mjbommar commited on
Commit
567a089
·
verified ·
1 Parent(s): b62fda2

Upload README.md with huggingface_hub

Browse files
Files changed (1) hide show
  1. README.md +546 -77
README.md CHANGED
@@ -1,79 +1,548 @@
1
  ---
2
- dataset_info:
3
- features:
4
- - name: file_id
5
- dtype: string
6
- - name: file_path
7
- dtype: string
8
- - name: file_name
9
- dtype: string
10
- - name: sha256
11
- dtype: string
12
- - name: md5
13
- dtype: string
14
- - name: file_size
15
- dtype: int64
16
- - name: platform
17
- dtype: string
18
- - name: os_family
19
- dtype: string
20
- - name: os_version
21
- dtype: string
22
- - name: distribution
23
- dtype: string
24
- - name: file_format
25
- dtype: string
26
- - name: architecture
27
- dtype: string
28
- - name: binary_type
29
- dtype: string
30
- - name: is_stripped
31
- dtype: bool
32
- - name: is_packed
33
- dtype: bool
34
- - name: is_signed
35
- dtype: bool
36
- - name: sections
37
- struct:
38
- - name: name
39
- list: string
40
- - name: size
41
- list: int64
42
- - name: entropy
43
- list: float32
44
- - name: num_sections
45
- dtype: int32
46
- - name: code_size
47
- dtype: int64
48
- - name: data_size
49
- dtype: int64
50
- - name: imports
51
- list: string
52
- - name: num_imports
53
- dtype: int32
54
- - name: exports
55
- list: string
56
- - name: num_exports
57
- dtype: int32
58
- - name: entropy
59
- dtype: float32
60
- - name: tokens
61
- list: int32
62
- - name: token_count
63
- dtype: int32
64
- - name: compression_ratio
65
- dtype: float32
66
- - name: unique_tokens
67
- dtype: int32
68
- splits:
69
- - name: train
70
- num_bytes: 18774884823
71
- num_examples: 30745
72
- download_size: 7941649176
73
- dataset_size: 18774884823
74
- configs:
75
- - config_name: default
76
- data_files:
77
- - split: train
78
- path: data/train-*
79
  ---
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
  ---
2
+ license: cc-by-4.0
3
+ task_categories:
4
+ - other
5
+ tags:
6
+ - binary-analysis
7
+ - malware-detection
8
+ - executable-analysis
9
+ - binary-tokenization
10
+ - cybersecurity
11
+ - reverse-engineering
12
+ - program-analysis
13
+ - cross-platform
14
+ size_categories:
15
+ - 10K<n<100K
16
+ pretty_name: "Binary-30K: A Large-Scale Multi-Platform Binary Dataset"
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
17
  ---
18
+
19
+ # Dataset Card for Binary-30K
20
+
21
+ ## Table of Contents
22
+ - [Dataset Description](#dataset-description)
23
+ - [Dataset Summary](#dataset-summary)
24
+ - [Supported Tasks](#supported-tasks)
25
+ - [Languages](#languages)
26
+ - [Dataset Structure](#dataset-structure)
27
+ - [Data Instances](#data-instances)
28
+ - [Data Fields](#data-fields)
29
+ - [Data Splits](#data-splits)
30
+ - [Dataset Creation](#dataset-creation)
31
+ - [Curation Rationale](#curation-rationale)
32
+ - [Source Data](#source-data)
33
+ - [Considerations for Using the Data](#considerations-for-using-the-data)
34
+ - [Social Impact of Dataset](#social-impact-of-dataset)
35
+ - [Discussion of Biases](#discussion-of-biases)
36
+ - [Additional Information](#additional-information)
37
+ - [Dataset Curators](#dataset-curators)
38
+ - [Licensing Information](#licensing-information)
39
+ - [Citation Information](#citation-information)
40
+
41
+ ## Dataset Description
42
+
43
+ - **Homepage:** [https://michaelbommarito.com/](https://michaelbommarito.com/)
44
+ - **Repository:** [https://github.com/mjbommar/binary-bpe-paper](https://github.com/mjbommar/binary-bpe-paper)
45
+ - **Paper:** Binary-30K: A Large-Scale Multi-Platform Binary Dataset for Machine Learning Research
46
+ - **Point of Contact:** michael@bommaritollc.com
47
+
48
+ ### Dataset Summary
49
+
50
+ Binary-30K is a comprehensive, multi-platform binary executable dataset designed for machine learning research in binary analysis, malware detection, and program understanding. The dataset contains **30,841 binary executables** totaling **12.90 GB**, collected from diverse sources including Linux distributions, Windows operating systems, and the SOREL-20M malware dataset.
51
+
52
+ Each binary in the dataset has been pre-processed with:
53
+ - **Pre-computed BPE tokenization** using the `mjbommar/glaurung-binary-tokenizer-001` tokenizer
54
+ - **Comprehensive metadata extraction** including file format, architecture, sections, imports/exports
55
+ - **Entropy analysis** for complexity measurement
56
+ - **Platform and OS detection** from file paths
57
+ - **Binary analysis** via LIEF library (ELF/PE parsing)
58
+
59
+ The dataset is stratified across:
60
+ - **Linux binaries** (51%): Alpine 3.18, Debian 11/12, Ubuntu 20.04/22.04, BusyBox
61
+ - **Windows binaries** (48%): Windows 8, 10, 11, Windows Update Catalog
62
+ - **Malware samples** (1%): From SOREL-20M dataset
63
+
64
+ This dataset enables research in malware detection, architecture recognition, function boundary detection, compiler identification, binary similarity analysis, and cross-platform binary understanding.
65
+
66
+ ### Supported Tasks
67
+
68
+ **Binary Malware Detection**
69
+ - Task: Binary classification (benign vs malicious)
70
+ - Metrics: Accuracy, Precision, Recall, F1-score, AUC-ROC
71
+ - Suggested Models: Transformer-based sequence models, CNN-based models
72
+ - Use Case: Detect malicious executables using token sequences and metadata features
73
+
74
+ **Architecture Recognition**
75
+ - Task: Multi-class classification (x86, x86-64, ARM, ARM64, etc.)
76
+ - Metrics: Top-1 accuracy, confusion matrix
77
+ - Suggested Models: CNN, Transformer encoder
78
+ - Use Case: Identify target architecture from binary content
79
+
80
+ **Platform/OS Detection**
81
+ - Task: Multi-class classification (Linux/Windows/malware, OS versions)
82
+ - Metrics: Hierarchical accuracy (platform, OS family, version)
83
+ - Suggested Models: Hierarchical classifiers, multi-task learning
84
+ - Use Case: Determine origin platform and OS version
85
+
86
+ **Function Boundary Detection**
87
+ - Task: Sequence labeling (token-level classification)
88
+ - Metrics: Precision/Recall at function boundaries, Intersection over Union
89
+ - Suggested Models: BiLSTM-CRF, Transformer with token classification head
90
+ - Use Case: Identify function boundaries in stripped binaries
91
+
92
+ **Compiler Identification**
93
+ - Task: Multi-class classification
94
+ - Metrics: Per-compiler accuracy
95
+ - Suggested Models: Feature-based classifiers, attention-based models
96
+ - Use Case: Determine compiler and optimization level
97
+
98
+ **Binary Similarity Search**
99
+ - Task: Embedding learning, similarity ranking
100
+ - Metrics: Mean Average Precision (MAP), Recall@K
101
+ - Suggested Models: Siamese networks, contrastive learning
102
+ - Use Case: Find similar binaries for library identification or code reuse detection
103
+
104
+ ### Languages
105
+
106
+ This dataset contains compiled binary executables (machine code), not natural language text. The binaries were compiled from source code originally written in various programming languages (C, C++, Rust, Go, etc.), but the dataset itself consists of binary executable formats (ELF and PE).
107
+
108
+ ## Dataset Structure
109
+
110
+ ### Data Instances
111
+
112
+ Each instance represents one binary executable with comprehensive metadata and pre-computed tokenization:
113
+
114
+ ```python
115
+ {
116
+ # File Identification (6 fields)
117
+ 'file_id': 'alpine3.18_linux-amd64_busybox_1.36.1-r0_busybox',
118
+ 'file_path': 'alpine3.18/linux-amd64/busybox_1.36.1-r0/busybox',
119
+ 'file_name': 'busybox',
120
+ 'sha256': 'a1b2c3d4e5f6...',
121
+ 'md5': 'f1e2d3c4b5a6...',
122
+ 'file_size': 1048576,
123
+
124
+ # Platform Detection (4 fields)
125
+ 'platform': 'linux',
126
+ 'os_family': 'alpine',
127
+ 'os_version': '3.18',
128
+ 'distribution': 'alpine3.18',
129
+
130
+ # Binary Characteristics (6 fields)
131
+ 'file_format': 'ELF64',
132
+ 'architecture': 'x86-64',
133
+ 'binary_type': 'executable',
134
+ 'is_stripped': True,
135
+ 'is_packed': False,
136
+ 'is_signed': False,
137
+
138
+ # Structural Analysis (4 fields + sections)
139
+ 'sections': [
140
+ {'name': '.text', 'size': 524288, 'entropy': 7.892},
141
+ {'name': '.data', 'size': 65536, 'entropy': 3.245},
142
+ ...
143
+ ],
144
+ 'num_sections': 12,
145
+ 'code_size': 524288,
146
+ 'data_size': 131072,
147
+
148
+ # Dependencies (4 fields + imports/exports)
149
+ 'imports': ['printf', 'malloc', 'free', ...],
150
+ 'num_imports': 245,
151
+ 'exports': ['main', 'init_function', ...],
152
+ 'num_exports': 18,
153
+
154
+ # Complexity Metrics (1 field)
155
+ 'entropy': 7.234,
156
+
157
+ # Tokenization (4 fields)
158
+ 'tokens': [1234, 5678, 9012, ...], # BPE token IDs
159
+ 'token_count': 8192,
160
+ 'compression_ratio': 2.45, # bytes per token
161
+ 'unique_tokens': 1523
162
+ }
163
+ ```
164
+
165
+ ### Data Fields
166
+
167
+ The dataset contains **29 metadata fields** organized into 7 categories:
168
+
169
+ #### File Identification
170
+ - `file_id` (string): Unique identifier constructed from path components
171
+ - `file_path` (string): Relative path from dataset root
172
+ - `file_name` (string): Binary filename
173
+ - `sha256` (string): SHA-256 hash of file contents
174
+ - `md5` (string): MD5 hash of file contents
175
+ - `file_size` (int64): File size in bytes
176
+
177
+ #### Platform Information
178
+ - `platform` (string): Platform category: 'linux', 'windows', or 'malware'
179
+ - `os_family` (string): OS family (alpine, debian, ubuntu, busybox, windows, sorel-20m)
180
+ - `os_version` (string): OS version string (e.g., '3.18', '11', '20.04', '10')
181
+ - `distribution` (string): Full distribution identifier
182
+
183
+ #### Binary Characteristics
184
+ - `file_format` (string): Binary format (ELF32, ELF64, PE32, PE32+, or 'unknown')
185
+ - `architecture` (string): Target architecture (x86, x86-64, ARM, ARM64, MIPS, etc.)
186
+ - `binary_type` (string): Binary type (executable, library, driver, object, or 'unknown')
187
+ - `is_stripped` (bool): Whether debug symbols are stripped
188
+ - `is_packed` (bool): Whether binary appears packed/compressed
189
+ - `is_signed` (bool): Whether binary has code signature
190
+
191
+ #### Structural Analysis
192
+ - `sections` (list of dicts): List of binary sections with:
193
+ - `name` (string): Section name (.text, .data, .rodata, etc.)
194
+ - `size` (int64): Section size in bytes
195
+ - `entropy` (float32): Shannon entropy of section contents
196
+ - `num_sections` (int32): Total number of sections
197
+ - `code_size` (int64): Total size of executable code sections
198
+ - `data_size` (int64): Total size of data sections
199
+
200
+ #### Dependencies
201
+ - `imports` (list of strings): Imported function names
202
+ - `num_imports` (int32): Count of imported functions
203
+ - `exports` (list of strings): Exported function names
204
+ - `num_exports` (int32): Count of exported functions
205
+
206
+ #### Complexity Metrics
207
+ - `entropy` (float32): Shannon entropy of entire binary (0.0 to 8.0)
208
+
209
+ #### Pre-computed Tokenization
210
+ - `tokens` (list of int32): BPE token IDs from `mjbommar/glaurung-binary-tokenizer-001`
211
+ - `token_count` (int32): Total number of tokens
212
+ - `compression_ratio` (float32): Bytes per token (file_size / token_count)
213
+ - `unique_tokens` (int32): Count of unique token IDs in sequence
214
+
215
+ ### Data Splits
216
+
217
+ The dataset is provided as a single collection of 30,841 binaries. Users should create their own train/validation/test splits based on their research needs. We recommend stratified splitting to maintain platform distribution:
218
+
219
+ **Recommended Split (70/15/15):**
220
+ ```python
221
+ from datasets import load_dataset
222
+
223
+ dataset = load_dataset("mjbommar/binary-30k-tokenized")
224
+
225
+ # Stratified split maintaining platform balance
226
+ train_test = dataset['train'].train_test_split(test_size=0.3, seed=42, stratify_by_column='platform')
227
+ train_val = train_test['train'].train_test_split(test_size=0.214, seed=42, stratify_by_column='platform')
228
+
229
+ train = train_val['train'] # ~21,588 samples (70%)
230
+ val = train_val['test'] # ~4,626 samples (15%)
231
+ test = train_test['test'] # ~4,627 samples (15%)
232
+ ```
233
+
234
+ **Distribution Statistics:**
235
+ - Linux binaries: ~15,659 (51%)
236
+ - Windows binaries: ~14,815 (48%)
237
+ - Malware samples: ~367 (1%)
238
+
239
+ ## Dataset Creation
240
+
241
+ ### Curation Rationale
242
+
243
+ Binary-30K was created to address the lack of large-scale, multi-platform binary datasets for machine learning research. Existing binary analysis datasets often suffer from:
244
+ - Limited platform coverage (single OS)
245
+ - Small scale (hundreds or thousands of samples)
246
+ - Lack of metadata and pre-processing
247
+ - Closed/proprietary access
248
+
249
+ This dataset provides:
250
+ 1. **Cross-platform representation**: Both Linux and Windows binaries from multiple distributions
251
+ 2. **Diverse architectures**: x86, x86-64, ARM, ARM64 coverage
252
+ 3. **Rich metadata**: 29 fields per binary for fine-grained analysis
253
+ 4. **Pre-computed tokenization**: Ready for transformer-based models
254
+ 5. **Open access**: CC-BY-4.0 license with public availability
255
+
256
+ The dataset enables research in:
257
+ - Cross-platform malware detection
258
+ - Architecture-agnostic binary analysis
259
+ - Transfer learning between platforms
260
+ - Tokenization-based binary understanding
261
+ - Large-scale binary similarity analysis
262
+
263
+ ### Source Data
264
+
265
+ #### Initial Data Collection and Normalization
266
+
267
+ **Linux Binaries (51% of dataset)**
268
+
269
+ Collected from official package repositories:
270
+ - **Alpine Linux 3.18**: Lightweight distribution, static binaries
271
+ - **Debian 11 (Bullseye)** and **Debian 12 (Bookworm)**: Stable releases
272
+ - **Ubuntu 20.04 LTS** and **Ubuntu 22.04 LTS**: Long-term support releases
273
+ - **BusyBox**: Embedded systems binaries
274
+
275
+ Binaries extracted from .deb packages and Alpine APK packages using standard package management tools.
276
+
277
+ **Windows Binaries (48% of dataset)**
278
+
279
+ Collected from multiple Windows versions to capture compiler evolution:
280
+ - **Windows 8**: System binaries and common applications
281
+ - **Windows 10**: Multiple builds covering several years
282
+ - **Windows 11**: Latest OS release
283
+ - **Windows Update Catalog**: System updates and drivers
284
+
285
+ Binaries extracted from official Microsoft sources using update catalog and system file extraction.
286
+
287
+ **Malware Samples (1% of dataset)**
288
+
289
+ Drawn from SOREL-20M dataset:
290
+ - **SOREL-20M**: Sophos-ReversingLabs 20 million sample malware dataset
291
+ - Subset selection: Representative samples across malware families
292
+ - Deduplication: SHA-256 based to avoid duplicates
293
+
294
+ All samples handled in isolated environment following malware analysis best practices.
295
+
296
+ #### Source Language Producers
297
+
298
+ The binaries were originally compiled from source code written by:
299
+ - **Open source developers**: Linux distribution maintainers and package maintainers
300
+ - **Microsoft engineers**: Windows operating system and system tool developers
301
+ - **Malware authors**: For malicious samples in SOREL-20M subset
302
+
303
+ The source code languages include C, C++, Rust, Go, Assembly, and others, though the dataset contains only the compiled binary forms.
304
+
305
+ ### Annotations
306
+
307
+ #### Annotation Process
308
+
309
+ The dataset includes two types of metadata:
310
+
311
+ **Automatic Metadata Extraction:**
312
+ - Platform/OS detection: Inferred from directory structure and file paths
313
+ - Binary format analysis: Extracted using LIEF library
314
+ - Architecture detection: From binary headers (ELF/PE)
315
+ - Section analysis: Parsed from binary structure
316
+ - Import/export extraction: From symbol tables and import tables
317
+ - Entropy calculation: Shannon entropy computed on raw bytes
318
+ - Tokenization: Pre-computed using BPE tokenizer
319
+
320
+ **Manual Curation:**
321
+ - Dataset organization: Files organized by platform, OS, and distribution
322
+ - Quality control: Verification of parseable formats
323
+ - Deduplication: SHA-256 based duplicate removal
324
+
325
+ No human annotations for labels (malware/benign, function boundaries, etc.) are included. The `platform` field provides ground truth for Linux/Windows/malware categories based on source.
326
+
327
+ #### Who are the Annotators?
328
+
329
+ The automatic metadata was extracted programmatically using:
330
+ - **LIEF library** (v0.14.0+): Binary parsing and analysis
331
+ - **Custom extraction scripts**: Platform detection, entropy calculation
332
+ - **HuggingFace tokenizers** (v0.15.0+): BPE tokenization with `mjbommar/glaurung-binary-tokenizer-001`
333
+
334
+ Dataset curation and organization performed by the dataset authors.
335
+
336
+ ### Personal and Sensitive Information
337
+
338
+ The dataset contains compiled binary executables. Potential sensitive information:
339
+
340
+ **System Paths:**
341
+ - Some binaries may contain embedded paths from build systems
342
+ - Debug information (if not stripped) may include developer usernames/paths
343
+ - These are typical artifacts of compilation and not considered sensitive
344
+
345
+ **Function Names:**
346
+ - Exported function names are included in metadata
347
+ - These are standard API/system calls, not sensitive
348
+
349
+ **Malware Samples:**
350
+ - Malware binaries included are from public SOREL-20M dataset
351
+ - No personal victim data included
352
+ - Samples are widely analyzed in security research community
353
+
354
+ **No User Data:**
355
+ - No user-generated content or personal documents
356
+ - No login credentials, API keys, or secrets
357
+ - No personally identifiable information (PII)
358
+
359
+ ## Considerations for Using the Data
360
+
361
+ ### Social Impact of Dataset
362
+
363
+ **Positive Impacts:**
364
+
365
+ 1. **Defensive Security**: Enables development of better malware detection systems
366
+ 2. **Binary Analysis Research**: Accelerates research in program analysis and reverse engineering
367
+ 3. **Cross-platform Understanding**: Facilitates development of platform-agnostic analysis tools
368
+ 4. **Open Science**: Provides open dataset where previously proprietary/closed datasets dominated
369
+ 5. **Educational Value**: Supports teaching of binary analysis, cybersecurity, and ML applications
370
+
371
+ **Potential Concerns:**
372
+
373
+ 1. **Dual-Use Nature**: Techniques developed could potentially be used by malicious actors
374
+ - Mitigation: Dataset focuses on detection/analysis, not creation of malware
375
+
376
+ 2. **Malware Inclusion**: Contains real malware samples
377
+ - Mitigation: Small subset (1%), from public SOREL-20M, no execution required for ML use
378
+ - Users should handle malware samples with appropriate security precautions
379
+
380
+ 3. **Adversarial Learning**: Could be used to develop evasion techniques
381
+ - Mitigation: Open datasets enable defensive research to stay ahead of attacks
382
+
383
+ ### Discussion of Biases
384
+
385
+ **Platform Bias:**
386
+ - Linux (51%) and Windows (48%) are balanced, but represent only two major platforms
387
+ - MacOS, mobile platforms (iOS/Android), and embedded systems not represented
388
+ - This may limit generalization to other platforms
389
+
390
+ **Architecture Bias:**
391
+ - Dominated by x86-64 architecture
392
+ - Limited ARM samples despite ARM's growing importance (mobile, IoT, Apple Silicon)
393
+ - Other architectures (MIPS, RISC-V) minimally represented
394
+
395
+ **Temporal Bias:**
396
+ - Windows samples span Windows 8-11 (2012-2023)
397
+ - Linux samples from 2020-2024 distributions
398
+ - May not represent historical (pre-2010) or future compilation patterns
399
+
400
+ **Distribution Bias:**
401
+ - Linux samples from Debian-based distributions (Debian, Ubuntu) and Alpine
402
+ - Other distributions (RedHat, Arch, Gentoo) not represented
403
+ - May not capture distribution-specific toolchain differences
404
+
405
+ **Malware Bias:**
406
+ - Malware samples only 1% of dataset (class imbalance)
407
+ - Malware from SOREL-20M (2020 collection) may not represent current threats
408
+ - Geographic/language bias in malware samples from original SOREL-20M
409
+
410
+ **Size Bias:**
411
+ - File sizes vary widely; very large binaries may be underrepresented
412
+ - Tokenization truncation may affect very large files (>1MB)
413
+
414
+ **Researchers should:**
415
+ - Be aware of these biases when drawing conclusions
416
+ - Validate findings on additional out-of-distribution datasets
417
+ - Consider stratified sampling based on platform/architecture for balanced experiments
418
+
419
+ ### Other Known Limitations
420
+
421
+ **Technical Limitations:**
422
+
423
+ 1. **Static Analysis Only**: Dataset contains binaries without runtime behavior
424
+ - No dynamic analysis features (API calls, network activity, file operations)
425
+
426
+ 2. **Tokenization Context Window**: Very large binaries truncated during tokenization
427
+ - May lose information from files >1-2MB after tokenization
428
+
429
+ 3. **Parsing Failures**: Some binaries cannot be parsed by LIEF
430
+ - Corrupted files, unusual formats, or packers may result in missing metadata
431
+
432
+ 4. **Architecture Detection**: Based on headers, may be incorrect for obfuscated binaries
433
+
434
+ 5. **Stripped Binaries**: Many binaries have debug symbols removed
435
+ - Limits metadata extraction (fewer function names, no source line info)
436
+
437
+ **Usage Limitations:**
438
+
439
+ 1. **Malware Handling**: Users must follow security best practices
440
+ - Isolated environments, no execution required for dataset use
441
+
442
+ 2. **Legal Considerations**: Windows binaries subject to Microsoft licensing
443
+ - Research/educational use should be covered under fair use
444
+ - Users should verify compliance with local laws
445
+
446
+ 3. **Computational Requirements**: Full dataset requires significant resources
447
+ - 12.90 GB raw data + 15-20 GB tokenized dataset
448
+ - Token sequences can be very long (10K+ tokens)
449
+
450
+ 4. **Not a Benchmark**: No standardized train/test splits or evaluation protocol
451
+ - Users should define splits and protocols appropriate for their research
452
+
453
+ ## Additional Information
454
+
455
+ ### Dataset Curators
456
+
457
+ This dataset was curated by:
458
+
459
+ **Michael J. Bommarito II**
460
+ - Email: michael@bommaritollc.com
461
+ - Affiliation: Bommarito Consulting, LLC
462
+
463
+ With contributions from collaborators in the binary analysis and machine learning research communities.
464
+
465
+ ### Licensing Information
466
+
467
+ This dataset is released under **Creative Commons Attribution 4.0 International (CC-BY-4.0)** license.
468
+
469
+ **Summary:**
470
+ - ✅ Share: Copy and redistribute in any medium or format
471
+ - ✅ Adapt: Remix, transform, and build upon the material for any purpose
472
+ - ✅ Commercial use allowed
473
+ - ⚠️ Attribution required: Must give appropriate credit and indicate if changes were made
474
+
475
+ **Component Licenses:**
476
+
477
+ 1. **Linux Binaries**: Various open source licenses (GPL, LGPL, MIT, BSD, Apache)
478
+ - Original software licenses remain in effect for the binaries themselves
479
+ - Dataset compilation and metadata under CC-BY-4.0
480
+
481
+ 2. **Windows Binaries**: Microsoft software licenses
482
+ - Research and educational use covered under fair use
483
+ - Users responsible for compliance with Microsoft terms
484
+
485
+ 3. **Malware Samples**: From SOREL-20M dataset (Sophos-ReversingLabs)
486
+ - SOREL-20M released for research purposes
487
+ - No copyright claimed on malware samples themselves
488
+
489
+ **Attribution:**
490
+ When using this dataset, please cite the associated paper (see Citation Information below).
491
+
492
+ ### Citation Information
493
+
494
+ If you use this dataset in your research, please cite:
495
+
496
+ ```bibtex
497
+ @article{bommarito2025binary30k,
498
+ title={Binary-30K: A Large-Scale Multi-Platform Binary Dataset for Machine Learning Research},
499
+ author={Bommarito, Michael J., II},
500
+ journal={arXiv preprint},
501
+ year={2025},
502
+ url={https://github.com/mjbommar/binary-bpe-paper}
503
+ }
504
+ ```
505
+
506
+ **Related Publications:**
507
+
508
+ For information about the BPE tokenizer used for pre-processing:
509
+
510
+ ```bibtex
511
+ @article{bommarito2025binarybpe,
512
+ title={Byte Pair Encoding for Binary Executables: A Large-Scale Analysis},
513
+ author={Bommarito, Michael J., II},
514
+ journal={arXiv preprint},
515
+ year={2025},
516
+ url={https://github.com/mjbommar/binary-bpe-paper}
517
+ }
518
+ ```
519
+
520
+ ### Dataset Access
521
+
522
+ **HuggingFace Hub:**
523
+ ```python
524
+ from datasets import load_dataset
525
+ dataset = load_dataset("mjbommar/binary-30k-tokenized")
526
+ ```
527
+
528
+ **Direct Download:**
529
+ - HTTP: https://michaelbommarito.com/resources/glaurung/data/glaurung-model-binaries-20251028.tar.gz
530
+ - S3: s3://michaelbommarito.com/resources/glaurung/data/glaurung-model-binaries-20251028.tar.gz
531
+ - Size: 12.90 GB (compressed)
532
+
533
+ ### Contributions
534
+
535
+ Thanks to the open source community, Linux distribution maintainers, and the SOREL-20M team for making their data available for research.
536
+
537
+ Special thanks to:
538
+ - HuggingFace for datasets and tokenizers libraries
539
+ - LIEF project for binary parsing tools
540
+ - The binary analysis and malware research communities
541
+
542
+ **Contributing:**
543
+ - Report issues or suggest improvements via GitHub: https://github.com/mjbommar/binary-bpe-paper
544
+ - Contact: michael@bommaritollc.com
545
+
546
+ ---
547
+
548
+ **Last Updated:** October 28, 2025