mjbommar commited on
Commit
8eb4e02
·
verified ·
1 Parent(s): 567a089

Upload README.md with huggingface_hub

Browse files
Files changed (1) hide show
  1. README.md +10 -4
README.md CHANGED
@@ -47,7 +47,13 @@ pretty_name: "Binary-30K: A Large-Scale Multi-Platform Binary Dataset"
47
 
48
  ### Dataset Summary
49
 
50
- Binary-30K is a comprehensive, multi-platform binary executable dataset designed for machine learning research in binary analysis, malware detection, and program understanding. The dataset contains **30,841 binary executables** totaling **12.90 GB**, collected from diverse sources including Linux distributions, Windows operating systems, and the SOREL-20M malware dataset.
 
 
 
 
 
 
51
 
52
  Each binary in the dataset has been pre-processed with:
53
  - **Pre-computed BPE tokenization** using the `mjbommar/glaurung-binary-tokenizer-001` tokenizer
@@ -57,9 +63,9 @@ Each binary in the dataset has been pre-processed with:
57
  - **Binary analysis** via LIEF library (ELF/PE parsing)
58
 
59
  The dataset is stratified across:
60
- - **Linux binaries** (51%): Alpine 3.18, Debian 11/12, Ubuntu 20.04/22.04, BusyBox
61
- - **Windows binaries** (48%): Windows 8, 10, 11, Windows Update Catalog
62
- - **Malware samples** (1%): From SOREL-20M dataset
63
 
64
  This dataset enables research in malware detection, architecture recognition, function boundary detection, compiler identification, binary similarity analysis, and cross-platform binary understanding.
65
 
 
47
 
48
  ### Dataset Summary
49
 
50
+ Binary-30K is a comprehensive, multi-platform binary executable dataset designed for machine learning research in binary analysis, malware detection, and program understanding. The dataset contains **30,745 records** representing **22,278 unique binary executables** totaling **12.90 GB**, collected from diverse sources including Linux distributions, Windows operating systems, and the SOREL-20M malware dataset.
51
+
52
+ **Note on Duplicates:** The dataset includes 30,745 total records but 22,278 unique SHA256 hashes. The duplicates (8,467 records) are primarily due to:
53
+ - **BusyBox binaries** (~1,827 records): Single multi-call binary with different command names (e.g., `ls`, `cp`, `mv` are hardlinks to the same BusyBox binary)
54
+ - **Hardlinked system utilities**: Multiple names pointing to identical binaries across different Linux distributions
55
+
56
+ This structure reflects real-world binary collections where utilities share implementations, and is valuable for studying binary deduplication and identifying multi-purpose executables.
57
 
58
  Each binary in the dataset has been pre-processed with:
59
  - **Pre-computed BPE tokenization** using the `mjbommar/glaurung-binary-tokenizer-001` tokenizer
 
63
  - **Binary analysis** via LIEF library (ELF/PE parsing)
64
 
65
  The dataset is stratified across:
66
+ - **Linux binaries** (50.8%): Alpine 3.18, Debian 11/12, Ubuntu 20.04/22.04, BusyBox
67
+ - **Windows binaries** (48.0%): Windows 8, 10, 11, Windows Update Catalog
68
+ - **Malware samples** (1.2%): From SOREL-20M dataset
69
 
70
  This dataset enables research in malware detection, architecture recognition, function boundary detection, compiler identification, binary similarity analysis, and cross-platform binary understanding.
71