thesis: Add call sequence graph
This commit is contained in:
@@ -566,3 +566,14 @@ Other checks may also include guards to calls to ``forbidden'' functions, or tha
|
||||
Another important post-condition of most library functions is the return value, which in most cases indicates success or failure of an operation.
|
||||
However, intercepting of calls alone may not be able to verify if a program really checks the return value of a function and acts accordingly.
|
||||
Chapter~\ref{ch:manipulating-function-calls} shows how this problem may be solved.
|
||||
|
||||
\subsection{Validating Memory Management}\label{subsec:testing-memory-management}
|
||||
|
||||
Lorem Ipsum.
|
||||
(malloc, calloc, realloc, free, getaddrinfo, freeaddrinfo).
|
||||
|
||||
|
||||
\subsection{Validating Resource Management}\label{subsec:validating-resource-management}
|
||||
|
||||
Lorem Ipsum.
|
||||
(open, close, socket, \dots).
|
||||
|
||||
Reference in New Issue
Block a user