Systems, methods, apparatus and software can be implemented to detect
memory leaks with relatively high confidence. By analyzing memory blocks
stored in a memory, implicit and/or explicit contingency chains can be
obtained. Analysis of these contingency chains identifies potential
memory leaks, and subsequent successive verification confirms whether the
potential memory leaks are memory leaks.