Difference and Application of White-Box, Black-Box, and Grey-Box Testing

Prepared By Editor-in-Chief

International Journal of Innovative Solutions in Engineering is published semi-annually.

ISSN: 3029-3200

Vedran Marić*

This article belongs to Vol. 2 No. 1, 2026

V. Marić, “Difference and Application of White-Box, Black-Box, and Grey-Box Testing,” International Journal of Innovative Solutions in Engineering, vol. 2, no. 1, pp. 39–53, Jan. 2026, doi: 10.47960/3029-3200.2026.2.1.39.

pages 39-53

Download a citation file:

Preview and download a citation file in BibTex format that can be imported by citation management software, including Mendeley, EndNote, ProCite, RefWorks, and Reference Manager.

This article is archived in Zenodo

Zenodo Archive DOI: 10.5281/zenodo.18324113

Abstract

Keywords

ijise ID

Publication Date

References

  1. D. Stuttard and M. Pinto, The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws. Indianapolis, in: Wiley, 2011.
  2. L. Williams, “Testing Overview and Black-Box Testing Techniques,” in A (Partial) Introduction to Software Engineering Practices and Methods, in Laurie Williams. , 2006. [Online]. Available: https://sdc.csc.ncsu.edu/files/resources/williams-software-engineering-2011.pdf
  3. I. Sommerville, Software Engineering, Boston: Pearson Education, 2016.
  4. E. Elkind, B. Genest, D. Peled, and H. Qu, “Grey-Box Checking,” in Formal Techniques for Networked and Distributed Systems – FORTE 2006, E. Najm, J.-F. Pradat-Peyre, and V. V. Donzeau-Gouge, Eds., Berlin, Heidelberg: Springer, 2006, pp. 420–435. doi: https://doi.org/10.1007/11888116_30.
  5. K. P. M, S. K, R. M, and K. R, “CRUD Application Using ReactJS Hooks,”EAI Endorsed Transactions on Internet of Things, vol. 10, Mar. 2024, doi: https://doi.org/10.4108/eetiot.5298.
  6. M. E. Khan and F. Khan, “A Comparative Study of White Box, Black Box and Grey Box Testing Techniques,”International Journal of Advanced Computer Science and Applications (IJACSA), vol. 3, no. 6, Jul. 2012, doi: https://doi.org/10.14569/IJACSA.2012.030603.
  7. R. Saxena and M. Singh, “Gray Box Testing: Proactive methodology for the future design of test cases to reduce overall system cost,” Journal of Basic and Applied Engineering Research, Oct. 2014. [Online]. Available: https://krishisanskriti.org/vol_image/12Jun201506060717.pdf
  8. L. Petrović, “Analysis of OAuth 2.0 Vulnerabilities Arising from Weak Implementation Choices,”International Journal of Innovative Solutions in Engineering, vol. 2, no. 1, p. 15, Nov. 2025, doi: https://doi.org/10.47960/3029-3200.2026.2.1.15.
  9. A. Streza, “A Supa-Introduction to Supabase,” Medium. Accessed: Jan. 13, 2026. [Online]. Available: https://medium.com/@alex.streza/a-supa-introduction-to-supabase-e551ea6708e
  10. C. Dar, M. Hershcovitch, and A. Morrison, “RLS Side Channels: Investigating Leakage of Row-Level Security Protected Data Through Query Execution Time,”Proc. ACM Manag. Data, vol. 1, no. 1, pp. 1–25, May 2023, doi: https://doi.org/10.1145/3588943.
  11. F. Kincheloe, Power BI Row Level Security for University Data, Denton: TAIR Annual Conference, 2022.
  12. G. Weidman, Penetration testing – A Hands-on Introduction to Hacking, San Francisco: No starch press, 2014.
  13. D. Musa and I. Markić, “Achieving Successful Software Penetration Testing,”International Journal of Innovative Solutions in Engineering, vol. 1, no. 1, pp. 1–9, Jan. 2025, doi: https://doi.org/10.47960/3029-3200.2025.1.1.1.
  14. D. M. S. Varalakshmi, Secure Multilevel System (FLS & RLS) for a Cyber-Physical System in Association with Data Mining, International Journal of Interdisciplinary Research and Innovations, 2019.
  15. “Row-Level Security 101: The Basics of Row-Level Security,” Satori. Accessed: Jan. 13, 2026. [Online]. Available: https://satoricyber.com/row-level-security/row-level-security-101/
  16. P. S. B. Bele, A. A. Harinkhede and V. M. Bhatti, Software Testing Using White-box, International Research Journal of Innovations in Engineering and Technology (IRJIET), 2022.
  17. H. Hi, “Bridge between Black Box and White Box – Gray Box Testing Technique”, Accessed: Jan. 13, 2026. [Online]. Available: https://www.academia.edu/32153458/Bridge_between_Black_Box_and_White_Box_Gray_Box_Testing_Technique