Systems, methods, apparatus and software can be implemented to detect
memory leaks with relatively high confidence. By analyzing memory blocks
stored in a memory, implicit and/or explicit contingency chains can be
obtained. Analysis of these contingency chains identifies potential
memory leaks, and subsequent verification confirms whether the potential
memory leaks are memory leaks.