Experimental Challenges in Cyber Security: A Story of Provenance and Lineage for Malware