Implementation of Equivalence Partitioning and Boundary Value Analysis in Black Box Testing A Case Study on the Admin Website of PAUD KB Al Husna
Abstract
In order to guarantee system functioning and quality, software testing is an essential stage in the Software Development Life Cycle (SDLC). This study implements black box testing using Equivalency Partitioning (EP) and Boundary Value Analysis (BVA) on the Admin Website PAUD KB Al Husna to identify functional defects, focusing on input validation and error handling. In this study, 82 test scenarios were created for five functional modules (Class Management, Teacher Management, FAQ, Schedule, Gallery) and three non-functional factors (Security, Compatibility, and Responsiveness). Test execution was conducted manually based on BVA test cases (Min-1, Min, Max, Max+1) and EP cases (valid and invalid classes). Results showed a 32.9% failure rate (27 of 82 scenarios). Critical findings include: (1) Systemic failure in upper-boundary validation (BVA Max+1) with 256-character inputs; (2) EP-Invalid validation failures revealing Cross-Site Scripting (XSS) vulnerabilities from HTML input; and (3) Absence of brute-force protection on login pages. The study concludes that BVA and EP techniques effectively identify critical data validation and security defects, providing essential improvement recommendations for developers.
Downloads
References
[2] R. S. Pressman, Software Engineering: A Practitioner’s Approach, 7th ed. Dubuque, IA: McGraw-Hill, 2010.
[3] A. Agustian, I. Andryani, S. Khoerunisa, A. Pangestu, and A. Saifudin, “Implementasi Teknik Equivalence Partitioning pada Pengujian Aplikasi E-learning Berbasis Web,” J. Teknol. Sist. Inf. Dan Apl., vol. 3, no. 3, p. 178, Aug. 2020, doi: 10.32493/jtsi.v3i3.5371.
[4] R. P. Fajar, “Teknik Boundary Value Analysis pada Blackbox Testing untuk Aplikasi Buku Catatan Harian,” Repositor, vol. 6, no. 1, pp. 69–78, Feb. 2024.
[5] H. A. S. Hutapea, Y. Priyadi, and E. Darwiyanto, “Analisis dan Pengujian dengan Menggunakan Metode Boundary Value Analysis dan Metode Equivalence Partitioning (Studi Kasus: Aplikasi Homelab),” E-Proceeding Eng., vol. 9, no. 2, p. 746, Apr. 2022.
[6] R. Gunawan, Y. P. Wibisono, C. H. Primasari, and D. Budiyanto, “Blackbox Testing on Virtual Reality Gamelan Saron Using Equivalence Partition Method,” J. Buana Inform., vol. 14, no. 01, pp. 11–19, Apr. 2023, doi: 10.24002/jbi.v14i01.6606.
[7] F. Wardah Gracillaria Suharyono, K. Kartini, and A. Junaidi, “PENERAPAN METODE BOUNDARY VALUE ANALYSIS DAN EQUIVALENCE PARTITIONING DALAM PENGUJIAN BLACK BOX UNTUK APLIKASI SIADITA,” JATI J. Mhs. Tek. Inform., vol. 8, no. 1, pp. 1013–1020, Mar. 2024, doi: 10.36040/jati.v8i1.8921.
[8] D. Ahrizal, M. K. Miftah, R. Kurniawan, T. Zaelani, and Y. Yulianti, “Pengujian Perangkat Lunak Sistem Informasi Peminjaman PlayStation dengan Teknik Boundary Value Analysis Menggunakan Metode Black Box Testing,” J. Inform. Univ. Pamulang, vol. 5, no. 1, p. 73, Mar. 2020, doi: 10.32493/informatika.v5i1.4338.
[9] P. A. D. A. Santi, R. Afwani, Moh. A. Albar, S. E. Anjarwani, and A. Z. Mardiansyah, “Black Box Testing with Equivalence Partitioning and Boundary Value Analysis Methods (Study Case: Academic Information System of Mataram University),” in Proceedings of the First Mandalika International Multi-Conference on Science and Engineering 2022, MIMSE 2022 (Informatics and Computer Science), Dordrecht: Atlantis Press International BV, 2022, pp. 207–219. doi: 10.2991/978-94-6463-084-8_19.
[10] M. Sholeh, I. Gisfas, Cahiman, and M. A. Fauzi, “Black Box Testing on ukmbantul.com Page with Boundary Value Analysis and Equivalence Partitioning Methods,” J. Phys. Conf. Ser., vol. 1823, no. 1, p. 012029, Mar. 2021, doi: 10.1088/1742-6596/1823/1/012029.
[11] F. K. Kartono et al., “Pengujian Black Box Testing Pada Sistem Website Osha Snack: Pendekatan Teknik Boundary Value Analysis,” J. KRIDATAMA SAINS DAN Teknol., vol. 6, no. 02, pp. 754–766, Dec. 2024, doi: 10.53863/kst.v6i02.1407.
[12] B. Hardika et al., “Pengujian Blackbox Testing Website Garuda Farm Menggunakan Teknik Equivalence Partitioning,” J. KRIDATAMA SAINS DAN Teknol., vol. 6, no. 02, pp. 740–753, Dec. 2024, doi: 10.53863/kst.v6i02.1420.
[13] A. Amrulloh, A. D. Septiadi, M. Septiara, and P. A. Wicaksono, “Black Box Testing Using the Equivalence Partitions Technique to Test the Functionality of the Ternaku.id Website,” J. Multimed. Trend Technol., vol. 2, no. 3, pp. 171–178, Dec. 2023, doi: 10.35671/jmtt.v2i3.43.
[14] Y. Nam and S. Choi, “Analysis of Vulnerabilities in College Web-Based System,” Electronics, vol. 13, no. 12, p. 2261, June 2024, doi: 10.3390/electronics13122261.
[15] I. Indrianto and E. Edwar, “Vulnerability Evaluation for Student Enrollment at SMKS Pandawa Bali Global Abiansemal,” Sebatik, vol. 28, no. 2, Dec. 2024, doi: 10.46984/sebatik.v28i2.2510.
[16] S. Bose and A. K. Narayanan, “Security Analysis of CMS based Websites through CMSPY,” ICRRD J., vol. 4, no. 4, pp. 162–174, 2023, doi: 10.53272/icrrd.
[17] G. Wassermann and Z. Su, “Static detection of cross-site scripting vulnerabilities,” in Proceedings of the 13th international conference on Software engineering - ICSE ’08, Leipzig, Germany: ACM Press, 2008, p. 171. doi: 10.1145/1368088.1368112.
[18] R. Verma, N. Dhanda, and V. Nagar, “Enhancing Security with In-Depth Analysis of Brute-Force Attack on Secure Hashing Algorithms,” in Proceedings of Trends in Electronics and Health Informatics, vol. 376, M. S. Kaiser, A. Bandyopadhyay, K. Ray, R. Singh, and V. Nagar, Eds., in Lecture Notes in Networks and Systems, vol. 376. , Singapore: Springer Nature Singapore, 2022, pp. 513–522. doi: 10.1007/978-981-16-8826-3_44.
[19] G. Wijaya, H. Winata, S. Aji, and M. N. Faiz, “Website Security Analysis Using Vulnerability Assessment Method (Case Study: Universitas Internasional Batam),” vol. 6, no. 2, 2024.
[20] X. Guo, H. Okamura, and T. Dohi, “Optimal test case generation for boundary value analysis,” Softw. Qual. J., vol. 32, no. 2, pp. 543–566, June 2024, doi: 10.1007/s11219-023-09659-9.
[21] P. Huriati, H. Azmi, Y. Wati, D. Meidelfi, and T. Lestari, “Black box testing on the online quiz application using the Equivalence Partitions method,” Int. J. Adv. Sci. Comput. Eng., vol. 2, no. 2, pp. 51–56, Aug. 2020, doi: 10.62527/ijasce.2.2.48.
[22] M. Nasir et al., “Implementasi Equivalence Partitioning Testing Pada Fitur Booking dan Jadwal Website Praktik Gigi Mandiri drg. Susilawati (https://frontend-webklinik.vercel.app/),” STRING Satuan Tulisan Ris. Dan Inov. Teknol., vol. 9, no. 3, p. 371, Apr. 2025, doi: 10.30998/string.v9i3.26570.
[23] C. Vikasari, “Pengujian Sistem Informasi Magang Industri dengan Metode Blackbox Testing Boundary Value Analysis,” Syntax J. Inform., vol. 7, no. 1, pp. 44–51, June 2018, doi: 10.35706/syji.v7i1.1291.
[24] S. J. Putri, D. G. P. Putri, and W. H. N. Putra, “Analisis Komparasi pada Teknik Black Box Testing (Studi Kasus: Website Lars),” J. Internet Softw. Eng., vol. 5, no. 1, pp. 23–28, May 2024, doi: 10.22146/jise.v5i1.9446.
[25] Mohd. Ehmer Khan, “Different Approaches To Black box Testing Technique For Finding Errors,” Int. J. Softw. Eng. Appl., vol. 2, no. 4, pp. 31–40, Oct. 2011, doi: 10.5121/ijsea.2011.2404.
[26] I. E. Tsalatsah, D. Pratama, A. R. Hakim, L. A. Budiman, and J. Riyanto, “Penggunaan Teknik Boundary Value Analysis untuk Pengujian Aplikasi Stok Barang,” J. Teknol. Sist. Inf. Dan Apl., vol. 5, no. 1, p. 14, Jan. 2022, doi: 10.32493/jtsi.v5i1.14987.
Copyright (c) 2025 Adelia Tiara Putri, Aisya Arline Husnaya, Dzaky Fachri Hadafi, Hasan Ismail Abdulmalik, Muhammad Nasir, Sofiyanti Indriasari

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.
This is an open-access article distributed under the terms of the Creative Commons Attribution-ShareAlike 4.0 International License which permits unrestricted use, distribution, and reproduction in any medium. Users are allowed to read, download, copy, distribute, search, or link to full-text articles in this journal without asking by giving appropriate credit, provide a link to the license, and indicate if changes were made. All of the remix, transform, or build upon the material must distribute the contributions under the same license as the original.












