bugs in Database Engines via Graph-Based Oracle Construction. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 397–417.
2024. MySQL 8.0.34. https://jepsen.io/analyses/mysql-8.0.34?file=mysql-8.0.34
2024. CockroachDB. https://www.cockroachlabs.com
Keqiang Li, Siyang Weng, Peiyuan Liu, Lyu Ni, Chengcheng Yang, Rong Zhang, Xuan Zhou, Jianghang Lou, Gui Huang, Weining Qian, and Aoying Zhou. 2023. Leopard: A Black-Box Approach for Efficiently Verifying Various Isolation Levels. In Proceedings of IEEE International Conference on Data Engineering (ICDE). 722–735.
Andrea Cerone, Giovanni Bernardi, and Alexey Gotsman. 2015. A Framework for Transactional Consistency Models with Atomic Visibility. In Proceedings of International Conference on Concurrency Theory (CONCUR). 58–71.
Jim Gray and Andreas Reuter. 1992. Transaction Processing: Concepts and Techniques. Elsevier.
Qiuyang Mang, Aoyang Fang, Boxi Yu, Hanfei Chen, and Pinjia He. 2024. Testing Graph Database Systems via Equivalent Query Rewriting. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). Article 143, 12 pages.
Shadi Abdul Khalek, Bassem Elkarablieh, Yai O Laleye, and Sarfraz Khurshid. 2008. Query-Aware Test Generation Using a Relational Constraint Solver. In Proceedings of IEEE/ACM International Conference on Automated Software Engineering (ASE). 238–247.
Hal Berenson, Phil Bernstein, Jim Gray, Jim Melton, Elizabeth O’Neil, and Patrick O’Neil. 1995. A Critique of ANSI SQL Isolation Levels. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 1–10.
Wensheng Dou, Ziyu Cui, Qianwang Dai, Jiansen Song, Dong Wang, Yu Gao, Wei Wang, Jun Wei, Lei Chen, Hanmo Wang, Hua Zhong, and Tao Huang. 2023. Detecting Isolation Bugs via Transaction Oracle Construction. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 1123–1135.
Jiansen Song, Wensheng Dou, Ziyu Cui, Qianwang Dai, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2023. Testing Database Systems via Differential Query Execution. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 2072–2084.
Peter Bailis, Aaron Davidson, Alan Fekete, Ali Ghodsi, Joseph M. Hellerstein, and Ion Stoica. 2013. Highly Available Transactions: Virtues and Limitations. Proceedings of the VLDB Endowment (VLDB), 7, 3 (2013), 181–192.
Edgar F. Codd. 1970. A Relational Model of Data for Large Shared Data Banks. Commun. ACM, 13, 6 (1970), 377–387.
Cheng Tan, Changgeng Zhao, Shuai Mu, and Michael Walfish. 2020. Cobra: Making Transactional Key-Value Stores Verifiably Serializable. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 63–80.
2024. TiDB 2.1.7. https://jepsen.io/analyses/tidb-2.1.7?file=tidb-2.1.7
Jiansen Song, Wensheng Dou, Yu Gao, Ziyu Cui, Yingying Zheng, Dong Wang, Wei Wang, Jun Wei, and Tao Huang. 2024. Detecting Metadata-Related Logic Bugs in Database Systems via Raw Database Construction. Proceedings of the VLDB Endowment (VLDB), 17, 8 (2024), 1884–1897.
Ranadeep Biswas and Constantin Enea. 2019. On the Complexity of Checking Transactional Consistency. In Proceedings of ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA). 165:1–165:28.
Haixiang Li, Xiaoyan Li, Chang Liu, Xiaoyong Du, Wei Lu, and Anqun Pan. 2021. Systematic Definition and Classification of Data Anomalies in DBMS. Journal of Software, 33, 3 (2021), 909–930.
Jinsheng Ba and Manuel Rigger. 2023. Testing Database Engines via Query Plan Guidance. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 2060–2071.
Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland H. C. Yap, Zhenkai Liang, and Manuel Rigger. 2024. Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). Article 46, 12 pages.
Philip A Bernstein, Vassos Hadzilacos, and Nathan Goodman. 1987. Concurrency Control and Recovery in Database Systems. Addison-Wesley Longman Publishing Co., Inc..
Theo Haerder and Andreas Reuter. 1983. Principles of Transaction-Oriented Database Recovery. ACM Computing Surveys (CSUR), 15, 4 (1983), 287–317.
Manuel Rigger and Zhendong Su. 2020. Finding Bugs in Database Systems via Query Partitioning. Proceedings of the ACM on Programming Languages, 4, OOPSLA (2020), 211:1–211:30.
Jack Clark, Alastair F Donaldson, John Wickerson, and Manuel Rigger. 2024. Validating Database System Isolation Level Implementations with Version Certificate Recovery. In Proceedings of European Conference on Computer Systems (EuroSys). 754–768.
Jim Gray, Prakash Sundaresan, Susanne Englert, Ken Baclawski, and Peter J. Weinberger. 1994. Quickly Generating Billion-Record Synthetic Databases. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 243–252.
Kaile Huang, Si Liu, Zhenge Chen, Hengfeng Wei, David Basin, Haixiang Li, and Anqun Pan. 2023. Efficient Black-box Checking of Snapshot Isolation in Databases. Proceedings of the VLDB Endowment (VLDB), 16, 6 (2023), 1264–1276.
Rui Yang, Yingying Zheng, Lei Tang, Wensheng Dou, Wei Wang, and Jun Wei. 2023. Randomized Differential Testing of RDF Stores. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE Demo). 136–140.
2024. MySQL. https://www.mysql.com
2024. SQLancer. https://www.manuelrigger.at/dbms-bugs
Jiansen Song, Wensheng Dou, Yingying Zheng, Yu Gao, Ziyu Cui, Wei Wang, and Jun Wei. 2025. Detecting Schema-Related Logic Bugs in Relational DBMSs via Equivalent Database Construction. Proceedings of the VLDB Endowment (VLDB).
2023. go-randgen. https://github.com/pingcap/go-randgen
2024. MariaDB. https://mariadb.org
2024. The ANSI Isolation Levels. http://www.adp-gmbh.ch/ora/misc/isolation_level.html
2024. PostgreSQL. https://www.postgresql.org
2024. GitHub. https://github.com
Lei Tang, Wensheng Dou, Yingying Zheng, Lijie Xu, Wei Wang, Jun Wei, and Tao Huang. 2025. Proving Cypher Query Equivalence. In Proceedings of IEEE International Conference on Data Engineering (ICDE).
Jian Zhang, Ye Ji, Shuai Mu, and Cheng Tan. 2023. Viper: A Fast Snapshot Isolation Checker. In Proceedings of European Conference on Computer Systems (EuroSys). 654–671.
2024. Jepsen. https://github.com/jepsen-io/jepsen
Peter Bailis, Alan Fekete, Ali Ghodsi, Joseph M. Hellerstein, and Ion Stoica. 2016. Scalable Atomic Visibility with RAMP Transactions. ACM Transactions on Database Systems (TODS), 41, 3 (2016), 15:1–15:45.
Donald D. Chamberlin and Raymond F. Boyce. 1974. SEQUEL: A Structured English Query Language. In Proceedings of ACM SIGFIDET Workshop on Data Description, Access and Control (SIGFIDET). 249–264.
Manuel Rigger and Zhendong Su. 2020. Detecting Optimization Bugs in Database Engines via Non-Optimizing Reference Engine Construction. In Proceedings of ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). 1140–1152.
Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, and Dinghao Wu. 2020. SQUI
Jiang Yuancheng (e_1_2_1_43_1)
Gray Jim (e_1_2_1_38_1)
e_1_2_1_60_1
Zhang Jian (e_1_2_1_62_1) 2023
Khalek Shadi Abdul (e_1_2_1_45_1) 2008
Yang Rui (e_1_2_1_61_1) 2023
Bruno Nicolas (e_1_2_1_25_1) 2005
Cerone Andrea (e_1_2_1_28_1) 2015
Gray Jim (e_1_2_1_36_1) 1981
e_1_2_1_24_1
Slutz Donald R. (e_1_2_1_54_1) 1998
Tan Cheng (e_1_2_1_58_1) 2020
e_1_2_1_26_1
Cui Ziyu (e_1_2_1_32_1) 2022
Zheng Yingying (e_1_2_1_64_1) 2024
Brutschy Lucas (e_1_2_1_27_1) 2017
Clark Jack (e_1_2_1_30_1) 2024
Adya Atul (e_1_2_1_16_1) 1999
Donald (e_1_2_1_29_1)
e_1_2_1_31_1
Zhong Rui (e_1_2_1_66_1) 2020
e_1_2_1_8_1
e_1_2_1_56_1
e_1_2_1_6_1
e_1_2_1_12_1
e_1_2_1_4_1
e_1_2_1_10_1
e_1_2_1_52_1
e_1_2_1_2_1
e_1_2_1_39_1
Berenson Hal (e_1_2_1_21_1) 1995
e_1_2_1_14_1
e_1_2_1_37_1
Jiang Zu-Ming (e_1_2_1_44_1) 2023
Hua Ziyue (e_1_2_1_41_1) 2023
e_1_2_1_42_1
e_1_2_1_65_1
Bailis Peter (e_1_2_1_20_1) 2016; 41
e_1_2_1_23_1
Cui Ziyu (e_1_2_1_33_1) 2024
Rigger Manuel (e_1_2_1_53_1) 2020
Kingsbury Kyle (e_1_2_1_46_1) 2020; 14
Bernstein Philip A (e_1_2_1_22_1)
Bailis Peter (e_1_2_1_19_1) 2013; 7
Lewis Philip M (e_1_2_1_47_1) 2002; 31
Ba Jinsheng (e_1_2_1_18_1) 2023
Zheng Yingying (e_1_2_1_63_1) 2024
Li Haixiang (e_1_2_1_48_1) 2021; 33
Li Keqiang (e_1_2_1_49_1) 2023
Kenneth Houkjæ (e_1_2_1_40_1) 2006
Cui Ziyu (e_1_2_1_34_1) 2025
Tang Lei (e_1_2_1_59_1) 2025
e_1_2_1_7_1
Song Jiansen (e_1_2_1_57_1) 2025
e_1_2_1_5_1
Mang Qiuyang (e_1_2_1_50_1) 2024
e_1_2_1_3_1
e_1_2_1_13_1
e_1_2_1_51_1
e_1_2_1_1_1
e_1_2_1_11_1
Dou Wensheng (e_1_2_1_35_1) 2023
e_1_2_1_17_1
e_1_2_1_15_1
Song Jiansen (e_1_2_1_55_1) 2023
e_1_2_1_9_1
References_xml – reference: Haixiang Li, Xiaoyan Li, Chang Liu, Xiaoyong Du, Wei Lu, and Anqun Pan. 2021. Systematic Definition and Classification of Data Anomalies in DBMS. Journal of Software, 33, 3 (2021), 909–930.
– reference: Jian Zhang, Ye Ji, Shuai Mu, and Cheng Tan. 2023. Viper: A Fast Snapshot Isolation Checker. In Proceedings of European Conference on Computer Systems (EuroSys). 654–671.
– reference: 2023. go-randgen. https://github.com/pingcap/go-randgen
– reference: Peter Bailis, Alan Fekete, Ali Ghodsi, Joseph M. Hellerstein, and Ion Stoica. 2016. Scalable Atomic Visibility with RAMP Transactions. ACM Transactions on Database Systems (TODS), 41, 3 (2016), 15:1–15:45.
– reference: 2024. DB-Engines. https://db-engines.com/en/ranking
– reference: Ranadeep Biswas and Constantin Enea. 2019. On the Complexity of Checking Transactional Consistency. In Proceedings of ACM SIGPLAN Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA). 165:1–165:28.
– reference: Jiansen Song, Wensheng Dou, Ziyu Cui, Qianwang Dai, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2023. Testing Database Systems via Differential Query Execution. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 2072–2084.
– reference: Hal Berenson, Phil Bernstein, Jim Gray, Jim Melton, Elizabeth O’Neil, and Patrick O’Neil. 1995. A Critique of ANSI SQL Isolation Levels. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 1–10.
– reference: Andrea Cerone, Giovanni Bernardi, and Alexey Gotsman. 2015. A Framework for Transactional Consistency Models with Atomic Visibility. In Proceedings of International Conference on Concurrency Theory (CONCUR). 58–71.
– reference: Jim Gray. 1981. The Transaction Concept: Virtues and Limitations. In Proceedings of International Conference on Very Large Data Bases (VLDB). 144–154.
– reference: Robert Tarjan. 1972. Depth-First Search and Linear Graph Algorithms. SIAM J. Comput., 1, 2 (1972), 146–160.
– reference: Donald R. Slutz. 1998. Massive Stochastic Testing of SQL. In Proceedings of International Conference on Very Large Data Bases (VLDB). 618–622.
– reference: Edgar F. Codd. 1970. A Relational Model of Data for Large Shared Data Banks. Commun. ACM, 13, 6 (1970), 377–387.
– reference: Yingying Zheng, Wensheng Dou, Lei Tang, Ziyu Cui, Yu Gao, Jiansen Song, Liang Xu, Jiaxin Zhu, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2024. Testing Gremlin-Based Graph Database Systems via Query Disassembling. In Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 1695–1707.
– reference: 2024. MySQL 8.0.34. https://jepsen.io/analyses/mysql-8.0.34?file=mysql-8.0.34
– reference: Ziyu Cui, Wensheng Dou, Qianwang Dai, Jiansen Song, Wei Wang, Jun Wei, and Dan Ye. 2022. Differentially Testing Database Transactions for Fun and Profit. In Proceedings of IEEE/ACM International Conference on Automated Software Engineering (ASE). 35:1–35:12.
– reference: Ziyue Hua, Wei Lin, Luyao Ren, Zongyang Li, Lu Zhang, Wenpin Jiao, and Tao Xie. 2023. GDsmith: Detecting Bugs in Cypher Graph Database Engines. In Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 163–174.
– reference: Kenneth Houkjæ r, Kristian Torp, and Rico Wind. 2006. Simple and Realistic Data Generation. In Proceedings of International Conference on Very Large Data Bases (VLDB). 1243–1246.
– reference: Manuel Rigger and Zhendong Su. 2020. Testing Database Engines via Pivoted Query Synthesis. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 667–682.
– reference: Donald D. Chamberlin and Raymond F. Boyce. 1974. SEQUEL: A Structured English Query Language. In Proceedings of ACM SIGFIDET Workshop on Data Description, Access and Control (SIGFIDET). 249–264.
– reference: Cheng Tan, Changgeng Zhao, Shuai Mu, and Michael Walfish. 2020. Cobra: Making Transactional Key-Value Stores Verifiably Serializable. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 63–80.
– reference: Jiansen Song, Wensheng Dou, Yu Gao, Ziyu Cui, Yingying Zheng, Dong Wang, Wei Wang, Jun Wei, and Tao Huang. 2024. Detecting Metadata-Related Logic Bugs in Database Systems via Raw Database Construction. Proceedings of the VLDB Endowment (VLDB), 17, 8 (2024), 1884–1897.
– reference: 2024. Jepsen. https://github.com/jepsen-io/jepsen
– reference: 2024. SQLsmith. https://jepsen.io
– reference: Jim Gray, Prakash Sundaresan, Susanne Englert, Ken Baclawski, and Peter J. Weinberger. 1994. Quickly Generating Billion-Record Synthetic Databases. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 243–252.
– reference: 2024. The ANSI Isolation Levels. http://www.adp-gmbh.ch/ora/misc/isolation_level.html
– reference: Kyle Kingsbury and Peter Alvaro. 2020. Elle: Inferring Isolation Anomalies from Experimental Observations. In Proceedings of the VLDB Endowment (VLDB). 14, 268–280.
– reference: Atul Adya, Barbara Liskov, and Patrick O’Neil. 2000. Generalized Isolation Level Definitions. In Proceedings of International Conference on Data Engineering (ICDE). 67–78.
– reference: 2024. PostgreSQL. https://www.postgresql.org
– reference: Jack Clark, Alastair F Donaldson, John Wickerson, and Manuel Rigger. 2024. Validating Database System Isolation Level Implementations with Version Certificate Recovery. In Proceedings of European Conference on Computer Systems (EuroSys). 754–768.
– reference: Theo Haerder and Andreas Reuter. 1983. Principles of Transaction-Oriented Database Recovery. ACM Computing Surveys (CSUR), 15, 4 (1983), 287–317.
– reference: 2024. MariaDB. https://mariadb.org
– reference: Jinsheng Ba and Manuel Rigger. 2023. Testing Database Engines via Query Plan Guidance. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 2060–2071.
– reference: Peter Bailis, Aaron Davidson, Alan Fekete, Ali Ghodsi, Joseph M. Hellerstein, and Ion Stoica. 2013. Highly Available Transactions: Virtues and Limitations. Proceedings of the VLDB Endowment (VLDB), 7, 3 (2013), 181–192.
– reference: Atul Adya. 1999. Weak Consistency: A Generalized Theory and Optimistic Implementations for Distributed Transactions. Ph. D. Dissertation. Massachusetts Institute of Technology.
– reference: 2024. CockroachDB. https://www.cockroachlabs.com
– reference: 2024. SQLancer. https://www.manuelrigger.at/dbms-bugs
– reference: Kaile Huang, Si Liu, Zhenge Chen, Hengfeng Wei, David Basin, Haixiang Li, and Anqun Pan. 2023. Efficient Black-box Checking of Snapshot Isolation in Databases. Proceedings of the VLDB Endowment (VLDB), 16, 6 (2023), 1264–1276.
– reference: Ziyu Cui, Wensheng Dou, Yu Gao, Rui Yang, Yingying Zheng, Jiansen Song, Yuan Feng, and Jun Wei. 2025. Simple Testing Can Expose Most Critical Transaction Bugs: Understanding and Detecting Write-Specific Serializability Violations in Database Systems. Proceedings of the VLDB Endowment (VLDB).
– reference: Wensheng Dou, Ziyu Cui, Qianwang Dai, Jiansen Song, Dong Wang, Yu Gao, Wei Wang, Jun Wei, Lei Chen, Hanmo Wang, Hua Zhong, and Tao Huang. 2023. Detecting Isolation Bugs via Transaction Oracle Construction. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 1123–1135.
– reference: Zu-Ming Jiang, Si Liu, Manuel Rigger, and Zhendong Su. 2023. Detecting Transactional Bugs in Database Engines via Graph-Based Oracle Construction. In Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 397–417.
– reference: Lei Tang, Wensheng Dou, Yingying Zheng, Lijie Xu, Wei Wang, Jun Wei, and Tao Huang. 2025. Proving Cypher Query Equivalence. In Proceedings of IEEE International Conference on Data Engineering (ICDE).
– reference: Yuancheng Jiang, Jiahao Liu, Jinsheng Ba, Roland H. C. Yap, Zhenkai Liang, and Manuel Rigger. 2024. Detecting Logic Bugs in Graph Database Management Systems via Injective and Surjective Graph Query Transformation. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). Article 46, 12 pages.
– reference: Qiuyang Mang, Aoyang Fang, Boxi Yu, Hanfei Chen, and Pinjia He. 2024. Testing Graph Database Systems via Equivalent Query Rewriting. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). Article 143, 12 pages.
– reference: Manuel Rigger and Zhendong Su. 2020. Detecting Optimization Bugs in Database Engines via Non-Optimizing Reference Engine Construction. In Proceedings of ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE). 1140–1152.
– reference: Jiansen Song, Wensheng Dou, Yingying Zheng, Yu Gao, Ziyu Cui, Wei Wang, and Jun Wei. 2025. Detecting Schema-Related Logic Bugs in Relational DBMSs via Equivalent Database Construction. Proceedings of the VLDB Endowment (VLDB).
– reference: Lucas Brutschy, Dimitar Dimitrov, Peter Müller, and Martin Vechev. 2017. Serializability for Eventual Consistency: Criterion, Analysis, and Applications. In Proceedings of ACM SIGPLAN Symposium on Principles of Programming Languages (POPL). 458–472.
– reference: Manuel Rigger and Zhendong Su. 2020. Finding Bugs in Database Systems via Query Partitioning. Proceedings of the ACM on Programming Languages, 4, OOPSLA (2020), 211:1–211:30.
– reference: Shadi Abdul Khalek, Bassem Elkarablieh, Yai O Laleye, and Sarfraz Khurshid. 2008. Query-Aware Test Generation Using a Relational Constraint Solver. In Proceedings of IEEE/ACM International Conference on Automated Software Engineering (ASE). 238–247.
– reference: 2024. PostgreSQL 12.3. https://jepsen.io/analyses/postgresql-12.3?file=postgresql-12.3
– reference: Nicolas Bruno and Surajit Chaudhuri. 2005. Flexible Database Generators. In Proceedings of International Conference on Very Large Data Bases (VLDB). 1097–1107.
– reference: Keqiang Li, Siyang Weng, Peiyuan Liu, Lyu Ni, Chengcheng Yang, Rong Zhang, Xuan Zhou, Jianghang Lou, Gui Huang, Weining Qian, and Aoying Zhou. 2023. Leopard: A Black-Box Approach for Efficiently Verifying Various Isolation Levels. In Proceedings of IEEE International Conference on Data Engineering (ICDE). 722–735.
– reference: Jim Gray and Andreas Reuter. 1992. Transaction Processing: Concepts and Techniques. Elsevier.
– reference: Carsten Binnig, Donald Kossmann, Eric Lo, and M. Tamer Özsu. 2007. QAGen: Generating Query-Aware Test Databases. In Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 341–352.
– reference: Yingying Zheng, Wensheng Dou, Lei Tang, Ziyu Cui, Jiansen Song, Ziyue Cheng, Wei Wang, Jun Wei, Hua Zhong, and Tao Huang. 2024. Differential Optimization Testing of Gremlin-Based Graph Database Systems. In Proceedings of IEEE International Conference on Software Testing, Verification and Validation (ICST). 25–36.
– reference: Philip A Bernstein, Vassos Hadzilacos, and Nathan Goodman. 1987. Concurrency Control and Recovery in Database Systems. Addison-Wesley Longman Publishing Co., Inc..
– reference: Rui Zhong, Yongheng Chen, Hong Hu, Hangfan Zhang, Wenke Lee, and Dinghao Wu. 2020. SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback. In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS). 58–71.
– reference: Yingying Zheng, Wensheng Dou, Yicheng Wang, Zheng Qin, Lei Tang, Yu Gao, Dong Wang, Wei Wang, and Jun Wei. 2022. Finding Bugs in Gremlin-Based Graph Database Systems via Randomized Differential Testing. In Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 302–313.
– reference: Rui Yang, Yingying Zheng, Lei Tang, Wensheng Dou, Wei Wang, and Jun Wei. 2023. Randomized Differential Testing of RDF Stores. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE Demo). 136–140.
– reference: 2024. TiDB 2.1.7. https://jepsen.io/analyses/tidb-2.1.7?file=tidb-2.1.7
– reference: 2024. MySQL. https://www.mysql.com
– reference: Nicolas Bruno, Surajit Chaudhuri, and Dilys Thomas. 2006. Generating Queries with Cardinality Constraints for DBMS Testing. IEEE Transactions on Knowledge and Data Engineering (TKDE), 18, 12 (2006), 1721–1725.
– reference: 2024. GitHub. https://github.com
– reference: Philip M Lewis, Arthur Bernstein, and Michael Kifer. 2002. Databases and Transaction Processing: An Application-Oriented Approach. ACM SIGMOD Record, 31, 1 (2002), 74–75.
– reference: 2024. TiDB, PingCAP. https://pingcap.com
– reference: Ziyu Cui, Wensheng Dou, Yu Gao, Dong Wang, Jiansen Song, Yingying Zheng, Tao Wang, Rui Yang, Kang Xu, Yixin Hu, Jun Wei, and Tao Huang. 2024. Understanding Transaction Bugs in Database Systems. In Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 163:1–163:13.
– ident: e_1_2_1_42_1
  doi: 10.14778/3583140.3583145
– volume-title: Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS). 58–71
  year: 2020
  ident: e_1_2_1_66_1
– volume-title: Proceedings of International Conference on Very Large Data Bases (VLDB). 1243–1246
  year: 2006
  ident: e_1_2_1_40_1
– volume-title: Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 667–682
  year: 2020
  ident: e_1_2_1_53_1
– volume: 31
  start-page: 74
  year: 2002
  ident: e_1_2_1_47_1
  article-title: Databases and Transaction Processing: An Application-Oriented Approach
  publication-title: ACM SIGMOD Record
  doi: 10.1145/507338.507354
– volume-title: Proceedings of the VLDB Endowment (VLDB).
  year: 2025
  ident: e_1_2_1_34_1
– volume-title: Proceedings of the VLDB Endowment (VLDB).
  year: 2025
  ident: e_1_2_1_57_1
– volume-title: Proceedings of International Conference on Very Large Data Bases (VLDB). 618–622
  year: 1998
  ident: e_1_2_1_54_1
– volume-title: Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 163–174
  year: 2023
  ident: e_1_2_1_41_1
– volume-title: Concurrency Control and Recovery in Database Systems
  ident: e_1_2_1_22_1
– volume-title: Proceedings of IEEE/ACM International Conference on Automated Software Engineering (ASE). 35:1–35:12
  year: 2022
  ident: e_1_2_1_32_1
– volume-title: Proceedings of ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA). 1695–1707
  year: 2024
  ident: e_1_2_1_63_1
– ident: e_1_2_1_12_1
– ident: e_1_2_1_4_1
– volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). Article 143
  year: 2024
  ident: e_1_2_1_50_1
– ident: e_1_2_1_39_1
  doi: 10.1145/289.291
– volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 2072–2084
  year: 2023
  ident: e_1_2_1_55_1
– ident: e_1_2_1_60_1
  doi: 10.1137/0201010
– volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE Demo). 136–140
  year: 2023
  ident: e_1_2_1_61_1
– ident: e_1_2_1_56_1
  doi: 10.14778/3659437.3659445
– volume-title: Proceedings of IEEE/ACM International Conference on Automated Software Engineering (ASE). 238–247
  year: 2008
  ident: e_1_2_1_45_1
– ident: e_1_2_1_8_1
– volume-title: Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 1–10
  year: 1995
  ident: e_1_2_1_21_1
– volume: 14
  start-page: 268
  year: 2020
  ident: e_1_2_1_46_1
  article-title: Elle: Inferring Isolation Anomalies from Experimental Observations
  publication-title: Proceedings of the VLDB Endowment (VLDB).
  doi: 10.14778/3430915.3430918
– ident: e_1_2_1_2_1
– volume-title: Proceedings of International Conference on Very Large Data Bases (VLDB). 144–154
  year: 1981
  ident: e_1_2_1_36_1
– ident: e_1_2_1_5_1
– volume-title: Proceedings of ACM SIGMOD International Conference on Management of Data (SIGMOD). 243–252
  ident: e_1_2_1_38_1
– volume-title: Proceedings of European Conference on Computer Systems (EuroSys). 754–768
  year: 2024
  ident: e_1_2_1_30_1
– ident: e_1_2_1_37_1
  doi: 10.5555/573304
– ident: e_1_2_1_13_1
– ident: e_1_2_1_65_1
  doi: 10.1145/3533767.3534409
– ident: e_1_2_1_10_1
– volume-title: Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 397–417
  year: 2023
  ident: e_1_2_1_44_1
– volume-title: Proceedings of International Conference on Very Large Data Bases (VLDB). 1097–1107
  year: 2005
  ident: e_1_2_1_25_1
– volume: 7
  start-page: 181
  year: 2013
  ident: e_1_2_1_19_1
  article-title: Highly Available Transactions: Virtues and Limitations
  publication-title: Proceedings of the VLDB Endowment (VLDB)
  doi: 10.14778/2732232.2732237
– ident: e_1_2_1_17_1
  doi: 10.1109/ICDE.2000.839388
– ident: e_1_2_1_31_1
  doi: 10.1145/362384.362685
– ident: e_1_2_1_7_1
– year: 1999
  ident: e_1_2_1_16_1
  article-title: Weak Consistency: A Generalized Theory and Optimistic Implementations for Distributed
  publication-title: Transactions. Ph. D. Dissertation. Massachusetts Institute of Technology.
– ident: e_1_2_1_23_1
  doi: 10.1145/1247480.1247520
– volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). Article 46
  ident: e_1_2_1_43_1
– volume: 41
  year: 2016
  ident: e_1_2_1_20_1
  article-title: Scalable Atomic Visibility with RAMP Transactions
  publication-title: ACM Transactions on Database Systems (TODS)
– volume: 33
  start-page: 909
  year: 2021
  ident: e_1_2_1_48_1
  article-title: Systematic Definition and Classification of Data Anomalies in DBMS
  publication-title: Journal of Software
– volume-title: Proceedings of IEEE International Conference on Data Engineering (ICDE). 722–735
  year: 2023
  ident: e_1_2_1_49_1
– ident: e_1_2_1_51_1
  doi: 10.1145/3368089.3409710
– ident: e_1_2_1_1_1
– volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 2060–2071
  year: 2023
  ident: e_1_2_1_18_1
– volume-title: Proceedings of USENIX Symposium on Operating Systems Design and Implementation (OSDI). 63–80
  year: 2020
  ident: e_1_2_1_58_1
– ident: e_1_2_1_15_1
– ident: e_1_2_1_14_1
– volume-title: Proceedings of ACM SIGFIDET Workshop on Data Description, Access and Control (SIGFIDET). 249–264
  ident: e_1_2_1_29_1
– ident: e_1_2_1_6_1
– volume-title: Proceedings of ACM SIGPLAN Symposium on Principles of Programming Languages (POPL). 458–472
  year: 2017
  ident: e_1_2_1_27_1
– ident: e_1_2_1_3_1
– volume-title: Proceedings of International Conference on Concurrency Theory (CONCUR). 58–71
  year: 2015
  ident: e_1_2_1_28_1
– ident: e_1_2_1_11_1
– volume-title: Proceedings of IEEE International Conference on Data Engineering (ICDE).
  year: 2025
  ident: e_1_2_1_59_1
– volume-title: Proceedings of IEEE International Conference on Software Testing, Verification and Validation (ICST). 25–36
  year: 2024
  ident: e_1_2_1_64_1
– ident: e_1_2_1_52_1
  doi: 10.1145/3428279
– volume-title: Proceedings of European Conference on Computer Systems (EuroSys). 654–671
  year: 2023
  ident: e_1_2_1_62_1
– volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 1123–1135
  year: 2023
  ident: e_1_2_1_35_1
– ident: e_1_2_1_26_1
  doi: 10.1109/TKDE.2006.190
– ident: e_1_2_1_9_1
– ident: e_1_2_1_24_1
  doi: 10.1145/3360591
– volume-title: Proceedings of IEEE/ACM International Conference on Software Engineering (ICSE). 163:1–163:13
  year: 2024
  ident: e_1_2_1_33_1
SSID ssj0002991170
Score 2.2952545
Snippet Relational Database Management Systems (DBMSs) utilize transactions to ensure data consistency and integrity, while providing multiple isolation levels to...
SourceID crossref
acm
SourceType Enrichment Source
Index Database
Publisher
StartPage 1725
SubjectTerms Software and its engineering
Software testing and debugging
SubjectTermsDisplay Software and its engineering -- Software testing and debugging
Title Detecting Isolation Anomalies in Relational DBMSs
URI https://dl.acm.org/doi/10.1145/3728953
Volume 2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources
  customDbUrl:
  eissn: 2994-970X
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0002991170
  issn: 2994-970X
  databaseCode: M~E
  dateStart: 20240101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT-MwELZ47IELr2W15bHyAe0t2saN4_hYXrsrUYRoVypcKjt2RKUlIEJ4XPjtjB3HyVZIsAcuUWXZbuqZznzz8AxCu5ooE42JgygixkCBfzonshcAco4lqKxECdu15JidnCTjMT91EdPCthNgeZ48PvKbDyU1jAGxzdXZ_yC33xQG4DMQHZ5Adni-i_AH2sQFbCIAfFFFXzDyrwBw2-Qrn_9mBN7eYFi08emp12dFnT3Q3x-YiEIB8vrBpInppoKhFxnO6XxWTn1Mo7RpAhfTp9Jj5evSZvSB4Xypm8U_hfXWnpdtBwShJlGKtHySxFQX5qw7rlTKK2NO0JIWP_0eDkf9luAEHEVbShjsJPa6gI9MLYweAzuxKjL8bwntGdXmEw6r69d04hbOo0XCKDcpgIPnxicHb20a8Zh-hPX7V_eszdofbq2BMelVC8a08MhoFS07QwL3KwZYQ3M6X0crdZMO7GT2ZxR6fsCeH7DnBzzNccMP2PLDBvpzdDja_xW4PhmBCAHdBWGSJErxTFIG-D9NYp6RWDGhtBYZi3QmZSy6RKpIKtWlVKoeEXHCJUt12M1o7wtayK9z_RVhQLcglkVEBeUA9ZSETSjJYiZTOBkZdtA6_PjJTVUJpT7ODvpeH8YkdaXlTYeTv5OZc-8g7CfWe8xM2Xx7yhZaavhwGy3c3ZZ6B31K7--mxe03S9IXcRliYw
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Detecting+Isolation+Anomalies+in+Relational+DBMSs&rft.jtitle=Proceedings+of+the+ACM+on+software+engineering&rft.au=Yang%2C+Rui&rft.au=Cui%2C+Ziyu&rft.au=Dou%2C+Wensheng&rft.au=Gao%2C+Yu&rft.date=2025-06-22&rft.issn=2994-970X&rft.eissn=2994-970X&rft.volume=2&rft.issue=ISSTA&rft.spage=1725&rft.epage=1747&rft_id=info:doi/10.1145%2F3728953&rft.externalDBID=n%2Fa&rft.externalDocID=10_1145_3728953
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2994-970X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2994-970X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2994-970X&client=summon