Update README.md with more information (#2)
Browse files- Update README.md with more information (5aadfca25c34301fe20c2da5b1ca5980a3dc7146)
Co-authored-by: Kevin X <KevinX-Penn28@users.noreply.huggingface.co>
README.md
CHANGED
|
@@ -50,6 +50,35 @@ The core set of information in this dataset lies in two files, `data/project_inf
|
|
| 50 |
We also provide other essential information such as CVE advisory, and build information for the projects.
|
| 51 |
We now go into the project information and fix information CSVs.
|
| 52 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 53 |
### Project Info
|
| 54 |
|
| 55 |
| id | project_slug | cve_id | cwe_id | cwe_name | github_username | github_repository_name | github_tag | github_url | advisory_id | buggy_commit_id | fix_commit_ids |
|
|
@@ -120,48 +149,62 @@ An extension of this dataset can be found on the Github repository, which provid
|
|
| 120 |
|
| 121 |
<!-- Address questions around how the dataset is intended to be used. -->
|
| 122 |
|
| 123 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 124 |
|
| 125 |
<!-- This section describes suitable use cases for the dataset. -->
|
| 126 |
|
| 127 |
-
|
|
|
|
|
|
|
| 128 |
|
| 129 |
### Out-of-Scope Use
|
| 130 |
|
| 131 |
-
|
| 132 |
-
|
| 133 |
-
|
| 134 |
|
| 135 |
-
|
| 136 |
|
| 137 |
-
|
|
|
|
| 138 |
|
| 139 |
[More Information Needed]
|
| 140 |
|
| 141 |
-
## Dataset Creation
|
| 142 |
-
|
| 143 |
### Curation Rationale
|
| 144 |
|
| 145 |
-
|
| 146 |
-
|
| 147 |
-
|
| 148 |
|
| 149 |
### Source Data
|
| 150 |
|
| 151 |
<!-- This section describes the source data (e.g. news text and headlines, social media posts, translated sentences, ...). -->
|
|
|
|
|
|
|
|
|
|
| 152 |
|
| 153 |
#### Data Collection and Processing
|
| 154 |
|
| 155 |
<!-- This section describes the data collection and processing process such as data selection criteria, filtering and normalization methods, tools and libraries used, etc. -->
|
| 156 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 157 |
[More Information Needed]
|
| 158 |
|
| 159 |
#### Who are the source data producers?
|
| 160 |
|
| 161 |
<!-- This section describes the people or systems who originally created the data. It should also include self-reported demographic or identity information for the source data creators if this information is available. -->
|
| 162 |
|
| 163 |
-
[More Information Needed]
|
| 164 |
-
|
| 165 |
### Annotations [optional]
|
| 166 |
|
| 167 |
<!-- If the dataset contains annotations which are not part of the initial data collection, use this section to describe them. -->
|
|
@@ -188,7 +231,10 @@ An extension of this dataset can be found on the Github repository, which provid
|
|
| 188 |
|
| 189 |
<!-- This section is meant to convey both technical and sociotechnical limitations. -->
|
| 190 |
|
| 191 |
-
|
|
|
|
|
|
|
|
|
|
| 192 |
|
| 193 |
### Recommendations
|
| 194 |
|
|
@@ -225,15 +271,24 @@ Consider citing our paper:
|
|
| 225 |
|
| 226 |
<!-- If relevant, include terms and calculations in this section that can help readers understand the dataset or dataset card. -->
|
| 227 |
|
| 228 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
| 229 |
|
| 230 |
## More Information [optional]
|
| 231 |
|
| 232 |
[More Information Needed]
|
| 233 |
|
| 234 |
-
## Dataset Card Authors
|
| 235 |
|
| 236 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 237 |
|
| 238 |
## Dataset Card Contact
|
| 239 |
|
|
|
|
| 50 |
We also provide other essential information such as CVE advisory, and build information for the projects.
|
| 51 |
We now go into the project information and fix information CSVs.
|
| 52 |
|
| 53 |
+
### Advisory
|
| 54 |
+
|
| 55 |
+
vuln_id | schema_version | published_date | modified_date | aliases | summary | details | cvss_version | cvss_vector | cvss_score | severity_rating | cwe_ids | ecosystem | package_name | introduced_version | fixed_version | references | github_reviewed | github_reviewed_at | nvd_published_at
|
| 56 |
+
--------|----------------|----------------|---------------|---------|---------|---------|---------------|--------------|-------------|------------------|---------|-----------|----------------|--------------------|---------------|------------|------------------|---------------------|------------------
|
| 57 |
+
CVE-2022-12345 | 1.4.0 | 2022-01-01 | 2022-01-10 | GHSA-xxxx-yyyy-zzzz | Example XSS vuln | Reflected XSS in parameter `q` | CVSS:3.1 | AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | 6.1 | MODERATE | CWE-79 | Maven | com.example:library | 1.0.0 | 1.0.1 | https://example.com/advisory | true | 2022-01-05T12:00:00Z | 2022-01-01T00:00:00Z
|
| 58 |
+
|
| 59 |
+
This data is extracted from the CWE-Mitre net database and converted to JSON format.
|
| 60 |
+
We now get into each field and explain what they are.
|
| 61 |
+
- `vuln_id`: a string like `CVE-2021-44667` or `GHSA-xxxx-yyyy-zzzz` representing the unique ID of the vulnerability.
|
| 62 |
+
- `schema_version`: a string indicating the schema used to encode this data (e.g., `"1.4.0"`).
|
| 63 |
+
- `published_date`: a date (in ISO 8601 format, e.g. `2022-03-12`) representing when the vulnerability was first disclosed.
|
| 64 |
+
- `modified_date`: a date representing when the record was last updated.
|
| 65 |
+
- `aliases`: a list of strings (e.g., `[ "CVE-2021-44667" ]`) capturing alternate identifiers.
|
| 66 |
+
- `summary`: a short string summarizing the vulnerability in one sentence.
|
| 67 |
+
- `details`: a longer string giving a full description of how the vulnerability occurs and its impact.
|
| 68 |
+
- `cvss_version`: a string like `CVSS:3.1` indicating the version of the CVSS specification used.
|
| 69 |
+
- `cvss_vector`: a CVSS vector string (e.g., `AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`) describing the severity dimensions.
|
| 70 |
+
- `cvss_score`: a float between 0.0 and 10.0 quantifying the vulnerability severity.
|
| 71 |
+
- `severity_rating`: a string with one of `LOW`, `MODERATE`, `HIGH`, or `CRITICAL` as a qualitative severity label.
|
| 72 |
+
- `cwe_ids`: a list of strings like `["CWE-79"]` referring to Common Weakness Enumeration identifiers.
|
| 73 |
+
- `ecosystem`: a string such as `"Maven"` or `"npm"` indicating the software package manager ecosystem affected.
|
| 74 |
+
- `package_name`: a string like `com.alibaba.nacos:nacos-common` identifying the specific package.
|
| 75 |
+
- `introduced_version`: a string denoting the first version where the vulnerability was introduced (e.g., `"0"`).
|
| 76 |
+
- `fixed_version`: a string indicating the version where the issue was patched (e.g., `"2.0.4"`).
|
| 77 |
+
- `references`: a list of URLs pointing to advisory pages, commits, issue trackers, etc.
|
| 78 |
+
- `github_reviewed`: a boolean (`true` or `false`) showing whether GitHub has reviewed this vulnerability.
|
| 79 |
+
- `github_reviewed_at`: a timestamp (e.g., `2022-03-14T23:25:35Z`) of when GitHub reviewed the advisory.
|
| 80 |
+
- `nvd_published_at`: a timestamp of when the NVD officially published the vulnerability.
|
| 81 |
+
|
| 82 |
### Project Info
|
| 83 |
|
| 84 |
| id | project_slug | cve_id | cwe_id | cwe_name | github_username | github_repository_name | github_tag | github_url | advisory_id | buggy_commit_id | fix_commit_ids |
|
|
|
|
| 149 |
|
| 150 |
<!-- Address questions around how the dataset is intended to be used. -->
|
| 151 |
|
| 152 |
+
- Study patterns from previous vulnerability fixes to address current vulnerabilities effectively.
|
| 153 |
+
- Evaluate and compare performance of static analysis tools (e.g., CodeQL, Semgrep) on real-world vulnerabilities.
|
| 154 |
+
- Assess and measure accuracy, recall, precision, and false-positive rates of various security tools across different vulnerability types.
|
| 155 |
+
- Use detailed fix information to improve automatic patch generation and vulnerability remediation systems.
|
| 156 |
+
- Provide examples of code vulnerabilities and their respective fixes to educate developers, cybersecurity professionals, and students.
|
| 157 |
+
|
| 158 |
+
### Direct Use Examples
|
| 159 |
|
| 160 |
<!-- This section describes suitable use cases for the dataset. -->
|
| 161 |
|
| 162 |
+
- Analyzing past Java-based CVE fixes on CWE-022 classifications to develop guidelines for addressing file-access vulnerabilities
|
| 163 |
+
- Conducting controlled experiments to systematically quantify false positives and true positive detections of security tools for injection
|
| 164 |
+
- Developing interactive security training modules that showcase vulnerabilities alongside detailed explanations of the actual patches
|
| 165 |
|
| 166 |
### Out-of-Scope Use
|
| 167 |
|
| 168 |
+
- Because the dataset covers only specific vulnerability types and limited CVEs, it should not be treated as a complete security benchmark for evaluating the entire security posture of software projects.
|
| 169 |
+
- Sole reliance on the provided CVE data without additional context or tooling may lead to misinterpretations on what the vulnerability actually is.
|
| 170 |
+
- Tools unrelated to static analysis or vulnerability patching (e.g., antivirus software) would likely see limited benefit from this dataset.
|
| 171 |
|
| 172 |
+
### Misuse and Malicious Use
|
| 173 |
|
| 174 |
+
- Attackers could analyze vulnerable code examples to understand how to exploit similar software weaknesses
|
| 175 |
+
- Detailed information about vulnerabilities might aid in crafting targeted attacks against unpatched software versions.
|
| 176 |
|
| 177 |
[More Information Needed]
|
| 178 |
|
|
|
|
|
|
|
| 179 |
### Curation Rationale
|
| 180 |
|
| 181 |
+
The dataset was created to provide a high-quality benchmark for evaluating the ability of IRIS to detect and fix real-world vulnerabilities in Java code.
|
| 182 |
+
Existing benchmarks often lack direct links to real CVEs and actionable fixes.
|
| 183 |
+
This dataset bridges that gap with reproducible, well-labeled examples tied to CVEs and CWEs.
|
| 184 |
|
| 185 |
### Source Data
|
| 186 |
|
| 187 |
<!-- This section describes the source data (e.g. news text and headlines, social media posts, translated sentences, ...). -->
|
| 188 |
+
- GitHub Security Advisories (https://github.com/advisories): Used to extract structured CVE metadata, severity ratings, affected packages, ecosystem information.
|
| 189 |
+
- Github commits (https://docs.github.com/en/pull-requests/committing-changes-to-your-project/creating-and-editing-commits/about-commits): Commit logs and diffs were used to identify the buggy and fixed versions of code and determine class/method-level changes needed to fix the vulnerability.
|
| 190 |
+
- MITRE CWE Database (https://cwe.mitre.org): Provided the classification, naming, description, and available links related to each vulnerability type.
|
| 191 |
|
| 192 |
#### Data Collection and Processing
|
| 193 |
|
| 194 |
<!-- This section describes the data collection and processing process such as data selection criteria, filtering and normalization methods, tools and libraries used, etc. -->
|
| 195 |
|
| 196 |
+
- Projects were selected based on the availability of Java source code and documentation on how to fix the error
|
| 197 |
+
- Buggy and fixed code versions using git diff and commit history
|
| 198 |
+
- Associated advisory information from GitHub Security Advisories and NVD
|
| 199 |
+
- Class and method boundaries using AST analysis
|
| 200 |
+
- Patch validation was performed via manual review and automated testing where possible.
|
| 201 |
+
|
| 202 |
[More Information Needed]
|
| 203 |
|
| 204 |
#### Who are the source data producers?
|
| 205 |
|
| 206 |
<!-- This section describes the people or systems who originally created the data. It should also include self-reported demographic or identity information for the source data creators if this information is available. -->
|
| 207 |
|
|
|
|
|
|
|
| 208 |
### Annotations [optional]
|
| 209 |
|
| 210 |
<!-- If the dataset contains annotations which are not part of the initial data collection, use this section to describe them. -->
|
|
|
|
| 231 |
|
| 232 |
<!-- This section is meant to convey both technical and sociotechnical limitations. -->
|
| 233 |
|
| 234 |
+
- Biased toward Java: Only Java-based CVEs are included; generalization to other languages (e.g., C/C++, Python) should be done with caution.
|
| 235 |
+
- Limited in CWE scope: Covers only 4 CWEs — CWE-022, CWE-078, CWE-079, CWE-094.
|
| 236 |
+
- Biased toward open-source: Enterprise and closed-source vulnerabilities are excluded, limiting the scope of evaluation.
|
| 237 |
+
- Manually vetted, which introduces potential human error or subjective judgment in what counts as the “core fix.”
|
| 238 |
|
| 239 |
### Recommendations
|
| 240 |
|
|
|
|
| 271 |
|
| 272 |
<!-- If relevant, include terms and calculations in this section that can help readers understand the dataset or dataset card. -->
|
| 273 |
|
| 274 |
+
- CVE (Common Vulnerabilities and Exposures): A unique identifier for a known security vulnerability.
|
| 275 |
+
- CWE (Common Weakness Enumeration): A formalized taxonomy of software vulnerability types.
|
| 276 |
+
- CVSS (Common Vulnerability Scoring System): A standard for assessing the severity of security vulnerabilities.
|
| 277 |
+
- Static Analysis: Code analysis technique that examines source code without executing it.
|
| 278 |
+
- Patch: A set of changes to a program designed to fix a known issue or vulnerability
|
| 279 |
|
| 280 |
## More Information [optional]
|
| 281 |
|
| 282 |
[More Information Needed]
|
| 283 |
|
| 284 |
+
## Dataset Card Authors
|
| 285 |
|
| 286 |
+
- Ziyang Li (University of Pennsylvania)
|
| 287 |
+
- Saikat Dutta (University of Pennsylvania)
|
| 288 |
+
- Mayur Naik (University of Pennsylvania)
|
| 289 |
+
- Claire Wang (University of Pennsylvania)
|
| 290 |
+
- Kevin Xue (University of Pennsylvania)
|
| 291 |
+
- Amartya Das
|
| 292 |
|
| 293 |
## Dataset Card Contact
|
| 294 |
|