...
Sound automated detection of this vulnerability is not feasible in the general case. Heuristic approaches may be useful.
Bibliography
...
...
Sound automated detection of this vulnerability is not feasible in the general case. Heuristic approaches may be useful.
...