Workflow: Building a Knowledge Graph with the Semantic Graph Tab

Overview

The Semantic Graph workflow builds a searchable knowledge graph of the binary’s functions, call relationships, security characteristics, and community structure. Once built, the graph enables semantic search, visual exploration, and automated security analysis.

When to Use the Semantic Graph Tab

Step-by-Step Workflow

Step 1: Open the Semantic Graph Tab

Click the Semantic Graph tab in IDAssist. The bottom status bar shows the current graph statistics. If this is a new binary, the graph will be empty.

Step 2: ReIndex the Binary

Click ReIndex Binary to extract the binary’s structure:

This step does not require an LLM — it uses IDA’s built-in analysis data. The graph status bar updates to show the number of nodes and edges.

Step 3: Run Semantic Analysis

Click Semantic Analysis to generate LLM summaries for each function:

This step uses your active LLM provider and can take a while for large binaries. Options: - RAG checkbox: Include document context in the analysis prompts - MCP checkbox: Allow the LLM to use tools during analysis - Force re-analysis: Regenerate summaries for functions that already have one

Step 4: Run Security Analysis

In the Manual Analysis panel, click Security Analysis to detect vulnerability patterns:

Step 5: Run Network Flow Analysis

Click Network Flow to trace network operations across the binary:

Step 6: Run Community Detection

Click Community Detection to group related functions into logical modules:

Exploring the Graph

List View

The default view showing details for the selected function:

  1. Navigate to a function in IDA (or type a name/address in the Current field and click Go)
  2. Callers and Callees lists show the function’s relationships — double-click any entry to navigate
  3. Edges table shows all edges with type filtering — useful for finding vulnerability or taint flow edges
  4. Security Flags section shows and lets you toggle flags on the current function
  5. LLM Summary displays the semantic analysis result — click Edit to modify

Visual Graph

Switch to the Visual Graph sub-tab for an interactive diagram:

  1. The center node (teal) is the currently selected function
  2. Adjust N-Hops (1–5) to expand the visible neighborhood
  3. Toggle edge types: CALLS (blue), VULN (red), NETWORK (gray)
  4. Use zoom controls or scroll to zoom in/out, click Fit to fit the graph to the view
  5. Double-click any node to navigate to that function in IDA
  6. Click a node to see its summary in the panel below

Node colors indicate status: - Teal (#2ea8b3) — Currently selected function - Dark gray (#3a3f44) — Normal function - Dark red (#7a2b2b) — Function with security vulnerability flags

The Search sub-tab provides seven query types:

Query Type Example Use
Semantic Search “functions that parse network packets”
Get Analysis Retrieve stored analysis for a specific address
Similar Functions Find functions similar to the current one
Call Context Explore the call chain around a function
Security Analysis “find all functions with buffer overflow risk”
Module Summary Summarize a detected community/module
Activity Analysis “which functions perform file I/O”

Click a result row to see full details, then click Go To to navigate to that function.

Using the Graph in Queries

The semantic graph enhances other IDAssist features:

Tips