Datasets:
Tasks:
Other
Formats:
parquet
Size:
10K - 100K
Tags:
binary-analysis
malware-detection
executable-analysis
binary-tokenization
cybersecurity
reverse-engineering
License:
Upload README.md with huggingface_hub
Browse files
README.md
CHANGED
|
@@ -47,7 +47,13 @@ pretty_name: "Binary-30K: A Large-Scale Multi-Platform Binary Dataset"
|
|
| 47 |
|
| 48 |
### Dataset Summary
|
| 49 |
|
| 50 |
-
Binary-30K is a comprehensive, multi-platform binary executable dataset designed for machine learning research in binary analysis, malware detection, and program understanding. The dataset contains **30,
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 51 |
|
| 52 |
Each binary in the dataset has been pre-processed with:
|
| 53 |
- **Pre-computed BPE tokenization** using the `mjbommar/glaurung-binary-tokenizer-001` tokenizer
|
|
@@ -57,9 +63,9 @@ Each binary in the dataset has been pre-processed with:
|
|
| 57 |
- **Binary analysis** via LIEF library (ELF/PE parsing)
|
| 58 |
|
| 59 |
The dataset is stratified across:
|
| 60 |
-
- **Linux binaries** (
|
| 61 |
-
- **Windows binaries** (48%): Windows 8, 10, 11, Windows Update Catalog
|
| 62 |
-
- **Malware samples** (1%): From SOREL-20M dataset
|
| 63 |
|
| 64 |
This dataset enables research in malware detection, architecture recognition, function boundary detection, compiler identification, binary similarity analysis, and cross-platform binary understanding.
|
| 65 |
|
|
|
|
| 47 |
|
| 48 |
### Dataset Summary
|
| 49 |
|
| 50 |
+
Binary-30K is a comprehensive, multi-platform binary executable dataset designed for machine learning research in binary analysis, malware detection, and program understanding. The dataset contains **30,745 records** representing **22,278 unique binary executables** totaling **12.90 GB**, collected from diverse sources including Linux distributions, Windows operating systems, and the SOREL-20M malware dataset.
|
| 51 |
+
|
| 52 |
+
**Note on Duplicates:** The dataset includes 30,745 total records but 22,278 unique SHA256 hashes. The duplicates (8,467 records) are primarily due to:
|
| 53 |
+
- **BusyBox binaries** (~1,827 records): Single multi-call binary with different command names (e.g., `ls`, `cp`, `mv` are hardlinks to the same BusyBox binary)
|
| 54 |
+
- **Hardlinked system utilities**: Multiple names pointing to identical binaries across different Linux distributions
|
| 55 |
+
|
| 56 |
+
This structure reflects real-world binary collections where utilities share implementations, and is valuable for studying binary deduplication and identifying multi-purpose executables.
|
| 57 |
|
| 58 |
Each binary in the dataset has been pre-processed with:
|
| 59 |
- **Pre-computed BPE tokenization** using the `mjbommar/glaurung-binary-tokenizer-001` tokenizer
|
|
|
|
| 63 |
- **Binary analysis** via LIEF library (ELF/PE parsing)
|
| 64 |
|
| 65 |
The dataset is stratified across:
|
| 66 |
+
- **Linux binaries** (50.8%): Alpine 3.18, Debian 11/12, Ubuntu 20.04/22.04, BusyBox
|
| 67 |
+
- **Windows binaries** (48.0%): Windows 8, 10, 11, Windows Update Catalog
|
| 68 |
+
- **Malware samples** (1.2%): From SOREL-20M dataset
|
| 69 |
|
| 70 |
This dataset enables research in malware detection, architecture recognition, function boundary detection, compiler identification, binary similarity analysis, and cross-platform binary understanding.
|
| 71 |
|