1
0

thesis: Add call sequence graph

This commit is contained in:
2025-07-28 15:42:56 +02:00
parent 3e16cee2f1
commit d35b7038c3
3 changed files with 80 additions and 6 deletions

View File

@@ -566,3 +566,14 @@ Other checks may also include guards to calls to ``forbidden'' functions, or tha
Another important post-condition of most library functions is the return value, which in most cases indicates success or failure of an operation.
However, intercepting of calls alone may not be able to verify if a program really checks the return value of a function and acts accordingly.
Chapter~\ref{ch:manipulating-function-calls} shows how this problem may be solved.
\subsection{Validating Memory Management}\label{subsec:testing-memory-management}
Lorem Ipsum.
(malloc, calloc, realloc, free, getaddrinfo, freeaddrinfo).
\subsection{Validating Resource Management}\label{subsec:validating-resource-management}
Lorem Ipsum.
(open, close, socket, \dots).