Document Type: Research Paper
Iran University of Science and Technology, Narmak, Tehran, 16844, Iran
The aim of this paper is to dene the abstract domain, abstract operator, abstract semantic, the environments and states of disassembled executable codes as well as a way to analysis the disassembled executable codes. Nowadays, static analysis on disassembled code going to grow. Reverse engineering and malware analysis use this technique. Thus, we tried to perform pluralization the requirements of static analysis by abstract interpretation as well as report some specic and advantage note in this paper. In addition, we present an algorithm to obtain the control
ow graph of disassembled code.