Upload README.md with huggingface_hub
Browse files
README.md
CHANGED
|
@@ -49,50 +49,36 @@ configs:
|
|
| 49 |
data_files:
|
| 50 |
- split: full
|
| 51 |
path: hackersignal_sample_10k.jsonl
|
| 52 |
-
- config_name:
|
| 53 |
data_files:
|
| 54 |
- split: train
|
| 55 |
-
path:
|
| 56 |
- split: validation
|
| 57 |
-
path:
|
| 58 |
- split: test
|
| 59 |
-
path:
|
| 60 |
-
- config_name: task2_cve_linkage
|
| 61 |
-
data_files:
|
| 62 |
-
- split: train
|
| 63 |
-
path: benchmark/task2_cve_linkage/train.jsonl
|
| 64 |
-
- split: validation
|
| 65 |
-
path: benchmark/task2_cve_linkage/val.jsonl
|
| 66 |
-
- split: test
|
| 67 |
-
path: benchmark/task2_cve_linkage/test.jsonl
|
| 68 |
- split: corpus
|
| 69 |
-
path:
|
| 70 |
-
- config_name:
|
| 71 |
-
data_files:
|
| 72 |
-
- split: train
|
| 73 |
-
path: benchmark/task3_severity/train.jsonl
|
| 74 |
-
- split: validation
|
| 75 |
-
path: benchmark/task3_severity/val.jsonl
|
| 76 |
-
- split: test
|
| 77 |
-
path: benchmark/task3_severity/test.jsonl
|
| 78 |
-
- config_name: task4_hacker_exploit_labeling
|
| 79 |
data_files:
|
| 80 |
- split: train
|
| 81 |
-
path:
|
| 82 |
- split: validation
|
| 83 |
-
path:
|
| 84 |
- split: test
|
| 85 |
-
path:
|
| 86 |
-
-
|
|
|
|
|
|
|
| 87 |
data_files:
|
| 88 |
- split: train
|
| 89 |
-
path:
|
| 90 |
- split: validation
|
| 91 |
-
path:
|
| 92 |
- split: test
|
| 93 |
-
path:
|
| 94 |
- split: corpus
|
| 95 |
-
path:
|
| 96 |
---
|
| 97 |
|
| 98 |
# HackerSignal
|
|
@@ -108,7 +94,7 @@ A large-scale, multi-source dataset linking hacker community discourse, exploit
|
|
| 108 |
| Source layers | 8 |
|
| 109 |
| Temporal span | 1988--2026 |
|
| 110 |
| CVE-linked rows | 360,004 |
|
| 111 |
-
| Benchmark tasks |
|
| 112 |
|
| 113 |
## Quick Start
|
| 114 |
|
|
@@ -119,7 +105,7 @@ from datasets import load_dataset
|
|
| 119 |
sample = load_dataset("DatasetSubmission/HackerSignal", "sample")
|
| 120 |
|
| 121 |
# Load a benchmark task
|
| 122 |
-
task1 = load_dataset("DatasetSubmission/HackerSignal", "
|
| 123 |
|
| 124 |
# Load the full corpus (12 GB)
|
| 125 |
full = load_dataset("DatasetSubmission/HackerSignal", "default")
|
|
@@ -140,17 +126,8 @@ full = load_dataset("DatasetSubmission/HackerSignal", "default")
|
|
| 140 |
|
| 141 |
## Benchmark Tasks
|
| 142 |
|
| 143 |
-
### Task 1:
|
| 144 |
-
|
| 145 |
-
|
| 146 |
-
| Split | Rows |
|
| 147 |
-
|-------|------|
|
| 148 |
-
| Train | 89,906 |
|
| 149 |
-
| Val | 1,400 |
|
| 150 |
-
| Test | 1,236 |
|
| 151 |
-
|
| 152 |
-
### Task 2: CVE Linkage Retrieval
|
| 153 |
-
Given source evidence text, retrieve the correct NVD CVE entry from a corpus of 340K descriptions. Quality-controlled to remove unretrievable rows.
|
| 154 |
|
| 155 |
| Split | Rows |
|
| 156 |
|-------|------|
|
|
@@ -159,32 +136,24 @@ Given source evidence text, retrieve the correct NVD CVE entry from a corpus of
|
|
| 159 |
| Test | 550 |
|
| 160 |
| Corpus | 340,536 |
|
| 161 |
|
| 162 |
-
### Task
|
| 163 |
-
|
| 164 |
-
|
| 165 |
-
| Split | Rows |
|
| 166 |
-
|-------|------|
|
| 167 |
-
| Train | 6,797 |
|
| 168 |
-
| Val | 12,836 |
|
| 169 |
-
| Test | 11,711 |
|
| 170 |
-
|
| 171 |
-
### Task 4: Hacker Exploit Labeling
|
| 172 |
-
Ternary weak-supervision task: 0=non-exploit/noise, 1=vulnerability discussion, 2=actionable exploit.
|
| 173 |
|
| 174 |
| Split | Rows |
|
| 175 |
|-------|------|
|
| 176 |
-
| Train |
|
| 177 |
-
| Val | 1,
|
| 178 |
-
| Test |
|
|
|
|
| 179 |
|
| 180 |
-
### Task
|
| 181 |
-
|
| 182 |
|
| 183 |
| Split | Rows |
|
| 184 |
|-------|------|
|
| 185 |
-
| Train |
|
| 186 |
-
| Val | 1,
|
| 187 |
-
| Test |
|
| 188 |
| Corpus | 340,536 |
|
| 189 |
|
| 190 |
## Schema
|
|
|
|
| 49 |
data_files:
|
| 50 |
- split: full
|
| 51 |
path: hackersignal_sample_10k.jsonl
|
| 52 |
+
- config_name: task1_cve_linkage
|
| 53 |
data_files:
|
| 54 |
- split: train
|
| 55 |
+
path: benchmark_v2/task1_cve_linkage/train.jsonl
|
| 56 |
- split: validation
|
| 57 |
+
path: benchmark_v2/task1_cve_linkage/val.jsonl
|
| 58 |
- split: test
|
| 59 |
+
path: benchmark_v2/task1_cve_linkage/test.jsonl
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 60 |
- split: corpus
|
| 61 |
+
path: benchmark_v2/task1_cve_linkage/corpus.jsonl
|
| 62 |
+
- config_name: task2_signal_detection
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 63 |
data_files:
|
| 64 |
- split: train
|
| 65 |
+
path: benchmark_v2/task2_signal_detection/train.jsonl
|
| 66 |
- split: validation
|
| 67 |
+
path: benchmark_v2/task2_signal_detection/val.jsonl
|
| 68 |
- split: test
|
| 69 |
+
path: benchmark_v2/task2_signal_detection/test.jsonl
|
| 70 |
+
- split: corpus
|
| 71 |
+
path: benchmark_v2/task2_signal_detection/corpus.jsonl
|
| 72 |
+
- config_name: task3_temporal_generalization
|
| 73 |
data_files:
|
| 74 |
- split: train
|
| 75 |
+
path: benchmark_v2/task3_temporal_generalization/train.jsonl
|
| 76 |
- split: validation
|
| 77 |
+
path: benchmark_v2/task3_temporal_generalization/val.jsonl
|
| 78 |
- split: test
|
| 79 |
+
path: benchmark_v2/task3_temporal_generalization/test.jsonl
|
| 80 |
- split: corpus
|
| 81 |
+
path: benchmark_v2/task3_temporal_generalization/corpus.jsonl
|
| 82 |
---
|
| 83 |
|
| 84 |
# HackerSignal
|
|
|
|
| 94 |
| Source layers | 8 |
|
| 95 |
| Temporal span | 1988--2026 |
|
| 96 |
| CVE-linked rows | 360,004 |
|
| 97 |
+
| Benchmark tasks | 3 |
|
| 98 |
|
| 99 |
## Quick Start
|
| 100 |
|
|
|
|
| 105 |
sample = load_dataset("DatasetSubmission/HackerSignal", "sample")
|
| 106 |
|
| 107 |
# Load a benchmark task
|
| 108 |
+
task1 = load_dataset("DatasetSubmission/HackerSignal", "task1_cve_linkage")
|
| 109 |
|
| 110 |
# Load the full corpus (12 GB)
|
| 111 |
full = load_dataset("DatasetSubmission/HackerSignal", "default")
|
|
|
|
| 126 |
|
| 127 |
## Benchmark Tasks
|
| 128 |
|
| 129 |
+
### Task 1: CVE Linkage Retrieval (CVE-R)
|
| 130 |
+
Cross-source temporally OOD entity grounding: given exploit/advisory evidence text, retrieve the correct NVD CVE entry from a corpus of 340K descriptions. Quality-controlled to remove unretrievable rows.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 131 |
|
| 132 |
| Split | Rows |
|
| 133 |
|-------|------|
|
|
|
|
| 136 |
| Test | 550 |
|
| 137 |
| Corpus | 340,536 |
|
| 138 |
|
| 139 |
+
### Task 2: Hacker Signal Detection (HSD)
|
| 140 |
+
Two-stage task: (1) detect actionable exploit signals from hacker community noise, (2) ground positives to NVD CVE. 10:1 negative-to-positive ratio reflects real-world signal rarity.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 141 |
|
| 142 |
| Split | Rows |
|
| 143 |
|-------|------|
|
| 144 |
+
| Train | 4,202 |
|
| 145 |
+
| Val | 1,606 |
|
| 146 |
+
| Test | 407 |
|
| 147 |
+
| Corpus | 340,536 |
|
| 148 |
|
| 149 |
+
### Task 3: Temporal Generalization (TG)
|
| 150 |
+
Identical retrieval formulation to Task 1 but with strict CVE-disjoint constraint: C_train ∩ C_test = ∅. Split by CVE publication year (train: <2022, test: 2024+) to test generalization to wholly unseen vulnerabilities.
|
| 151 |
|
| 152 |
| Split | Rows |
|
| 153 |
|-------|------|
|
| 154 |
+
| Train | 41,630 |
|
| 155 |
+
| Val | 1,776 |
|
| 156 |
+
| Test | 393 |
|
| 157 |
| Corpus | 340,536 |
|
| 158 |
|
| 159 |
## Schema
|