nntvu commited on
Commit
d42e654
·
verified ·
1 Parent(s): 1928a00

Update README.md

Browse files
Files changed (1) hide show
  1. README.md +14 -10
README.md CHANGED
@@ -15,14 +15,15 @@ tags:
15
 
16
  This dataset contains three datasets, **MalNet-Tiny**, **MalNet-Tiny-Common** and **MalNet-Tiny-Distinct**, designed to evaluate the
17
  robustness of graph-based Android malware classifiers under distribution shift. Derived from the [MalNet-Tiny](https://malnet.cs.gatech.edu/)
18
- dataset, these benchmarks introduce specific partitions to simulate realistic domain (cross-family) and temporal shifts by enriching Function
19
- Call Graphs (FCGs) with semantic function metadata and LLM-based code embeddings.
20
 
21
  ## Dataset Details
22
 
23
  ### Dataset Description
24
 
25
- The dataset consists of Android Function Call Graphs (FCGs) where nodes represent functions and edges represent invocations. Unlike the original MalNet-Tiny, which relies on structure-only representations, this dataset enriches the graphs with:
 
26
  1. **Function Metadata:** Lightweight features such as function names, method signatures, and access flags.
27
  2. **LLM Embeddings:** Dense semantic representations of function bodies derived from Large Language Models (LLMs), extracted when source code is available.
28
 
@@ -50,7 +51,8 @@ The available datasets are defined as follows:
50
 
51
  ## Dataset Structure
52
 
53
- The dataset is composed of `.pt` files to be loaded into PyTorch Geometric. Accompanied code can be found at [this GitHub repository](https://github.com/ngoctnq/malnet-features).
 
54
 
55
  ## Dataset Creation
56
 
@@ -69,7 +71,7 @@ Labels are derived from [MalNet](https://malnet.cs.gatech.edu/), a large-scale d
69
 
70
  1. **Base Data:** Samples and labels were selected from MalNet, then download the corresponding raw APK from AndroZoo.
71
  * *MalNet-Tiny:* The split from the original MalNet.
72
- * *MalNet-Tiny-Common:* Samples from **overlapping** malware *families* but different malware *types*.
73
  * *MalNet-Tiny-Distinct:* Samples from **completely unseen** families of malwares.
74
  2. **Feature Extraction:**
75
  * *Metadata Extraction:* Function names, signatures, and flags were extracted to provide lightweight semantic context.
@@ -77,19 +79,21 @@ Labels are derived from [MalNet](https://malnet.cs.gatech.edu/), a large-scale d
77
 
78
  ## Bias, Risks, and Limitations
79
 
80
- * **Static Analysis Limitations:** The graphs are based on static analysis and may be vulnerable to obfuscation techniques that alter call graphs (e.g., reflection, dynamic loading) without changing behavior.
 
81
  * **Feature Availability:** LLM embeddings depend on the successful decompilation and availability of function bodies.
82
 
83
  ### Recommendations
84
 
85
- Users should be made aware of the risks, biases, and limitations of the dataset. Models trained on this dataset should be evaluated in conjunction with dynamic analysis methods for deployment in critical security environments.
 
86
 
87
  ## Citation
88
  ```latex
89
- @misc{tran2025mitigatingdistributionshiftgraphbased,
90
- title={Mitigating Distribution Shift in Graph-Based Android Malware Classification via Function Metadata and LLM Embeddings},
91
  author={Ngoc N. Tran and Anwar Said and Waseem Abbas and Tyler Derr and Xenofon D. Koutsoukos},
92
- year={2025},
93
  eprint={2508.06734},
94
  archivePrefix={arXiv},
95
  primaryClass={cs.CR},
 
15
 
16
  This dataset contains three datasets, **MalNet-Tiny**, **MalNet-Tiny-Common** and **MalNet-Tiny-Distinct**, designed to evaluate the
17
  robustness of graph-based Android malware classifiers under distribution shift. Derived from the [MalNet-Tiny](https://malnet.cs.gatech.edu/)
18
+ dataset, these benchmarks introduce specific partitions to simulate realistic covariate shift (intra-family) and domain (cross-family) shifts
19
+ by enriching Function Call Graphs (FCGs) with semantic function metadata and LLM-based code embeddings.
20
 
21
  ## Dataset Details
22
 
23
  ### Dataset Description
24
 
25
+ The dataset consists of Android Function Call Graphs (FCGs) where nodes represent functions and edges represent invocations. Unlike the original
26
+ MalNet-Tiny, which relies on structure-only representations, this dataset enriches the graphs with:
27
  1. **Function Metadata:** Lightweight features such as function names, method signatures, and access flags.
28
  2. **LLM Embeddings:** Dense semantic representations of function bodies derived from Large Language Models (LLMs), extracted when source code is available.
29
 
 
51
 
52
  ## Dataset Structure
53
 
54
+ The dataset is composed of `.pt` files to be loaded into PyTorch Geometric. Accompanied code can be found at
55
+ [this GitHub repository](https://github.com/ngoctnq/malnet-features).
56
 
57
  ## Dataset Creation
58
 
 
71
 
72
  1. **Base Data:** Samples and labels were selected from MalNet, then download the corresponding raw APK from AndroZoo.
73
  * *MalNet-Tiny:* The split from the original MalNet.
74
+ * *MalNet-Tiny-Common:* Samples from **same** malware *families* but different malware *types*.
75
  * *MalNet-Tiny-Distinct:* Samples from **completely unseen** families of malwares.
76
  2. **Feature Extraction:**
77
  * *Metadata Extraction:* Function names, signatures, and flags were extracted to provide lightweight semantic context.
 
79
 
80
  ## Bias, Risks, and Limitations
81
 
82
+ * **Static Analysis Limitations:** The graphs are based on static analysis and may be vulnerable to obfuscation techniques that alter call graphs
83
+ (e.g., reflection, dynamic loading) without changing behavior.
84
  * **Feature Availability:** LLM embeddings depend on the successful decompilation and availability of function bodies.
85
 
86
  ### Recommendations
87
 
88
+ Users should be made aware of the risks, biases, and limitations of the dataset. Models trained on this dataset should be evaluated in
89
+ conjunction with dynamic analysis methods for deployment in critical security environments.
90
 
91
  ## Citation
92
  ```latex
93
+ @misc{tran2026quantifyinggeneralizationgapnew,
94
+ title={Quantifying the Generalization Gap: A New Benchmark for Out-of-Distribution Graph-Based Android Malware Classification},
95
  author={Ngoc N. Tran and Anwar Said and Waseem Abbas and Tyler Derr and Xenofon D. Koutsoukos},
96
+ year={2026},
97
  eprint={2508.06734},
98
  archivePrefix={arXiv},
99
  primaryClass={cs.CR},