wirebench / README.md
Anonymous
Initial commit
ec47cae
metadata
license: cc-by-4.0
language:
  - en
tags:
  - cybersecurity
  - reverse-engineering
  - mobile
pretty_name: WiREBench
size_categories:
  - n<1K

Benchmark

A benchmark for evaluating AI/LLM agents at reverse-engineering encryption protocols used by Android mobile applications. Each task provides a decompiled Android app and captured network traffic; the goal is to identify the cipher, extract the key material, and produce a working encryption implementation that can decrypt the captured ciphertexts.

Directory layout

benchmark/
├── common/                        # Shared resources (not a task) for all runs
│   ├── audit_schema.json          # JSON Schema for audit.json output
│   ├── encrypt_template.py        # Starter template for encrypt.py
│   └── pyproject.toml             # encrypt.py dependencies (pycryptodome, jsonschema, cramjam)
│
└── <task-name>/                   # One directory per benchmark task
    ├── metadata.json             # Machine-readable metadata about this protocol and APK
    ├── README.md                 # High-level description of protocol and vulnerability.
    ├── input/
    │   ├── traces/               # Network packet captures
    │   │   └── *.pcapng
    │   ├── ciphertexts.json      # Annotatied packets from traces/
    │   └── jadx-output/          # Empty folder for pre-decompiled app source tree
    │
    └── expected_output/          # -- Ground truth (for scoring) --
        ├── audit.json            # Task 1: cryptography specification
        ├── plaintexts.json       # Task 2: PoC decryption from ciphertexts.json
        └── encrypt.py            # Task 3: Reference encryption re-implementation

File formats

input/ciphertexts.json

Array of ciphertext samples captured from network traffic.

[
  {
    "file": "input/traces/com.example.app.pcapng",
    "packet_number": 463,
    "ciphertext": "b31e48f9a23dcf1d...",
    "encoding": "hex"
  }
]
Field Description
file Relative path to the source pcapng trace file
packet_number Packet index within the trace file
ciphertext Hex-encoded ciphertext bytes
encoding Always "hex"

expected_output/audit.json

Structured description of the encryption protocol. Validated against common/audit_schema.json.

{
  "ciphers": [
    {
      "cipher": "DES",
      "mode": "ECB",
      "padding": "pkcs7"
    }
  ],
  "vulnerable": true,
  "key_exchange": "none",
  "key_hex": "577331566378376e",
  "iv_hex": null
}

expected_output/encrypt.py

Executable Python script implementing the cipher. Follows the interface defined in common/encrypt_template.py:

python encrypt.py <plaintext_hex> [--key-hex KEY] [--iv-hex IV]

Reads plaintext as hex on the command line, prints ciphertext as hex to stdout. Applies only the cipher layer -- no compression, base64, or transport encoding.

Expects Python >= 3.11. Install from common/pyproject.toml:

cd common && pip install .

expected_output/plaintexts.json

Same structure as ciphertexts.json with an added decrypted field containing the known plaintext as a hex string:

[
  {
    "file": "input/traces/com.example.app.pcapng",
    "packet_number": 463,
    "ciphertext": "b31e48f9a23dcf1d...",
    "encoding": "hex",
    "decrypted": "7b22617070766572..."
  }
]