Your team is initiating a vulnerability assessment to identify known weaknesses in the proprietary software used by your organization. To avoid any service disruption, they need to examine the software without actually executing its code. Which type of analysis is most appropriate for this situation?
Fuzzing
Static analysis
Reverse engineering
Dynamic analysis