File size: 6,896 Bytes
8a2899d d72bba6 f3540b5 60ff7a9 8a2899d eb9364c 5e8876d eb9364c bd41223 feefba4 d72bba6 bd41223 feefba4 60ff7a9 feefba4 bd41223 1a22cdf 5b90b10 bd41223 f24ce5e bd41223 5b90b10 1a22cdf f24ce5e 42c4827 f24ce5e 1a22cdf bd41223 75a1c79 f24ce5e 60ff7a9 bd41223 0aa6f90 bd41223 6488901 bd41223 948d94d bd41223 6488901 bd41223 6488901 bd41223 6488901 bd41223 26cef7a bd41223 26cef7a bd41223 341be75 bd41223 a0b2e53 feefba4 f3540b5 60ff7a9 feefba4 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 |
---
license: mit
task_categories:
- text-generation
- question-answering
- text-classification
language:
- en
tags:
- cryptography
- security
- cybersecurity
- security-protocols
- protocol-verification
- formal-methods
- spore
- clark-jacob-library
- avispa-library
- avantssar-library
pretty_name: Security Protocols Open Repository (SPORE)
size_categories:
- n<1K
configs:
- config_name: default
data_files:
- split: train
path: "instruction.jsonl"
---
# Security Protocols Open Repository (SPORE) Dataset
This dataset contains security protocol specifications formatted for training large language models to understand and reason about cryptographic protocols.
## Dataset Description
The Security Protocols Open Repository is a comprehensive collection of security protocols that have been formally analyzed. Each protocol specification includes:
- Principal declarations (participants in the protocol)
- Cryptographic primitives (keys, nonces, timestamps, etc.)
- Message exchange sequences with cryptographic operations
- Clear notation for encryption, signing, and other security operations
## UPDATE
- **Oct-23-2025:** This dataset now includes additional protocols from the Clark-Jacob Library, the AVISPA Library and the AVANTSSAR Library not originally available in the SPORE dataset.
### Dataset Structure
The dataset is available in two flavours: *instruction* and *conversation*.
Each entry in the instruction dataset has the schema:
```json
{"text": "<Protocol Name>\n\n<Protocol Specifications>"}
```
Each entry in the conversation dataset has the schema:
```json
{
"messages": [
{"role": "system", "content": "You are an expert in formal verification of security protocols."},
{"role": "user", "content": "Analyze the following protocol:\n\n<Protocol Name>\n\n<Protocol Specifications>"},
{"role": "assistant", "content": ""}
]
}
```
The protocol specifications use a standard notation:
- `A, B, S`: Principals (participants)
- `Na, Nb`: Nonces (random values)
- `Ka, Kb`: Cryptographic keys
- `{M}K`: Message M encrypted with key K
- `A -> B`: Message flow from A to B
## Use Cases
This dataset is designed for:
1. **Protocol Understanding**: Training LLMs to parse and comprehend security protocol specifications
2. **Protocol Analysis**: Learning to identify participants, message flows, and cryptographic operations
3. **Security Research**: Understanding historical protocols and their vulnerabilities
4. **Formal Methods**: Learning formal notation for security protocols
## Dataset Creation
### Source Data
All protocols are sourced from:
- The [Security Protocols Open REpository (SPORE)](http://www.lsv.ens-cachan.fr/spore), maintained by the Laboratoire Spécification et Vérification (LSV) at ENS Paris-Saclay.
- The [Clark-Jacob Library with specifications in MSR 2.0](https://www.cs.cmu.edu/~iliano/projects/MSR/cjl/index.shtml), maintained by Carnegie Mellon University Qatar.
- The [Automated Validation of Internet Security Protocols and Applications (AVISPA) Library](https://web.archive.org/web/20160606114053fw_/http://www.avispa-project.org/library/avispa-library.html#IETF), funded under the EU Framework Programme 7 (FP7), now discontinued.
- The [Automated VAlidatioN of Trust and Security of Service-oriented ARchitectures (AVANTSSAR) Library](https://web.archive.org/web/20170603130116/http://www.avantssar.eu/), funded under the EU Framework Programme 7 (FP7), now discontinued.
### Data Processing
The original protocol specifications have been:
- Cleaned of formatting artifacts
- Stripped of comments and metadata
- Standardized to a consistent text format
- Sorted in alphabetical order of the protocol names
- Converted to JSONL for easy loading
## Training Example
```python
from datasets import load_dataset
dataset = load_dataset("dassarthak18/spore-protocols", "instruction")
training_args = TrainingArguments(
# your args
)
trainer = SFTTrainer(
model=model,
args=training_args,
train_dataset=dataset['train'],
dataset_text_field="text",
)
```
## Dataset Statistics
- **Total Protocols**: 49 protocols from SPORE + 18 protocols from Clark-Jacob library + 16 protocols from AVISPA library + 6 protocols from AVANTSSAR library
- **Protocol Families**: Includes variations, fixes, and modified versions of classic protocols
- **Average Length**: Varies from simple 3-message protocols to complex multi-party protocols
- **Language**: Formal protocol specification language
## Limitations
- The dataset is relatively small (89 protocols)
- Protocols are represented in a specific formal notation
- Does not include natural language descriptions or security proofs
## Citation
```bibtex
@misc{spore,
title = {Security Protocols Open Repository},
author = {{LSV - ENS Paris-Saclay}},
howpublished = {\url{https://lsv.ens-paris-saclay.fr/Software/spore/}},
note = {Laboratoire Spécification et Vérification, ENS Paris-Saclay, France}
}
@techreport{wrro72494,
note = {Query date: 14/01/2011},
year = {1997},
title = {A survey of authentication protocol literature: Version 1.0},
type = {Report},
institution = {ARRAY(0x557103a11320)},
publisher = {Citeseer},
keywords = {Authentication. ,Security Protocols},
url = {https://eprints.whiterose.ac.uk/id/eprint/72494/},
author = {Clark, John Andrew and Jacob, Jeremy Lawrence}
}
@inproceedings{Armando2005AVISPA,
author = {Armando, Alessandro and Basin, David and Boichut, Yohan and
Chevalier, Yannick and Compagna, Luca and Cuellar, Juan and
Hankes Drielsma, Peter and He{\'a}m, P.~C. and Kouchnarenko, O. and
Mantovani, J. and M{\"o}dersheim, Sebastian and von Oheimb, D. and
Rusinowitch, Michael and Santiago, J. and Turuani, M. and
Vigan\`o, Luca and Vigneron, L.},
title = {The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications},
booktitle = {Proceedings of Computer Aided Verification (CAV)},
series = {Lecture Notes in Computer Science},
volume = {3576},
pages = {281--285},
year = {2005},
publisher = {Springer},
doi = {10.1007/11513988\_27}
}
@inproceedings{AVANTSSAR2012,
author = {Armando, Alessandro and Carbone, Roberto and Compagna, Luca and
Cuellar, Jorge and Pellegrino, Giancarlo and Sorniotti, Alessandro},
title = {From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?},
booktitle = {Proceedings of the IFIP TC 11 27th International Information Security Conference (SEC)},
series = {IFIP Advances in Information and Communication Technology},
volume = {376},
pages = {68--79},
year = {2012},
publisher = {Springer},
doi = {10.1007/978-3-642-30436-1\_6}
}
``` |