nntvu commited on
Commit
0e913f5
·
verified ·
1 Parent(s): 081a63c

Create README.md

Browse files
Files changed (1) hide show
  1. README.md +86 -0
README.md ADDED
@@ -0,0 +1,86 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ ---
2
+ # For reference on dataset card metadata, see the spec: https://github.com/huggingface/hub-docs/blob/main/datasetcard.md?plain=1
3
+ # Doc / guide: https://huggingface.co/docs/hub/datasets-cards
4
+ license: cc-by-4.0
5
+ tags:
6
+ - security
7
+ - malware-detection
8
+ - android
9
+ - graph-machine-learning
10
+ - distribution-shift
11
+ - function-call-graphs
12
+ ---
13
+
14
+ # Dataset Card for MalNet-Tiny Distribution Shift Benchmarks
15
+
16
+ This dataset contains three datasets, **MalNet-Tiny**, **MalNet-Tiny-Common** and **MalNet-Tiny-Distinct**, designed to evaluate the
17
+ robustness of graph-based Android malware classifiers under distribution shift. Derived from the [MalNet-Tiny](https://malnet.cs.gatech.edu/)
18
+ dataset, these benchmarks introduce specific partitions to simulate realistic domain (cross-family) and temporal shifts by enriching Function
19
+ Call Graphs (FCGs) with semantic function metadata and LLM-based code embeddings.
20
+
21
+ ## Dataset Details
22
+
23
+ ### Dataset Description
24
+
25
+ The dataset consists of Android Function Call Graphs (FCGs) where nodes represent functions and edges represent invocations. Unlike the original MalNet-Tiny, which relies on structure-only representations, this dataset enriches the graphs with:
26
+ 1. **Function Metadata:** Lightweight features such as function names, method signatures, and access flags.
27
+ 2. **LLM Embeddings:** Dense semantic representations of function bodies derived from Large Language Models (LLMs), extracted when source code is available.
28
+
29
+ The available datasets are defined as follows:
30
+ * **MalNet-Tiny:** The original MalNet-Tiny dataset with semantic features for nodes in the FCGs.
31
+ * **MalNet-Tiny-Common:** Evaluates generalization of the model under covariate shift.
32
+ * **MalNet-Tiny-Distinct:** valuates generalization of the model under domain shift.
33
+
34
+ ### Dataset Specification
35
+ - **Language(s) (NLP):** Python
36
+ - **License:** Creative Commons Attribution 4.0 International (CC-BY 4.0)
37
+
38
+ ## Uses
39
+
40
+ ### Direct Use
41
+
42
+ * **Robust Malware Detection:** Developing and benchmarking Graph Neural Networks (GNNs) that are resilient to evolving malware variants.
43
+ * **Distribution Shift Evaluation:** Testing model performance under covariate shift (Common) and domain shift (Distinct).
44
+ * **Graph Representation Learning:** Studying the integration of structural (graph) and semantic (LLM/Metadata) features in learning tasks.
45
+
46
+ ### Out-of-Scope Use
47
+
48
+ * This dataset is intended for research purposes (defense) and should not be used to generate or obfuscate malware.
49
+ * The semantic features rely on static analysis; dynamic execution traces are not included.
50
+
51
+ ## Dataset Structure
52
+
53
+ The dataset is composed of `.pt` files to be loaded into PyTorch Geometric. Accompanied code will be provided after publication.
54
+
55
+ ## Dataset Creation
56
+
57
+ ### Curation Rationale
58
+
59
+ Existing graph-based classifiers achieve high accuracy on standard benchmarks (like MalNet-Tiny) but suffer performance drops of up to 45% on unseen families. These benchmarks were created to rigorously evaluate and improve the generalization capabilities of malware detectors in realistic, evolving threat environments.
60
+
61
+ ### Source Data
62
+
63
+ The data are processed from raw APK files from [AndroZoo](https://androzoo.uni.lu/), a repository of real-world Android packages.
64
+ Labels are derived from [MalNet](https://malnet.cs.gatech.edu/), a large-scale dataset containing Android Function Call Graphs and their malware classifications.
65
+
66
+ #### Data Collection and Processing
67
+
68
+ 1. **Base Data:** Samples and labels were selected from MalNet, then download the corresponding raw APK from AndroZoo.
69
+ * *MalNet-Tiny:* The split from the original MalNet.
70
+ * *MalNet-Tiny-Common:* Samples from **overlapping** malware *families* but different malware *types*.
71
+ * *MalNet-Tiny-Distinct:* Samples from **completely unseen** families of malwares.
72
+ 2. **Feature Extraction:**
73
+ * *Metadata Extraction:* Function names, signatures, and flags were extracted to provide lightweight semantic context.
74
+ * *LLM Embedding:* Source code (decompiled Smali/Java) of function bodies was processed using Large Language Models to generate dense code embeddings.
75
+
76
+ ## Bias, Risks, and Limitations
77
+
78
+ * **Static Analysis Limitations:** The graphs are based on static analysis and may be vulnerable to obfuscation techniques that alter call graphs (e.g., reflection, dynamic loading) without changing behavior.
79
+ * **Feature Availability:** LLM embeddings depend on the successful decompilation and availability of function bodies.
80
+
81
+ ### Recommendations
82
+
83
+ Users should be made aware of the risks, biases, and limitations of the dataset. Models trained on this dataset should be evaluated in conjunction with dynamic analysis methods for deployment in critical security environments.
84
+
85
+ ## Citation
86
+ Will be added later.