Hunting obfuscated malware by abstract interpretation