Datasets:
Tasks:
Other
Formats:
parquet
Size:
10K - 100K
Tags:
binary-analysis
malware-detection
executable-analysis
binary-tokenization
cybersecurity
reverse-engineering
License:
Upload README.md with huggingface_hub
Browse files
README.md
CHANGED
|
@@ -42,8 +42,8 @@ pretty_name: "Binary-30K: A Large-Scale Multi-Platform Binary Dataset"
|
|
| 42 |
|
| 43 |
- **Homepage:** [https://michaelbommarito.com/](https://michaelbommarito.com/)
|
| 44 |
- **Repository:** [https://github.com/mjbommar/binary-bpe-paper](https://github.com/mjbommar/binary-bpe-paper)
|
| 45 |
-
- **Paper:**
|
| 46 |
-
- **Point of Contact:** michael@
|
| 47 |
|
| 48 |
### Dataset Summary
|
| 49 |
|
|
@@ -63,8 +63,8 @@ Each binary in the dataset has been pre-processed with:
|
|
| 63 |
- **Binary analysis** via LIEF library (ELF/PE parsing)
|
| 64 |
|
| 65 |
The dataset is stratified across:
|
| 66 |
-
- **Linux binaries** (50.8%): Alpine 3.18, Debian 11/12, Ubuntu 20.04/22.04, BusyBox
|
| 67 |
-
- **Windows binaries** (48.0%): Windows 8, 10, 11, Windows Update Catalog
|
| 68 |
- **Malware samples** (1.2%): From SOREL-20M dataset
|
| 69 |
|
| 70 |
This dataset enables research in malware detection, architecture recognition, function boundary detection, compiler identification, binary similarity analysis, and cross-platform binary understanding.
|
|
@@ -273,19 +273,19 @@ The dataset enables research in:
|
|
| 273 |
**Linux Binaries (51% of dataset)**
|
| 274 |
|
| 275 |
Collected from official package repositories:
|
| 276 |
-
- **Alpine Linux 3.18**: Lightweight distribution, static binaries
|
| 277 |
-
- **Debian 11 (Bullseye)** and **Debian 12 (Bookworm)**: Stable releases
|
| 278 |
-
- **Ubuntu 20.04 LTS** and **
|
| 279 |
-
- **BusyBox
|
| 280 |
|
| 281 |
Binaries extracted from .deb packages and Alpine APK packages using standard package management tools.
|
| 282 |
|
| 283 |
**Windows Binaries (48% of dataset)**
|
| 284 |
|
| 285 |
Collected from multiple Windows versions to capture compiler evolution:
|
| 286 |
-
- **Windows 8**: System binaries and common applications
|
| 287 |
-
- **Windows 10**: Multiple builds covering several years
|
| 288 |
-
- **Windows 11**: Latest OS release
|
| 289 |
- **Windows Update Catalog**: System updates and drivers
|
| 290 |
|
| 291 |
Binaries extracted from official Microsoft sources using update catalog and system file extraction.
|
|
@@ -294,6 +294,9 @@ Binaries extracted from official Microsoft sources using update catalog and syst
|
|
| 294 |
|
| 295 |
Drawn from SOREL-20M dataset:
|
| 296 |
- **SOREL-20M**: Sophos-ReversingLabs 20 million sample malware dataset
|
|
|
|
|
|
|
|
|
|
| 297 |
- Subset selection: Representative samples across malware families
|
| 298 |
- Deduplication: SHA-256 based to avoid duplicates
|
| 299 |
|
|
@@ -415,7 +418,7 @@ The dataset contains compiled binary executables. Potential sensitive informatio
|
|
| 415 |
|
| 416 |
**Size Bias:**
|
| 417 |
- File sizes vary widely; very large binaries may be underrepresented
|
| 418 |
-
-
|
| 419 |
|
| 420 |
**Researchers should:**
|
| 421 |
- Be aware of these biases when drawing conclusions
|
|
@@ -429,17 +432,18 @@ The dataset contains compiled binary executables. Potential sensitive informatio
|
|
| 429 |
1. **Static Analysis Only**: Dataset contains binaries without runtime behavior
|
| 430 |
- No dynamic analysis features (API calls, network activity, file operations)
|
| 431 |
|
| 432 |
-
2. **
|
| 433 |
-
- May lose information from files >1-2MB after tokenization
|
| 434 |
-
|
| 435 |
-
3. **Parsing Failures**: Some binaries cannot be parsed by LIEF
|
| 436 |
- Corrupted files, unusual formats, or packers may result in missing metadata
|
| 437 |
|
| 438 |
-
|
| 439 |
|
| 440 |
-
|
| 441 |
- Limits metadata extraction (fewer function names, no source line info)
|
| 442 |
|
|
|
|
|
|
|
|
|
|
|
|
|
| 443 |
**Usage Limitations:**
|
| 444 |
|
| 445 |
1. **Malware Handling**: Users must follow security best practices
|
|
@@ -450,8 +454,9 @@ The dataset contains compiled binary executables. Potential sensitive informatio
|
|
| 450 |
- Users should verify compliance with local laws
|
| 451 |
|
| 452 |
3. **Computational Requirements**: Full dataset requires significant resources
|
| 453 |
-
- 12.90 GB raw data +
|
| 454 |
-
- Token sequences
|
|
|
|
| 455 |
|
| 456 |
4. **Not a Benchmark**: No standardized train/test splits or evaluation protocol
|
| 457 |
- Users should define splits and protocols appropriate for their research
|
|
@@ -463,37 +468,52 @@ The dataset contains compiled binary executables. Potential sensitive informatio
|
|
| 463 |
This dataset was curated by:
|
| 464 |
|
| 465 |
**Michael J. Bommarito II**
|
| 466 |
-
- Email: michael@
|
| 467 |
-
-
|
| 468 |
|
| 469 |
-
|
| 470 |
|
| 471 |
### Licensing Information
|
| 472 |
|
| 473 |
-
This dataset is released under **Creative Commons Attribution 4.0 International (CC-BY-4.0)** license.
|
| 474 |
|
| 475 |
-
**
|
| 476 |
- ✅ Share: Copy and redistribute in any medium or format
|
| 477 |
- ✅ Adapt: Remix, transform, and build upon the material for any purpose
|
| 478 |
- ✅ Commercial use allowed
|
| 479 |
- ⚠️ Attribution required: Must give appropriate credit and indicate if changes were made
|
| 480 |
|
| 481 |
-
**Component Licenses
|
| 482 |
|
| 483 |
-
|
|
|
|
|
|
|
| 484 |
- Original software licenses remain in effect for the binaries themselves
|
| 485 |
-
- Dataset compilation and metadata under CC-BY-4.0
|
|
|
|
| 486 |
|
| 487 |
2. **Windows Binaries**: Microsoft software licenses
|
| 488 |
-
-
|
| 489 |
-
-
|
|
|
|
|
|
|
|
|
|
| 490 |
|
| 491 |
3. **Malware Samples**: From SOREL-20M dataset (Sophos-ReversingLabs)
|
| 492 |
-
- SOREL-20M
|
|
|
|
|
|
|
| 493 |
- No copyright claimed on malware samples themselves
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 494 |
|
| 495 |
**Attribution:**
|
| 496 |
-
When using this dataset, please cite the associated paper (see Citation Information below).
|
| 497 |
|
| 498 |
### Citation Information
|
| 499 |
|
|
@@ -532,8 +552,8 @@ dataset = load_dataset("mjbommar/binary-30k-tokenized")
|
|
| 532 |
```
|
| 533 |
|
| 534 |
**Direct Download:**
|
| 535 |
-
-
|
| 536 |
-
- S3: s3://michaelbommarito.com/resources/glaurung/data/glaurung-model-binaries-20251028.tar.gz
|
| 537 |
- Size: 12.90 GB (compressed)
|
| 538 |
|
| 539 |
### Contributions
|
|
@@ -547,7 +567,7 @@ Special thanks to:
|
|
| 547 |
|
| 548 |
**Contributing:**
|
| 549 |
- Report issues or suggest improvements via GitHub: https://github.com/mjbommar/binary-bpe-paper
|
| 550 |
-
- Contact: michael@
|
| 551 |
|
| 552 |
---
|
| 553 |
|
|
|
|
| 42 |
|
| 43 |
- **Homepage:** [https://michaelbommarito.com/](https://michaelbommarito.com/)
|
| 44 |
- **Repository:** [https://github.com/mjbommar/binary-bpe-paper](https://github.com/mjbommar/binary-bpe-paper)
|
| 45 |
+
- **Paper:** [arXiv:XXXX.XXXXX](https://arxiv.org/abs/XXXX.XXXXX) (to be updated)
|
| 46 |
+
- **Point of Contact:** michael.bommarito@gmail.com
|
| 47 |
|
| 48 |
### Dataset Summary
|
| 49 |
|
|
|
|
| 63 |
- **Binary analysis** via LIEF library (ELF/PE parsing)
|
| 64 |
|
| 65 |
The dataset is stratified across:
|
| 66 |
+
- **Linux binaries** (50.8%): Alpine 3.18/3.19, Debian 11 (Bullseye)/12 (Bookworm), Ubuntu 20.04/22.04/24.04, BusyBox 1.37.0
|
| 67 |
+
- **Windows binaries** (48.0%): Windows 8 Pro, Windows 10, Windows 11, Windows Update Catalog
|
| 68 |
- **Malware samples** (1.2%): From SOREL-20M dataset
|
| 69 |
|
| 70 |
This dataset enables research in malware detection, architecture recognition, function boundary detection, compiler identification, binary similarity analysis, and cross-platform binary understanding.
|
|
|
|
| 273 |
**Linux Binaries (51% of dataset)**
|
| 274 |
|
| 275 |
Collected from official package repositories:
|
| 276 |
+
- **Alpine Linux 3.18** and **3.19**: Lightweight distribution, musl libc-based static binaries
|
| 277 |
+
- **Debian 11 (Bullseye)** and **Debian 12 (Bookworm)**: Stable releases with glibc
|
| 278 |
+
- **Ubuntu 20.04 LTS**, **22.04 LTS**, and **24.04 LTS**: Long-term support releases
|
| 279 |
+
- **BusyBox 1.37.0** (glibc): Embedded systems multi-call binary
|
| 280 |
|
| 281 |
Binaries extracted from .deb packages and Alpine APK packages using standard package management tools.
|
| 282 |
|
| 283 |
**Windows Binaries (48% of dataset)**
|
| 284 |
|
| 285 |
Collected from multiple Windows versions to capture compiler evolution:
|
| 286 |
+
- **Windows 8 Pro (x64)**: System binaries and common applications
|
| 287 |
+
- **Windows 10 (x64)**: Multiple builds covering several years
|
| 288 |
+
- **Windows 11 (x64)**: Latest OS release
|
| 289 |
- **Windows Update Catalog**: System updates and drivers
|
| 290 |
|
| 291 |
Binaries extracted from official Microsoft sources using update catalog and system file extraction.
|
|
|
|
| 294 |
|
| 295 |
Drawn from SOREL-20M dataset:
|
| 296 |
- **SOREL-20M**: Sophos-ReversingLabs 20 million sample malware dataset
|
| 297 |
+
- Source: [https://github.com/sophos/SOREL-20M](https://github.com/sophos/SOREL-20M)
|
| 298 |
+
- License: [SOREL-20M License Agreement](https://github.com/sophos/SOREL-20M/blob/main/LICENSE)
|
| 299 |
+
- Citation: Harang, R. & Rudd, E. M. (2020). SOREL-20M: A Large Scale Benchmark Dataset for Malicious PE Detection
|
| 300 |
- Subset selection: Representative samples across malware families
|
| 301 |
- Deduplication: SHA-256 based to avoid duplicates
|
| 302 |
|
|
|
|
| 418 |
|
| 419 |
**Size Bias:**
|
| 420 |
- File sizes vary widely; very large binaries may be underrepresented
|
| 421 |
+
- Very large binaries (>10MB) may result in long token sequences requiring more computational resources
|
| 422 |
|
| 423 |
**Researchers should:**
|
| 424 |
- Be aware of these biases when drawing conclusions
|
|
|
|
| 432 |
1. **Static Analysis Only**: Dataset contains binaries without runtime behavior
|
| 433 |
- No dynamic analysis features (API calls, network activity, file operations)
|
| 434 |
|
| 435 |
+
2. **Parsing Failures**: Some binaries cannot be parsed by LIEF
|
|
|
|
|
|
|
|
|
|
| 436 |
- Corrupted files, unusual formats, or packers may result in missing metadata
|
| 437 |
|
| 438 |
+
3. **Architecture Detection**: Based on headers, may be incorrect for obfuscated binaries
|
| 439 |
|
| 440 |
+
4. **Stripped Binaries**: Many binaries have debug symbols removed
|
| 441 |
- Limits metadata extraction (fewer function names, no source line info)
|
| 442 |
|
| 443 |
+
5. **Token Sequence Length**: Very large binaries (>10MB) produce long token sequences
|
| 444 |
+
- May require memory-efficient processing techniques or chunking strategies
|
| 445 |
+
- Full binary content is preserved in tokenization without truncation
|
| 446 |
+
|
| 447 |
**Usage Limitations:**
|
| 448 |
|
| 449 |
1. **Malware Handling**: Users must follow security best practices
|
|
|
|
| 454 |
- Users should verify compliance with local laws
|
| 455 |
|
| 456 |
3. **Computational Requirements**: Full dataset requires significant resources
|
| 457 |
+
- 12.90 GB raw data + tokenized dataset with complete metadata
|
| 458 |
+
- Token sequences vary from hundreds to hundreds of thousands of tokens (no truncation applied)
|
| 459 |
+
- Large binaries may require substantial memory for processing full token sequences
|
| 460 |
|
| 461 |
4. **Not a Benchmark**: No standardized train/test splits or evaluation protocol
|
| 462 |
- Users should define splits and protocols appropriate for their research
|
|
|
|
| 468 |
This dataset was curated by:
|
| 469 |
|
| 470 |
**Michael J. Bommarito II**
|
| 471 |
+
- Email: michael.bommarito@gmail.com
|
| 472 |
+
- Website: [https://michaelbommarito.com/](https://michaelbommarito.com/)
|
| 473 |
|
| 474 |
+
All dataset curation, organization, metadata extraction, and documentation by Michael J. Bommarito II.
|
| 475 |
|
| 476 |
### Licensing Information
|
| 477 |
|
| 478 |
+
This dataset compilation is released under **Creative Commons Attribution 4.0 International (CC-BY-4.0)** license by Michael J. Bommarito II.
|
| 479 |
|
| 480 |
+
**Dataset Compilation License (CC-BY-4.0):**
|
| 481 |
- ✅ Share: Copy and redistribute in any medium or format
|
| 482 |
- ✅ Adapt: Remix, transform, and build upon the material for any purpose
|
| 483 |
- ✅ Commercial use allowed
|
| 484 |
- ⚠️ Attribution required: Must give appropriate credit and indicate if changes were made
|
| 485 |
|
| 486 |
+
**Important: Component-Specific Licenses and Legal Considerations**
|
| 487 |
|
| 488 |
+
This dataset contains binary executables from multiple sources, each subject to their own licenses and legal frameworks. Users are responsible for ensuring their use complies with applicable laws and licenses in their jurisdiction.
|
| 489 |
+
|
| 490 |
+
1. **Linux Binaries**: Various open source licenses (GPL, LGPL, MIT, BSD, Apache, etc.)
|
| 491 |
- Original software licenses remain in effect for the binaries themselves
|
| 492 |
+
- Dataset compilation, organization, and metadata under CC-BY-4.0
|
| 493 |
+
- Users should review individual package licenses as needed
|
| 494 |
|
| 495 |
2. **Windows Binaries**: Microsoft software licenses
|
| 496 |
+
- These binaries are subject to Microsoft's software license terms
|
| 497 |
+
- Research and educational use may be covered under fair use/fair dealing doctrines depending on jurisdiction
|
| 498 |
+
- Commercial use may require additional licensing from Microsoft
|
| 499 |
+
- Users are responsible for compliance with Microsoft terms and applicable laws in their jurisdiction
|
| 500 |
+
- Consider consulting legal counsel for commercial applications
|
| 501 |
|
| 502 |
3. **Malware Samples**: From SOREL-20M dataset (Sophos-ReversingLabs)
|
| 503 |
+
- Source: [SOREL-20M GitHub Repository](https://github.com/sophos/SOREL-20M)
|
| 504 |
+
- License: [SOREL-20M License Agreement](https://github.com/sophos/SOREL-20M/blob/main/LICENSE)
|
| 505 |
+
- Users must comply with SOREL-20M's terms of use
|
| 506 |
- No copyright claimed on malware samples themselves
|
| 507 |
+
- Malware samples should only be used in secure, isolated research environments
|
| 508 |
+
|
| 509 |
+
**Recommendations for Users:**
|
| 510 |
+
- **Academic/Research Use**: Generally covered under fair use/fair dealing in most jurisdictions, but verify compliance with institutional policies
|
| 511 |
+
- **Commercial Use**: Consult legal counsel regarding Microsoft binary licenses and other proprietary software
|
| 512 |
+
- **International Use**: Fair use laws vary by jurisdiction; ensure compliance with local regulations
|
| 513 |
+
- **Malware Handling**: Follow cybersecurity best practices and institutional review board requirements
|
| 514 |
|
| 515 |
**Attribution:**
|
| 516 |
+
When using this dataset, please cite the associated paper (see Citation Information below) and acknowledge Michael J. Bommarito II as the dataset curator.
|
| 517 |
|
| 518 |
### Citation Information
|
| 519 |
|
|
|
|
| 552 |
```
|
| 553 |
|
| 554 |
**Direct Download:**
|
| 555 |
+
- HTTPS: https://s3.amazonaws.com/michaelbommarito.com/resources/glaurung/data/glaurung-model-binaries-20251028.tar.gz
|
| 556 |
+
- S3 URI: s3://michaelbommarito.com/resources/glaurung/data/glaurung-model-binaries-20251028.tar.gz
|
| 557 |
- Size: 12.90 GB (compressed)
|
| 558 |
|
| 559 |
### Contributions
|
|
|
|
| 567 |
|
| 568 |
**Contributing:**
|
| 569 |
- Report issues or suggest improvements via GitHub: https://github.com/mjbommar/binary-bpe-paper
|
| 570 |
+
- Contact: michael.bommarito@gmail.com
|
| 571 |
|
| 572 |
---
|
| 573 |
|