Datasets:
Tasks:
Other
Formats:
parquet
Size:
10K - 100K
Tags:
binary-analysis
malware-detection
executable-analysis
binary-tokenization
cybersecurity
reverse-engineering
License:
Upload README.md with huggingface_hub
Browse files
README.md
CHANGED
|
@@ -1,79 +1,548 @@
|
|
| 1 |
---
|
| 2 |
-
|
| 3 |
-
|
| 4 |
-
|
| 5 |
-
|
| 6 |
-
|
| 7 |
-
|
| 8 |
-
|
| 9 |
-
|
| 10 |
-
|
| 11 |
-
|
| 12 |
-
|
| 13 |
-
|
| 14 |
-
|
| 15 |
-
|
| 16 |
-
|
| 17 |
-
dtype: string
|
| 18 |
-
- name: os_family
|
| 19 |
-
dtype: string
|
| 20 |
-
- name: os_version
|
| 21 |
-
dtype: string
|
| 22 |
-
- name: distribution
|
| 23 |
-
dtype: string
|
| 24 |
-
- name: file_format
|
| 25 |
-
dtype: string
|
| 26 |
-
- name: architecture
|
| 27 |
-
dtype: string
|
| 28 |
-
- name: binary_type
|
| 29 |
-
dtype: string
|
| 30 |
-
- name: is_stripped
|
| 31 |
-
dtype: bool
|
| 32 |
-
- name: is_packed
|
| 33 |
-
dtype: bool
|
| 34 |
-
- name: is_signed
|
| 35 |
-
dtype: bool
|
| 36 |
-
- name: sections
|
| 37 |
-
struct:
|
| 38 |
-
- name: name
|
| 39 |
-
list: string
|
| 40 |
-
- name: size
|
| 41 |
-
list: int64
|
| 42 |
-
- name: entropy
|
| 43 |
-
list: float32
|
| 44 |
-
- name: num_sections
|
| 45 |
-
dtype: int32
|
| 46 |
-
- name: code_size
|
| 47 |
-
dtype: int64
|
| 48 |
-
- name: data_size
|
| 49 |
-
dtype: int64
|
| 50 |
-
- name: imports
|
| 51 |
-
list: string
|
| 52 |
-
- name: num_imports
|
| 53 |
-
dtype: int32
|
| 54 |
-
- name: exports
|
| 55 |
-
list: string
|
| 56 |
-
- name: num_exports
|
| 57 |
-
dtype: int32
|
| 58 |
-
- name: entropy
|
| 59 |
-
dtype: float32
|
| 60 |
-
- name: tokens
|
| 61 |
-
list: int32
|
| 62 |
-
- name: token_count
|
| 63 |
-
dtype: int32
|
| 64 |
-
- name: compression_ratio
|
| 65 |
-
dtype: float32
|
| 66 |
-
- name: unique_tokens
|
| 67 |
-
dtype: int32
|
| 68 |
-
splits:
|
| 69 |
-
- name: train
|
| 70 |
-
num_bytes: 18774884823
|
| 71 |
-
num_examples: 30745
|
| 72 |
-
download_size: 7941649176
|
| 73 |
-
dataset_size: 18774884823
|
| 74 |
-
configs:
|
| 75 |
-
- config_name: default
|
| 76 |
-
data_files:
|
| 77 |
-
- split: train
|
| 78 |
-
path: data/train-*
|
| 79 |
---
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
---
|
| 2 |
+
license: cc-by-4.0
|
| 3 |
+
task_categories:
|
| 4 |
+
- other
|
| 5 |
+
tags:
|
| 6 |
+
- binary-analysis
|
| 7 |
+
- malware-detection
|
| 8 |
+
- executable-analysis
|
| 9 |
+
- binary-tokenization
|
| 10 |
+
- cybersecurity
|
| 11 |
+
- reverse-engineering
|
| 12 |
+
- program-analysis
|
| 13 |
+
- cross-platform
|
| 14 |
+
size_categories:
|
| 15 |
+
- 10K<n<100K
|
| 16 |
+
pretty_name: "Binary-30K: A Large-Scale Multi-Platform Binary Dataset"
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 17 |
---
|
| 18 |
+
|
| 19 |
+
# Dataset Card for Binary-30K
|
| 20 |
+
|
| 21 |
+
## Table of Contents
|
| 22 |
+
- [Dataset Description](#dataset-description)
|
| 23 |
+
- [Dataset Summary](#dataset-summary)
|
| 24 |
+
- [Supported Tasks](#supported-tasks)
|
| 25 |
+
- [Languages](#languages)
|
| 26 |
+
- [Dataset Structure](#dataset-structure)
|
| 27 |
+
- [Data Instances](#data-instances)
|
| 28 |
+
- [Data Fields](#data-fields)
|
| 29 |
+
- [Data Splits](#data-splits)
|
| 30 |
+
- [Dataset Creation](#dataset-creation)
|
| 31 |
+
- [Curation Rationale](#curation-rationale)
|
| 32 |
+
- [Source Data](#source-data)
|
| 33 |
+
- [Considerations for Using the Data](#considerations-for-using-the-data)
|
| 34 |
+
- [Social Impact of Dataset](#social-impact-of-dataset)
|
| 35 |
+
- [Discussion of Biases](#discussion-of-biases)
|
| 36 |
+
- [Additional Information](#additional-information)
|
| 37 |
+
- [Dataset Curators](#dataset-curators)
|
| 38 |
+
- [Licensing Information](#licensing-information)
|
| 39 |
+
- [Citation Information](#citation-information)
|
| 40 |
+
|
| 41 |
+
## Dataset Description
|
| 42 |
+
|
| 43 |
+
- **Homepage:** [https://michaelbommarito.com/](https://michaelbommarito.com/)
|
| 44 |
+
- **Repository:** [https://github.com/mjbommar/binary-bpe-paper](https://github.com/mjbommar/binary-bpe-paper)
|
| 45 |
+
- **Paper:** Binary-30K: A Large-Scale Multi-Platform Binary Dataset for Machine Learning Research
|
| 46 |
+
- **Point of Contact:** michael@bommaritollc.com
|
| 47 |
+
|
| 48 |
+
### Dataset Summary
|
| 49 |
+
|
| 50 |
+
Binary-30K is a comprehensive, multi-platform binary executable dataset designed for machine learning research in binary analysis, malware detection, and program understanding. The dataset contains **30,841 binary executables** totaling **12.90 GB**, collected from diverse sources including Linux distributions, Windows operating systems, and the SOREL-20M malware dataset.
|
| 51 |
+
|
| 52 |
+
Each binary in the dataset has been pre-processed with:
|
| 53 |
+
- **Pre-computed BPE tokenization** using the `mjbommar/glaurung-binary-tokenizer-001` tokenizer
|
| 54 |
+
- **Comprehensive metadata extraction** including file format, architecture, sections, imports/exports
|
| 55 |
+
- **Entropy analysis** for complexity measurement
|
| 56 |
+
- **Platform and OS detection** from file paths
|
| 57 |
+
- **Binary analysis** via LIEF library (ELF/PE parsing)
|
| 58 |
+
|
| 59 |
+
The dataset is stratified across:
|
| 60 |
+
- **Linux binaries** (51%): Alpine 3.18, Debian 11/12, Ubuntu 20.04/22.04, BusyBox
|
| 61 |
+
- **Windows binaries** (48%): Windows 8, 10, 11, Windows Update Catalog
|
| 62 |
+
- **Malware samples** (1%): From SOREL-20M dataset
|
| 63 |
+
|
| 64 |
+
This dataset enables research in malware detection, architecture recognition, function boundary detection, compiler identification, binary similarity analysis, and cross-platform binary understanding.
|
| 65 |
+
|
| 66 |
+
### Supported Tasks
|
| 67 |
+
|
| 68 |
+
**Binary Malware Detection**
|
| 69 |
+
- Task: Binary classification (benign vs malicious)
|
| 70 |
+
- Metrics: Accuracy, Precision, Recall, F1-score, AUC-ROC
|
| 71 |
+
- Suggested Models: Transformer-based sequence models, CNN-based models
|
| 72 |
+
- Use Case: Detect malicious executables using token sequences and metadata features
|
| 73 |
+
|
| 74 |
+
**Architecture Recognition**
|
| 75 |
+
- Task: Multi-class classification (x86, x86-64, ARM, ARM64, etc.)
|
| 76 |
+
- Metrics: Top-1 accuracy, confusion matrix
|
| 77 |
+
- Suggested Models: CNN, Transformer encoder
|
| 78 |
+
- Use Case: Identify target architecture from binary content
|
| 79 |
+
|
| 80 |
+
**Platform/OS Detection**
|
| 81 |
+
- Task: Multi-class classification (Linux/Windows/malware, OS versions)
|
| 82 |
+
- Metrics: Hierarchical accuracy (platform, OS family, version)
|
| 83 |
+
- Suggested Models: Hierarchical classifiers, multi-task learning
|
| 84 |
+
- Use Case: Determine origin platform and OS version
|
| 85 |
+
|
| 86 |
+
**Function Boundary Detection**
|
| 87 |
+
- Task: Sequence labeling (token-level classification)
|
| 88 |
+
- Metrics: Precision/Recall at function boundaries, Intersection over Union
|
| 89 |
+
- Suggested Models: BiLSTM-CRF, Transformer with token classification head
|
| 90 |
+
- Use Case: Identify function boundaries in stripped binaries
|
| 91 |
+
|
| 92 |
+
**Compiler Identification**
|
| 93 |
+
- Task: Multi-class classification
|
| 94 |
+
- Metrics: Per-compiler accuracy
|
| 95 |
+
- Suggested Models: Feature-based classifiers, attention-based models
|
| 96 |
+
- Use Case: Determine compiler and optimization level
|
| 97 |
+
|
| 98 |
+
**Binary Similarity Search**
|
| 99 |
+
- Task: Embedding learning, similarity ranking
|
| 100 |
+
- Metrics: Mean Average Precision (MAP), Recall@K
|
| 101 |
+
- Suggested Models: Siamese networks, contrastive learning
|
| 102 |
+
- Use Case: Find similar binaries for library identification or code reuse detection
|
| 103 |
+
|
| 104 |
+
### Languages
|
| 105 |
+
|
| 106 |
+
This dataset contains compiled binary executables (machine code), not natural language text. The binaries were compiled from source code originally written in various programming languages (C, C++, Rust, Go, etc.), but the dataset itself consists of binary executable formats (ELF and PE).
|
| 107 |
+
|
| 108 |
+
## Dataset Structure
|
| 109 |
+
|
| 110 |
+
### Data Instances
|
| 111 |
+
|
| 112 |
+
Each instance represents one binary executable with comprehensive metadata and pre-computed tokenization:
|
| 113 |
+
|
| 114 |
+
```python
|
| 115 |
+
{
|
| 116 |
+
# File Identification (6 fields)
|
| 117 |
+
'file_id': 'alpine3.18_linux-amd64_busybox_1.36.1-r0_busybox',
|
| 118 |
+
'file_path': 'alpine3.18/linux-amd64/busybox_1.36.1-r0/busybox',
|
| 119 |
+
'file_name': 'busybox',
|
| 120 |
+
'sha256': 'a1b2c3d4e5f6...',
|
| 121 |
+
'md5': 'f1e2d3c4b5a6...',
|
| 122 |
+
'file_size': 1048576,
|
| 123 |
+
|
| 124 |
+
# Platform Detection (4 fields)
|
| 125 |
+
'platform': 'linux',
|
| 126 |
+
'os_family': 'alpine',
|
| 127 |
+
'os_version': '3.18',
|
| 128 |
+
'distribution': 'alpine3.18',
|
| 129 |
+
|
| 130 |
+
# Binary Characteristics (6 fields)
|
| 131 |
+
'file_format': 'ELF64',
|
| 132 |
+
'architecture': 'x86-64',
|
| 133 |
+
'binary_type': 'executable',
|
| 134 |
+
'is_stripped': True,
|
| 135 |
+
'is_packed': False,
|
| 136 |
+
'is_signed': False,
|
| 137 |
+
|
| 138 |
+
# Structural Analysis (4 fields + sections)
|
| 139 |
+
'sections': [
|
| 140 |
+
{'name': '.text', 'size': 524288, 'entropy': 7.892},
|
| 141 |
+
{'name': '.data', 'size': 65536, 'entropy': 3.245},
|
| 142 |
+
...
|
| 143 |
+
],
|
| 144 |
+
'num_sections': 12,
|
| 145 |
+
'code_size': 524288,
|
| 146 |
+
'data_size': 131072,
|
| 147 |
+
|
| 148 |
+
# Dependencies (4 fields + imports/exports)
|
| 149 |
+
'imports': ['printf', 'malloc', 'free', ...],
|
| 150 |
+
'num_imports': 245,
|
| 151 |
+
'exports': ['main', 'init_function', ...],
|
| 152 |
+
'num_exports': 18,
|
| 153 |
+
|
| 154 |
+
# Complexity Metrics (1 field)
|
| 155 |
+
'entropy': 7.234,
|
| 156 |
+
|
| 157 |
+
# Tokenization (4 fields)
|
| 158 |
+
'tokens': [1234, 5678, 9012, ...], # BPE token IDs
|
| 159 |
+
'token_count': 8192,
|
| 160 |
+
'compression_ratio': 2.45, # bytes per token
|
| 161 |
+
'unique_tokens': 1523
|
| 162 |
+
}
|
| 163 |
+
```
|
| 164 |
+
|
| 165 |
+
### Data Fields
|
| 166 |
+
|
| 167 |
+
The dataset contains **29 metadata fields** organized into 7 categories:
|
| 168 |
+
|
| 169 |
+
#### File Identification
|
| 170 |
+
- `file_id` (string): Unique identifier constructed from path components
|
| 171 |
+
- `file_path` (string): Relative path from dataset root
|
| 172 |
+
- `file_name` (string): Binary filename
|
| 173 |
+
- `sha256` (string): SHA-256 hash of file contents
|
| 174 |
+
- `md5` (string): MD5 hash of file contents
|
| 175 |
+
- `file_size` (int64): File size in bytes
|
| 176 |
+
|
| 177 |
+
#### Platform Information
|
| 178 |
+
- `platform` (string): Platform category: 'linux', 'windows', or 'malware'
|
| 179 |
+
- `os_family` (string): OS family (alpine, debian, ubuntu, busybox, windows, sorel-20m)
|
| 180 |
+
- `os_version` (string): OS version string (e.g., '3.18', '11', '20.04', '10')
|
| 181 |
+
- `distribution` (string): Full distribution identifier
|
| 182 |
+
|
| 183 |
+
#### Binary Characteristics
|
| 184 |
+
- `file_format` (string): Binary format (ELF32, ELF64, PE32, PE32+, or 'unknown')
|
| 185 |
+
- `architecture` (string): Target architecture (x86, x86-64, ARM, ARM64, MIPS, etc.)
|
| 186 |
+
- `binary_type` (string): Binary type (executable, library, driver, object, or 'unknown')
|
| 187 |
+
- `is_stripped` (bool): Whether debug symbols are stripped
|
| 188 |
+
- `is_packed` (bool): Whether binary appears packed/compressed
|
| 189 |
+
- `is_signed` (bool): Whether binary has code signature
|
| 190 |
+
|
| 191 |
+
#### Structural Analysis
|
| 192 |
+
- `sections` (list of dicts): List of binary sections with:
|
| 193 |
+
- `name` (string): Section name (.text, .data, .rodata, etc.)
|
| 194 |
+
- `size` (int64): Section size in bytes
|
| 195 |
+
- `entropy` (float32): Shannon entropy of section contents
|
| 196 |
+
- `num_sections` (int32): Total number of sections
|
| 197 |
+
- `code_size` (int64): Total size of executable code sections
|
| 198 |
+
- `data_size` (int64): Total size of data sections
|
| 199 |
+
|
| 200 |
+
#### Dependencies
|
| 201 |
+
- `imports` (list of strings): Imported function names
|
| 202 |
+
- `num_imports` (int32): Count of imported functions
|
| 203 |
+
- `exports` (list of strings): Exported function names
|
| 204 |
+
- `num_exports` (int32): Count of exported functions
|
| 205 |
+
|
| 206 |
+
#### Complexity Metrics
|
| 207 |
+
- `entropy` (float32): Shannon entropy of entire binary (0.0 to 8.0)
|
| 208 |
+
|
| 209 |
+
#### Pre-computed Tokenization
|
| 210 |
+
- `tokens` (list of int32): BPE token IDs from `mjbommar/glaurung-binary-tokenizer-001`
|
| 211 |
+
- `token_count` (int32): Total number of tokens
|
| 212 |
+
- `compression_ratio` (float32): Bytes per token (file_size / token_count)
|
| 213 |
+
- `unique_tokens` (int32): Count of unique token IDs in sequence
|
| 214 |
+
|
| 215 |
+
### Data Splits
|
| 216 |
+
|
| 217 |
+
The dataset is provided as a single collection of 30,841 binaries. Users should create their own train/validation/test splits based on their research needs. We recommend stratified splitting to maintain platform distribution:
|
| 218 |
+
|
| 219 |
+
**Recommended Split (70/15/15):**
|
| 220 |
+
```python
|
| 221 |
+
from datasets import load_dataset
|
| 222 |
+
|
| 223 |
+
dataset = load_dataset("mjbommar/binary-30k-tokenized")
|
| 224 |
+
|
| 225 |
+
# Stratified split maintaining platform balance
|
| 226 |
+
train_test = dataset['train'].train_test_split(test_size=0.3, seed=42, stratify_by_column='platform')
|
| 227 |
+
train_val = train_test['train'].train_test_split(test_size=0.214, seed=42, stratify_by_column='platform')
|
| 228 |
+
|
| 229 |
+
train = train_val['train'] # ~21,588 samples (70%)
|
| 230 |
+
val = train_val['test'] # ~4,626 samples (15%)
|
| 231 |
+
test = train_test['test'] # ~4,627 samples (15%)
|
| 232 |
+
```
|
| 233 |
+
|
| 234 |
+
**Distribution Statistics:**
|
| 235 |
+
- Linux binaries: ~15,659 (51%)
|
| 236 |
+
- Windows binaries: ~14,815 (48%)
|
| 237 |
+
- Malware samples: ~367 (1%)
|
| 238 |
+
|
| 239 |
+
## Dataset Creation
|
| 240 |
+
|
| 241 |
+
### Curation Rationale
|
| 242 |
+
|
| 243 |
+
Binary-30K was created to address the lack of large-scale, multi-platform binary datasets for machine learning research. Existing binary analysis datasets often suffer from:
|
| 244 |
+
- Limited platform coverage (single OS)
|
| 245 |
+
- Small scale (hundreds or thousands of samples)
|
| 246 |
+
- Lack of metadata and pre-processing
|
| 247 |
+
- Closed/proprietary access
|
| 248 |
+
|
| 249 |
+
This dataset provides:
|
| 250 |
+
1. **Cross-platform representation**: Both Linux and Windows binaries from multiple distributions
|
| 251 |
+
2. **Diverse architectures**: x86, x86-64, ARM, ARM64 coverage
|
| 252 |
+
3. **Rich metadata**: 29 fields per binary for fine-grained analysis
|
| 253 |
+
4. **Pre-computed tokenization**: Ready for transformer-based models
|
| 254 |
+
5. **Open access**: CC-BY-4.0 license with public availability
|
| 255 |
+
|
| 256 |
+
The dataset enables research in:
|
| 257 |
+
- Cross-platform malware detection
|
| 258 |
+
- Architecture-agnostic binary analysis
|
| 259 |
+
- Transfer learning between platforms
|
| 260 |
+
- Tokenization-based binary understanding
|
| 261 |
+
- Large-scale binary similarity analysis
|
| 262 |
+
|
| 263 |
+
### Source Data
|
| 264 |
+
|
| 265 |
+
#### Initial Data Collection and Normalization
|
| 266 |
+
|
| 267 |
+
**Linux Binaries (51% of dataset)**
|
| 268 |
+
|
| 269 |
+
Collected from official package repositories:
|
| 270 |
+
- **Alpine Linux 3.18**: Lightweight distribution, static binaries
|
| 271 |
+
- **Debian 11 (Bullseye)** and **Debian 12 (Bookworm)**: Stable releases
|
| 272 |
+
- **Ubuntu 20.04 LTS** and **Ubuntu 22.04 LTS**: Long-term support releases
|
| 273 |
+
- **BusyBox**: Embedded systems binaries
|
| 274 |
+
|
| 275 |
+
Binaries extracted from .deb packages and Alpine APK packages using standard package management tools.
|
| 276 |
+
|
| 277 |
+
**Windows Binaries (48% of dataset)**
|
| 278 |
+
|
| 279 |
+
Collected from multiple Windows versions to capture compiler evolution:
|
| 280 |
+
- **Windows 8**: System binaries and common applications
|
| 281 |
+
- **Windows 10**: Multiple builds covering several years
|
| 282 |
+
- **Windows 11**: Latest OS release
|
| 283 |
+
- **Windows Update Catalog**: System updates and drivers
|
| 284 |
+
|
| 285 |
+
Binaries extracted from official Microsoft sources using update catalog and system file extraction.
|
| 286 |
+
|
| 287 |
+
**Malware Samples (1% of dataset)**
|
| 288 |
+
|
| 289 |
+
Drawn from SOREL-20M dataset:
|
| 290 |
+
- **SOREL-20M**: Sophos-ReversingLabs 20 million sample malware dataset
|
| 291 |
+
- Subset selection: Representative samples across malware families
|
| 292 |
+
- Deduplication: SHA-256 based to avoid duplicates
|
| 293 |
+
|
| 294 |
+
All samples handled in isolated environment following malware analysis best practices.
|
| 295 |
+
|
| 296 |
+
#### Source Language Producers
|
| 297 |
+
|
| 298 |
+
The binaries were originally compiled from source code written by:
|
| 299 |
+
- **Open source developers**: Linux distribution maintainers and package maintainers
|
| 300 |
+
- **Microsoft engineers**: Windows operating system and system tool developers
|
| 301 |
+
- **Malware authors**: For malicious samples in SOREL-20M subset
|
| 302 |
+
|
| 303 |
+
The source code languages include C, C++, Rust, Go, Assembly, and others, though the dataset contains only the compiled binary forms.
|
| 304 |
+
|
| 305 |
+
### Annotations
|
| 306 |
+
|
| 307 |
+
#### Annotation Process
|
| 308 |
+
|
| 309 |
+
The dataset includes two types of metadata:
|
| 310 |
+
|
| 311 |
+
**Automatic Metadata Extraction:**
|
| 312 |
+
- Platform/OS detection: Inferred from directory structure and file paths
|
| 313 |
+
- Binary format analysis: Extracted using LIEF library
|
| 314 |
+
- Architecture detection: From binary headers (ELF/PE)
|
| 315 |
+
- Section analysis: Parsed from binary structure
|
| 316 |
+
- Import/export extraction: From symbol tables and import tables
|
| 317 |
+
- Entropy calculation: Shannon entropy computed on raw bytes
|
| 318 |
+
- Tokenization: Pre-computed using BPE tokenizer
|
| 319 |
+
|
| 320 |
+
**Manual Curation:**
|
| 321 |
+
- Dataset organization: Files organized by platform, OS, and distribution
|
| 322 |
+
- Quality control: Verification of parseable formats
|
| 323 |
+
- Deduplication: SHA-256 based duplicate removal
|
| 324 |
+
|
| 325 |
+
No human annotations for labels (malware/benign, function boundaries, etc.) are included. The `platform` field provides ground truth for Linux/Windows/malware categories based on source.
|
| 326 |
+
|
| 327 |
+
#### Who are the Annotators?
|
| 328 |
+
|
| 329 |
+
The automatic metadata was extracted programmatically using:
|
| 330 |
+
- **LIEF library** (v0.14.0+): Binary parsing and analysis
|
| 331 |
+
- **Custom extraction scripts**: Platform detection, entropy calculation
|
| 332 |
+
- **HuggingFace tokenizers** (v0.15.0+): BPE tokenization with `mjbommar/glaurung-binary-tokenizer-001`
|
| 333 |
+
|
| 334 |
+
Dataset curation and organization performed by the dataset authors.
|
| 335 |
+
|
| 336 |
+
### Personal and Sensitive Information
|
| 337 |
+
|
| 338 |
+
The dataset contains compiled binary executables. Potential sensitive information:
|
| 339 |
+
|
| 340 |
+
**System Paths:**
|
| 341 |
+
- Some binaries may contain embedded paths from build systems
|
| 342 |
+
- Debug information (if not stripped) may include developer usernames/paths
|
| 343 |
+
- These are typical artifacts of compilation and not considered sensitive
|
| 344 |
+
|
| 345 |
+
**Function Names:**
|
| 346 |
+
- Exported function names are included in metadata
|
| 347 |
+
- These are standard API/system calls, not sensitive
|
| 348 |
+
|
| 349 |
+
**Malware Samples:**
|
| 350 |
+
- Malware binaries included are from public SOREL-20M dataset
|
| 351 |
+
- No personal victim data included
|
| 352 |
+
- Samples are widely analyzed in security research community
|
| 353 |
+
|
| 354 |
+
**No User Data:**
|
| 355 |
+
- No user-generated content or personal documents
|
| 356 |
+
- No login credentials, API keys, or secrets
|
| 357 |
+
- No personally identifiable information (PII)
|
| 358 |
+
|
| 359 |
+
## Considerations for Using the Data
|
| 360 |
+
|
| 361 |
+
### Social Impact of Dataset
|
| 362 |
+
|
| 363 |
+
**Positive Impacts:**
|
| 364 |
+
|
| 365 |
+
1. **Defensive Security**: Enables development of better malware detection systems
|
| 366 |
+
2. **Binary Analysis Research**: Accelerates research in program analysis and reverse engineering
|
| 367 |
+
3. **Cross-platform Understanding**: Facilitates development of platform-agnostic analysis tools
|
| 368 |
+
4. **Open Science**: Provides open dataset where previously proprietary/closed datasets dominated
|
| 369 |
+
5. **Educational Value**: Supports teaching of binary analysis, cybersecurity, and ML applications
|
| 370 |
+
|
| 371 |
+
**Potential Concerns:**
|
| 372 |
+
|
| 373 |
+
1. **Dual-Use Nature**: Techniques developed could potentially be used by malicious actors
|
| 374 |
+
- Mitigation: Dataset focuses on detection/analysis, not creation of malware
|
| 375 |
+
|
| 376 |
+
2. **Malware Inclusion**: Contains real malware samples
|
| 377 |
+
- Mitigation: Small subset (1%), from public SOREL-20M, no execution required for ML use
|
| 378 |
+
- Users should handle malware samples with appropriate security precautions
|
| 379 |
+
|
| 380 |
+
3. **Adversarial Learning**: Could be used to develop evasion techniques
|
| 381 |
+
- Mitigation: Open datasets enable defensive research to stay ahead of attacks
|
| 382 |
+
|
| 383 |
+
### Discussion of Biases
|
| 384 |
+
|
| 385 |
+
**Platform Bias:**
|
| 386 |
+
- Linux (51%) and Windows (48%) are balanced, but represent only two major platforms
|
| 387 |
+
- MacOS, mobile platforms (iOS/Android), and embedded systems not represented
|
| 388 |
+
- This may limit generalization to other platforms
|
| 389 |
+
|
| 390 |
+
**Architecture Bias:**
|
| 391 |
+
- Dominated by x86-64 architecture
|
| 392 |
+
- Limited ARM samples despite ARM's growing importance (mobile, IoT, Apple Silicon)
|
| 393 |
+
- Other architectures (MIPS, RISC-V) minimally represented
|
| 394 |
+
|
| 395 |
+
**Temporal Bias:**
|
| 396 |
+
- Windows samples span Windows 8-11 (2012-2023)
|
| 397 |
+
- Linux samples from 2020-2024 distributions
|
| 398 |
+
- May not represent historical (pre-2010) or future compilation patterns
|
| 399 |
+
|
| 400 |
+
**Distribution Bias:**
|
| 401 |
+
- Linux samples from Debian-based distributions (Debian, Ubuntu) and Alpine
|
| 402 |
+
- Other distributions (RedHat, Arch, Gentoo) not represented
|
| 403 |
+
- May not capture distribution-specific toolchain differences
|
| 404 |
+
|
| 405 |
+
**Malware Bias:**
|
| 406 |
+
- Malware samples only 1% of dataset (class imbalance)
|
| 407 |
+
- Malware from SOREL-20M (2020 collection) may not represent current threats
|
| 408 |
+
- Geographic/language bias in malware samples from original SOREL-20M
|
| 409 |
+
|
| 410 |
+
**Size Bias:**
|
| 411 |
+
- File sizes vary widely; very large binaries may be underrepresented
|
| 412 |
+
- Tokenization truncation may affect very large files (>1MB)
|
| 413 |
+
|
| 414 |
+
**Researchers should:**
|
| 415 |
+
- Be aware of these biases when drawing conclusions
|
| 416 |
+
- Validate findings on additional out-of-distribution datasets
|
| 417 |
+
- Consider stratified sampling based on platform/architecture for balanced experiments
|
| 418 |
+
|
| 419 |
+
### Other Known Limitations
|
| 420 |
+
|
| 421 |
+
**Technical Limitations:**
|
| 422 |
+
|
| 423 |
+
1. **Static Analysis Only**: Dataset contains binaries without runtime behavior
|
| 424 |
+
- No dynamic analysis features (API calls, network activity, file operations)
|
| 425 |
+
|
| 426 |
+
2. **Tokenization Context Window**: Very large binaries truncated during tokenization
|
| 427 |
+
- May lose information from files >1-2MB after tokenization
|
| 428 |
+
|
| 429 |
+
3. **Parsing Failures**: Some binaries cannot be parsed by LIEF
|
| 430 |
+
- Corrupted files, unusual formats, or packers may result in missing metadata
|
| 431 |
+
|
| 432 |
+
4. **Architecture Detection**: Based on headers, may be incorrect for obfuscated binaries
|
| 433 |
+
|
| 434 |
+
5. **Stripped Binaries**: Many binaries have debug symbols removed
|
| 435 |
+
- Limits metadata extraction (fewer function names, no source line info)
|
| 436 |
+
|
| 437 |
+
**Usage Limitations:**
|
| 438 |
+
|
| 439 |
+
1. **Malware Handling**: Users must follow security best practices
|
| 440 |
+
- Isolated environments, no execution required for dataset use
|
| 441 |
+
|
| 442 |
+
2. **Legal Considerations**: Windows binaries subject to Microsoft licensing
|
| 443 |
+
- Research/educational use should be covered under fair use
|
| 444 |
+
- Users should verify compliance with local laws
|
| 445 |
+
|
| 446 |
+
3. **Computational Requirements**: Full dataset requires significant resources
|
| 447 |
+
- 12.90 GB raw data + 15-20 GB tokenized dataset
|
| 448 |
+
- Token sequences can be very long (10K+ tokens)
|
| 449 |
+
|
| 450 |
+
4. **Not a Benchmark**: No standardized train/test splits or evaluation protocol
|
| 451 |
+
- Users should define splits and protocols appropriate for their research
|
| 452 |
+
|
| 453 |
+
## Additional Information
|
| 454 |
+
|
| 455 |
+
### Dataset Curators
|
| 456 |
+
|
| 457 |
+
This dataset was curated by:
|
| 458 |
+
|
| 459 |
+
**Michael J. Bommarito II**
|
| 460 |
+
- Email: michael@bommaritollc.com
|
| 461 |
+
- Affiliation: Bommarito Consulting, LLC
|
| 462 |
+
|
| 463 |
+
With contributions from collaborators in the binary analysis and machine learning research communities.
|
| 464 |
+
|
| 465 |
+
### Licensing Information
|
| 466 |
+
|
| 467 |
+
This dataset is released under **Creative Commons Attribution 4.0 International (CC-BY-4.0)** license.
|
| 468 |
+
|
| 469 |
+
**Summary:**
|
| 470 |
+
- ✅ Share: Copy and redistribute in any medium or format
|
| 471 |
+
- ✅ Adapt: Remix, transform, and build upon the material for any purpose
|
| 472 |
+
- ✅ Commercial use allowed
|
| 473 |
+
- ⚠️ Attribution required: Must give appropriate credit and indicate if changes were made
|
| 474 |
+
|
| 475 |
+
**Component Licenses:**
|
| 476 |
+
|
| 477 |
+
1. **Linux Binaries**: Various open source licenses (GPL, LGPL, MIT, BSD, Apache)
|
| 478 |
+
- Original software licenses remain in effect for the binaries themselves
|
| 479 |
+
- Dataset compilation and metadata under CC-BY-4.0
|
| 480 |
+
|
| 481 |
+
2. **Windows Binaries**: Microsoft software licenses
|
| 482 |
+
- Research and educational use covered under fair use
|
| 483 |
+
- Users responsible for compliance with Microsoft terms
|
| 484 |
+
|
| 485 |
+
3. **Malware Samples**: From SOREL-20M dataset (Sophos-ReversingLabs)
|
| 486 |
+
- SOREL-20M released for research purposes
|
| 487 |
+
- No copyright claimed on malware samples themselves
|
| 488 |
+
|
| 489 |
+
**Attribution:**
|
| 490 |
+
When using this dataset, please cite the associated paper (see Citation Information below).
|
| 491 |
+
|
| 492 |
+
### Citation Information
|
| 493 |
+
|
| 494 |
+
If you use this dataset in your research, please cite:
|
| 495 |
+
|
| 496 |
+
```bibtex
|
| 497 |
+
@article{bommarito2025binary30k,
|
| 498 |
+
title={Binary-30K: A Large-Scale Multi-Platform Binary Dataset for Machine Learning Research},
|
| 499 |
+
author={Bommarito, Michael J., II},
|
| 500 |
+
journal={arXiv preprint},
|
| 501 |
+
year={2025},
|
| 502 |
+
url={https://github.com/mjbommar/binary-bpe-paper}
|
| 503 |
+
}
|
| 504 |
+
```
|
| 505 |
+
|
| 506 |
+
**Related Publications:**
|
| 507 |
+
|
| 508 |
+
For information about the BPE tokenizer used for pre-processing:
|
| 509 |
+
|
| 510 |
+
```bibtex
|
| 511 |
+
@article{bommarito2025binarybpe,
|
| 512 |
+
title={Byte Pair Encoding for Binary Executables: A Large-Scale Analysis},
|
| 513 |
+
author={Bommarito, Michael J., II},
|
| 514 |
+
journal={arXiv preprint},
|
| 515 |
+
year={2025},
|
| 516 |
+
url={https://github.com/mjbommar/binary-bpe-paper}
|
| 517 |
+
}
|
| 518 |
+
```
|
| 519 |
+
|
| 520 |
+
### Dataset Access
|
| 521 |
+
|
| 522 |
+
**HuggingFace Hub:**
|
| 523 |
+
```python
|
| 524 |
+
from datasets import load_dataset
|
| 525 |
+
dataset = load_dataset("mjbommar/binary-30k-tokenized")
|
| 526 |
+
```
|
| 527 |
+
|
| 528 |
+
**Direct Download:**
|
| 529 |
+
- HTTP: https://michaelbommarito.com/resources/glaurung/data/glaurung-model-binaries-20251028.tar.gz
|
| 530 |
+
- S3: s3://michaelbommarito.com/resources/glaurung/data/glaurung-model-binaries-20251028.tar.gz
|
| 531 |
+
- Size: 12.90 GB (compressed)
|
| 532 |
+
|
| 533 |
+
### Contributions
|
| 534 |
+
|
| 535 |
+
Thanks to the open source community, Linux distribution maintainers, and the SOREL-20M team for making their data available for research.
|
| 536 |
+
|
| 537 |
+
Special thanks to:
|
| 538 |
+
- HuggingFace for datasets and tokenizers libraries
|
| 539 |
+
- LIEF project for binary parsing tools
|
| 540 |
+
- The binary analysis and malware research communities
|
| 541 |
+
|
| 542 |
+
**Contributing:**
|
| 543 |
+
- Report issues or suggest improvements via GitHub: https://github.com/mjbommar/binary-bpe-paper
|
| 544 |
+
- Contact: michael@bommaritollc.com
|
| 545 |
+
|
| 546 |
+
---
|
| 547 |
+
|
| 548 |
+
**Last Updated:** October 28, 2025
|