Investigating the utility of software semantics for host-based intrusion detection systems