license: mit
task_categories:
- text-generation
- feature-extraction
language:
- en
tags:
- system-calls
- strace
- linux
- syscalls
- operating-systems
- code
pretty_name: Linux Strace Traces Dataset
size_categories:
- n<1K
Linux Strace Traces Dataset
A comprehensive collection of strace traces from common Linux utilities, designed for training AI models on system call patterns, program behavior analysis, and operating system interactions.
Dataset Description
This dataset contains 357 strace traces captured from 119 different Linux command-line utilities, with each utility executed 3 times to capture runtime variations. Each trace includes detailed system call information with timestamps, arguments, and execution times.
Dataset Statistics
- Total traces: 357 (119 unique commands × 3 runs each)
- Categories: 8
- Format: Parquet (Hugging Face native)
- Raw size: ~40 MB
- Compressed size: ~5 MB (Parquet)
- License: MIT
Runtime Diversity
Each command was executed 3 times to capture natural variations in program execution:
- Different process IDs (PIDs)
- Different memory addresses (ASLR randomization)
- Different timestamps with microsecond precision
- Slight variations in syscall timing
This diversity helps train more robust AI models that can generalize across different execution contexts.
Categories
File I/O Operations (75 traces = 25 commands × 3 runs)
- File reading:
cat,head,tail,less - File manipulation:
cp,mv,touch,rm - Directory operations:
mkdir,rmdir,find - File information:
stat,file,ls,du,df
- File reading:
Text Processing (69 traces = 23 commands × 3 runs)
- Pattern matching:
grep(simple, case-insensitive, recursive, count) - Text transformation:
sed,awk,tr - Sorting & filtering:
sort,uniq,cut,paste - Analysis:
wc,diff,cmp
- Pattern matching:
Process & System Info (51 traces = 17 commands × 3 runs)
- Process listing:
ps,top,pgrep - System information:
uptime,who,whoami,id,uname,hostname - Environment:
env,printenv - Time:
date,cal - Resources:
free,vmstat
- Process listing:
Networking (33 traces = 11 commands × 3 runs)
- Network requests:
ping,curl,wget - DNS queries:
host,dig,nslookup - Network info:
ip,ss,netstat
- Network requests:
Compression & Archives (36 traces = 12 commands × 3 runs)
- Tar operations: create, extract, list (with/without gzip)
- Compression:
gzip,bzip2 - Zip operations:
zip,unzip
Scripting & Execution (45 traces = 15 commands × 3 runs)
- Shell execution:
bash,sh - Python execution: scripts and inline commands
- Utilities:
sleep,echo,printf,yes,seq - Tests:
true,false,test,expr
- Shell execution:
Permissions & Ownership (18 traces = 6 commands × 3 runs)
- Permission modification:
chmod(numeric, symbolic, recursive) - Permission viewing:
ls -l - Umask operations
- Permission modification:
Data Operations (30 traces = 10 commands × 3 runs)
- Random data:
ddwith/dev/urandomand/dev/zero - Encoding:
base64(encode/decode) - Hashing:
md5sum,sha1sum,sha256sum - Binary analysis:
hexdump,od,strings
- Random data:
Dataset Structure
Data Fields
id(string): Unique identifier for the trace (e.g., "cat_simple_run1")category(string): Category of the utility (e.g., "file_io")command(string): Full command executed (e.g., "cat test.txt")strace(string): Complete strace output with system callsduration(float): Execution time in secondstimestamp(string): ISO 8601 timestamp of trace capturenum_lines(int): Number of lines in the strace outputsize_bytes(int): Size of the strace output in bytesrun_number(int): Run iteration (1, 2, or 3)
Data Splits
This dataset contains a single split:
train: 357 examples (119 unique commands × 3 runs)
Example
from datasets import load_dataset
dataset = load_dataset("YOUR_USERNAME/strace-dataset")
# View first example
example = dataset['train'][0]
print(f"Command: {example['command']}")
print(f"Category: {example['category']}")
print(f"Duration: {example['duration']}s")
print(f"Strace output (first 500 chars):\n{example['strace'][:500]}")
Dataset Creation
Source Data
All traces were generated in a controlled, isolated environment using the strace utility with the following flags:
-f: Follow child processes-s 256: Capture up to 256 bytes of string arguments-tt: Absolute timestamps with microsecond precision-T: Show time spent in each syscall
Data Collection Process
- Temporary workspace created with test files (text, binary, CSV, etc.)
- Each utility executed with typical arguments/use cases
- Strace captured all system calls during execution
- Test data cleaned up after collection
- No sensitive information or system-specific paths included
Safety & Privacy
- ✅ No sensitive data (passwords, keys, tokens)
- ✅ No user-specific information
- ✅ No production system paths
- ✅ All operations performed in temporary directories
- ✅ Safe for open-source release
Use Cases
Training AI Models
- System call prediction: Predict next system calls based on program behavior
- Anomaly detection: Identify unusual syscall patterns
- Program behavior modeling: Learn normal execution patterns
- Security analysis: Detect potential malicious behavior
Analysis & Research
- Understanding program execution flows
- Comparing syscall patterns across utilities
- Educational resource for OS concepts
- Benchmark for trace analysis tools
Code Examples
Load and explore the dataset
from datasets import load_dataset
import pandas as pd
# Load dataset
ds = load_dataset("andrew000/straces")
# Convert to pandas for analysis
df = pd.DataFrame(ds['train'])
# Group by category
print(df.groupby('category').size())
# Find longest-running commands
print(df.nlargest(5, 'duration')[['command', 'duration']])
# Analyze strace patterns
for example in ds['train']:
if 'openat' in example['strace']:
print(f"{example['command']} opens files")
Extract specific syscalls
import re
def extract_syscalls(strace_output):
"""Extract syscall names from strace output."""
pattern = r'\d+\s+[\d:.]+\s+(\w+)\('
return list(set(re.findall(pattern, strace_output)))
# Find all syscalls used by cat
cat_example = [ex for ex in ds['train'] if ex['id'] == 'cat_simple'][0]
syscalls = extract_syscalls(cat_example['strace'])
print(f"cat uses these syscalls: {syscalls}")
Limitations
- Traces captured on a specific Linux system (kernel version may affect syscalls)
- Limited to common command-line utilities
- No multi-threaded or complex concurrent workloads
- Dataset size: 357 traces (medium-sized dataset)
Future Work
- Add more utilities and use cases
- Include long-running processes
- Multi-threaded application traces
- Different input sizes for scalability analysis
- Traces from different Linux distributions/kernels
Citation
If you use this dataset in your research, please cite:
@dataset{strace_traces_2025,
title={Linux Strace Traces Dataset},
author={Andrew Fasano},
year={2025},
publisher={Hugging Face},
howpublished={\url{https://huggingface.co/datasets/andrew000/straces}}
}
License
MIT License - See LICENSE file for details
Acknowledgments
Generated using the strace utility on Linux. All traces are from standard open-source utilities.