--- license: cc-by-4.0 task_categories: - other tags: - binary-analysis - malware-detection - executable-analysis - binary-tokenization - cybersecurity - reverse-engineering - program-analysis - cross-platform size_categories: - 10K10MB) may result in long token sequences requiring more computational resources **Researchers should:** - Be aware of these biases when drawing conclusions - Validate findings on additional out-of-distribution datasets - Consider stratified sampling based on platform/architecture for balanced experiments ### Other Known Limitations **Technical Limitations:** 1. **Static Analysis Only**: Dataset contains binaries without runtime behavior - No dynamic analysis features (API calls, network activity, file operations) 2. **Parsing Failures**: Some binaries cannot be parsed by LIEF - Corrupted files, unusual formats, or packers may result in missing metadata 3. **Architecture Detection**: Based on headers, may be incorrect for obfuscated binaries 4. **Stripped Binaries**: Many binaries have debug symbols removed - Limits metadata extraction (fewer function names, no source line info) 5. **Token Sequence Length**: Very large binaries (>10MB) produce long token sequences - May require memory-efficient processing techniques or chunking strategies - Full binary content is preserved in tokenization without truncation **Usage Limitations:** 1. **Malware Handling**: Users must follow security best practices - Isolated environments, no execution required for dataset use 2. **Legal Considerations**: Windows binaries subject to Microsoft licensing - Research/educational use should be covered under fair use - Users should verify compliance with local laws 3. **Computational Requirements**: Full dataset requires significant resources - 12.90 GB raw data + tokenized dataset with complete metadata - Token sequences vary from hundreds to hundreds of thousands of tokens (no truncation applied) - Large binaries may require substantial memory for processing full token sequences 4. **Not a Benchmark**: No standardized train/test splits or evaluation protocol - Users should define splits and protocols appropriate for their research ## Additional Information ### Dataset Curators This dataset was curated by: **Michael J. Bommarito II** - Email: michael.bommarito@gmail.com - Website: [https://michaelbommarito.com/](https://michaelbommarito.com/) All dataset curation, organization, metadata extraction, and documentation by Michael J. Bommarito II. ### Licensing Information This dataset compilation is released under **Creative Commons Attribution 4.0 International (CC-BY-4.0)** license by Michael J. Bommarito II. **Dataset Compilation License (CC-BY-4.0):** - ✅ Share: Copy and redistribute in any medium or format - ✅ Adapt: Remix, transform, and build upon the material for any purpose - ✅ Commercial use allowed - ⚠️ Attribution required: Must give appropriate credit and indicate if changes were made **Important: Component-Specific Licenses and Legal Considerations** This dataset contains binary executables from multiple sources, each subject to their own licenses and legal frameworks. Users are responsible for ensuring their use complies with applicable laws and licenses in their jurisdiction. 1. **Linux Binaries**: Various open source licenses (GPL, LGPL, MIT, BSD, Apache, etc.) - Original software licenses remain in effect for the binaries themselves - Dataset compilation, organization, and metadata under CC-BY-4.0 - Users should review individual package licenses as needed 2. **Windows Binaries**: Microsoft software licenses - These binaries are subject to Microsoft's software license terms - Research and educational use may be covered under fair use/fair dealing doctrines depending on jurisdiction - Commercial use may require additional licensing from Microsoft - Users are responsible for compliance with Microsoft terms and applicable laws in their jurisdiction - Consider consulting legal counsel for commercial applications 3. **SOREL-20M Malware Samples**: From SOREL-20M dataset (Sophos-ReversingLabs) - Source: [SOREL-20M GitHub Repository](https://github.com/sophos/SOREL-20M) - License: [SOREL-20M License Agreement](https://github.com/sophos/SOREL-20M/blob/main/LICENSE) - Users must comply with SOREL-20M's terms of use - No copyright claimed on malware samples themselves - Malware samples should only be used in secure, isolated research environments 4. **Malware Bazaar Samples**: From Malware Bazaar (abuse.ch) - Source: [https://bazaar.abuse.ch/](https://bazaar.abuse.ch/) - License: Research use only, proper attribution required - 7,722 samples strategically selected via Platform-First Stratified Sampling - Users must comply with Malware Bazaar's terms of use - No copyright claimed on malware samples themselves - Malware samples should only be used in secure, isolated research environments - Attribution: Must acknowledge Malware Bazaar (abuse.ch) as source - See [SAMPLING_METHODOLOGY.md](https://github.com/mjbommar/binary-bpe-paper/blob/master/paper/dataset-paper/SAMPLING_METHODOLOGY.md) for sampling details **Recommendations for Users:** - **Academic/Research Use**: Generally covered under fair use/fair dealing in most jurisdictions, but verify compliance with institutional policies - **Commercial Use**: Consult legal counsel regarding Microsoft binary licenses and other proprietary software - **International Use**: Fair use laws vary by jurisdiction; ensure compliance with local regulations - **Malware Handling**: Follow cybersecurity best practices and institutional review board requirements **Attribution:** When using this dataset, please cite the associated paper (see Citation Information below) and acknowledge Michael J. Bommarito II as the dataset curator. ### Citation Information If you use this dataset in your research, please cite: ```bibtex @article{bommarito2025binary30k, title={Binary-30K: A Large-Scale Multi-Platform Binary Dataset for Machine Learning Research}, author={Bommarito, Michael J., II}, journal={arXiv preprint}, year={2025}, url={https://github.com/mjbommar/binary-bpe-paper} } ``` **Related Publications:** For information about the BPE tokenizer used for pre-processing: ```bibtex @article{bommarito2025binarybpe, title={Byte Pair Encoding for Binary Executables: A Large-Scale Analysis}, author={Bommarito, Michael J., II}, journal={arXiv preprint}, year={2025}, url={https://github.com/mjbommar/binary-bpe-paper} } ``` ### Dataset Access **HuggingFace Hub:** ```python from datasets import load_dataset dataset = load_dataset("mjbommar/binary-30k-tokenized") ``` **Direct Download:** - HTTPS: https://s3.amazonaws.com/michaelbommarito.com/resources/glaurung/data/glaurung-model-binaries-20251028.tar.gz - S3 URI: s3://michaelbommarito.com/resources/glaurung/data/glaurung-model-binaries-20251028.tar.gz - Size: 12.90 GB (compressed) ### Contributions Thanks to the open source community, Linux distribution maintainers, and the SOREL-20M team for making their data available for research. Special thanks to: - HuggingFace for datasets and tokenizers libraries - LIEF project for binary parsing tools - The binary analysis and malware research communities **Contributing:** - Report issues or suggest improvements via GitHub: https://github.com/mjbommar/binary-bpe-paper - Contact: michael.bommarito@gmail.com --- **Last Updated:** October 28, 2025