Analysis of disassembled executable codes by abstract interpretation

Document Type : Research Paper


Iran University of Science and Technology, Narmak, Tehran, 16844, Iran


The aim of this paper is to define the abstract domain, abstract operator, abstract semantic, the environments and states of disassembled executable codes as well as a way to analysis the disassembled executable codes. Nowadays, static analysis on disassembled code going to grow. Reverse engineering and malware analysis use this technique. Thus, we tried to perform pluralization the requirements of static analysis by abstract interpretation as well as report some specific and advantageous notes in this paper. In addition, we present an algorithm to obtain the control ow graph of disassembled code.


Volume 10, Issue 1
November 2019
Pages 9-13
  • Receive Date: 24 October 2018
  • Revise Date: 24 June 2019
  • Accept Date: 30 June 2016