Upload folder using huggingface_hub
Browse files- .gitattributes +8 -0
- benchmark_v2/benchmark_meta.json +62 -0
- benchmark_v2/results_task2.json +23 -0
- benchmark_v2/task1_cve_linkage/corpus.jsonl +3 -0
- benchmark_v2/task1_cve_linkage/meta.json +21 -0
- benchmark_v2/task1_cve_linkage/test.jsonl +0 -0
- benchmark_v2/task1_cve_linkage/train.jsonl +3 -0
- benchmark_v2/task1_cve_linkage/val.jsonl +0 -0
- benchmark_v2/task2_signal_detection/corpus.jsonl +3 -0
- benchmark_v2/task2_signal_detection/meta.json +40 -0
- benchmark_v2/task2_signal_detection/test.jsonl +0 -0
- benchmark_v2/task2_signal_detection/train.jsonl +3 -0
- benchmark_v2/task2_signal_detection/val.jsonl +0 -0
- benchmark_v2/task3_temporal_generalization/corpus.jsonl +3 -0
- benchmark_v2/task3_temporal_generalization/corpus_test_cves.jsonl +3 -0
- benchmark_v2/task3_temporal_generalization/corpus_train_cves.jsonl +3 -0
- benchmark_v2/task3_temporal_generalization/meta.json +31 -0
- benchmark_v2/task3_temporal_generalization/test.jsonl +0 -0
- benchmark_v2/task3_temporal_generalization/train.jsonl +3 -0
- benchmark_v2/task3_temporal_generalization/val.jsonl +0 -0
.gitattributes
CHANGED
|
@@ -68,3 +68,11 @@ benchmark/task4_hacker_exploit_labeling/train.jsonl filter=lfs diff=lfs merge=lf
|
|
| 68 |
benchmark/task5_hacker_signal_detection/corpus.jsonl filter=lfs diff=lfs merge=lfs -text
|
| 69 |
unified_hacker_communities_neurips_public.jsonl filter=lfs diff=lfs merge=lfs -text
|
| 70 |
benchmark/task1_exploit_clf/train.jsonl filter=lfs diff=lfs merge=lfs -text
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 68 |
benchmark/task5_hacker_signal_detection/corpus.jsonl filter=lfs diff=lfs merge=lfs -text
|
| 69 |
unified_hacker_communities_neurips_public.jsonl filter=lfs diff=lfs merge=lfs -text
|
| 70 |
benchmark/task1_exploit_clf/train.jsonl filter=lfs diff=lfs merge=lfs -text
|
| 71 |
+
benchmark_v2/task1_cve_linkage/corpus.jsonl filter=lfs diff=lfs merge=lfs -text
|
| 72 |
+
benchmark_v2/task1_cve_linkage/train.jsonl filter=lfs diff=lfs merge=lfs -text
|
| 73 |
+
benchmark_v2/task2_signal_detection/corpus.jsonl filter=lfs diff=lfs merge=lfs -text
|
| 74 |
+
benchmark_v2/task2_signal_detection/train.jsonl filter=lfs diff=lfs merge=lfs -text
|
| 75 |
+
benchmark_v2/task3_temporal_generalization/corpus.jsonl filter=lfs diff=lfs merge=lfs -text
|
| 76 |
+
benchmark_v2/task3_temporal_generalization/corpus_test_cves.jsonl filter=lfs diff=lfs merge=lfs -text
|
| 77 |
+
benchmark_v2/task3_temporal_generalization/corpus_train_cves.jsonl filter=lfs diff=lfs merge=lfs -text
|
| 78 |
+
benchmark_v2/task3_temporal_generalization/train.jsonl filter=lfs diff=lfs merge=lfs -text
|
benchmark_v2/benchmark_meta.json
ADDED
|
@@ -0,0 +1,62 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"benchmark": "HackerSignal v2",
|
| 3 |
+
"tasks": {
|
| 4 |
+
"task1_cve_linkage": {
|
| 5 |
+
"name": "CVE Linkage Retrieval",
|
| 6 |
+
"description": "Cross-source, temporally OOD entity grounding: map heterogeneous threat evidence to canonical CVE identifiers.",
|
| 7 |
+
"type": "retrieval",
|
| 8 |
+
"metrics": [
|
| 9 |
+
"recall_at_1",
|
| 10 |
+
"recall_at_5",
|
| 11 |
+
"recall_at_10",
|
| 12 |
+
"mrr"
|
| 13 |
+
],
|
| 14 |
+
"splits": {
|
| 15 |
+
"train": 40698,
|
| 16 |
+
"val": 2551,
|
| 17 |
+
"test": 550
|
| 18 |
+
},
|
| 19 |
+
"corpus_size": 340536
|
| 20 |
+
},
|
| 21 |
+
"task2_signal_detection": {
|
| 22 |
+
"name": "Hacker Signal Detection",
|
| 23 |
+
"description": "Two-stage: detect actionable exploit intelligence in hacker discourse, then ground to CVE context.",
|
| 24 |
+
"type": "detection_and_retrieval",
|
| 25 |
+
"metrics": [
|
| 26 |
+
"f1_actionable",
|
| 27 |
+
"precision",
|
| 28 |
+
"recall",
|
| 29 |
+
"recall_at_5_on_positives",
|
| 30 |
+
"mrr_on_positives"
|
| 31 |
+
],
|
| 32 |
+
"splits": {
|
| 33 |
+
"train": 43200,
|
| 34 |
+
"val": 1830,
|
| 35 |
+
"test": 1578
|
| 36 |
+
},
|
| 37 |
+
"positive_counts": {
|
| 38 |
+
"train": 7200,
|
| 39 |
+
"val": 305,
|
| 40 |
+
"test": 263
|
| 41 |
+
}
|
| 42 |
+
},
|
| 43 |
+
"task3_temporal_generalization": {
|
| 44 |
+
"name": "Temporal Generalization (Unseen CVE Linkage)",
|
| 45 |
+
"description": "Link evidence to entirely unseen CVEs (CVE-2024+). Tests prospective generalization to new vulnerabilities.",
|
| 46 |
+
"type": "retrieval",
|
| 47 |
+
"metrics": [
|
| 48 |
+
"recall_at_1",
|
| 49 |
+
"recall_at_5",
|
| 50 |
+
"recall_at_10",
|
| 51 |
+
"mrr"
|
| 52 |
+
],
|
| 53 |
+
"splits": {
|
| 54 |
+
"train": 41630,
|
| 55 |
+
"val": 1776,
|
| 56 |
+
"test": 393
|
| 57 |
+
},
|
| 58 |
+
"corpus_size": 340536,
|
| 59 |
+
"constraint": "C_train \u2229 C_test = \u2205 (strictly disjoint CVE sets by year)"
|
| 60 |
+
}
|
| 61 |
+
}
|
| 62 |
+
}
|
benchmark_v2/results_task2.json
ADDED
|
@@ -0,0 +1,23 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"task2_signal_detection": {
|
| 3 |
+
"majority": {
|
| 4 |
+
"precision": 0.0,
|
| 5 |
+
"recall": 0.0,
|
| 6 |
+
"f1": 0.0
|
| 7 |
+
},
|
| 8 |
+
"tfidf_lr": {
|
| 9 |
+
"precision": 1.0,
|
| 10 |
+
"recall": 0.8648648648648649,
|
| 11 |
+
"f1": 0.927536231884058
|
| 12 |
+
},
|
| 13 |
+
"secbert": {
|
| 14 |
+
"precision": 1.0,
|
| 15 |
+
"recall": 0.8918918918918919,
|
| 16 |
+
"f1": 0.9428571428571428
|
| 17 |
+
},
|
| 18 |
+
"deberta_v3_base": {
|
| 19 |
+
"f1": null,
|
| 20 |
+
"error": "`tiktoken` is required to read a `tiktoken` file. Install it with `pip install tiktoken`."
|
| 21 |
+
}
|
| 22 |
+
}
|
| 23 |
+
}
|
benchmark_v2/task1_cve_linkage/corpus.jsonl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:95c2449b77c2ff019bcef044ab2c77ae42f35aadff5751a5e15ab4e7c174736a
|
| 3 |
+
size 121832466
|
benchmark_v2/task1_cve_linkage/meta.json
ADDED
|
@@ -0,0 +1,21 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"task": "cve_linkage_retrieval",
|
| 3 |
+
"description": "Cross-source temporally OOD entity grounding: given exploit evidence text, retrieve the correct NVD CVE entry.",
|
| 4 |
+
"metrics": [
|
| 5 |
+
"recall@1",
|
| 6 |
+
"recall@5",
|
| 7 |
+
"recall@10",
|
| 8 |
+
"mrr",
|
| 9 |
+
"ndcg@10"
|
| 10 |
+
],
|
| 11 |
+
"split_boundaries": {
|
| 12 |
+
"train_end": "2022-01-01",
|
| 13 |
+
"val_end": "2024-01-01"
|
| 14 |
+
},
|
| 15 |
+
"corpus_size": 340536,
|
| 16 |
+
"splits": {
|
| 17 |
+
"train": 40698,
|
| 18 |
+
"val": 2551,
|
| 19 |
+
"test": 550
|
| 20 |
+
}
|
| 21 |
+
}
|
benchmark_v2/task1_cve_linkage/test.jsonl
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
benchmark_v2/task1_cve_linkage/train.jsonl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:2afc4d49dbfd0b67d0a639f8b76cfb7cd884fe327b2f56c3cf7297881459926d
|
| 3 |
+
size 28624657
|
benchmark_v2/task1_cve_linkage/val.jsonl
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
benchmark_v2/task2_signal_detection/corpus.jsonl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:875266e9e23a9e7862fe31c0d96ef1ed27828390ab34fa31a4f679feca5d60f8
|
| 3 |
+
size 123194610
|
benchmark_v2/task2_signal_detection/meta.json
ADDED
|
@@ -0,0 +1,40 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"task": "hacker_signal_detection",
|
| 3 |
+
"description": "Two-stage: detect actionable exploit signals from hacker community noise, then ground positives to NVD CVE.",
|
| 4 |
+
"label_map": {
|
| 5 |
+
"0": "not_actionable",
|
| 6 |
+
"1": "actionable_exploit_signal"
|
| 7 |
+
},
|
| 8 |
+
"metrics": [
|
| 9 |
+
"f1_actionable",
|
| 10 |
+
"precision",
|
| 11 |
+
"recall",
|
| 12 |
+
"joint_recall@5",
|
| 13 |
+
"mrr"
|
| 14 |
+
],
|
| 15 |
+
"split_boundaries": {
|
| 16 |
+
"train_end": "2022-01-01",
|
| 17 |
+
"val_end": "2024-01-01"
|
| 18 |
+
},
|
| 19 |
+
"negative_ratio": "10:1",
|
| 20 |
+
"corpus_size": 340536,
|
| 21 |
+
"splits": {
|
| 22 |
+
"train": 4202,
|
| 23 |
+
"val": 1606,
|
| 24 |
+
"test": 407
|
| 25 |
+
},
|
| 26 |
+
"label_distribution": {
|
| 27 |
+
"train": {
|
| 28 |
+
"pos": 382,
|
| 29 |
+
"neg": 3820
|
| 30 |
+
},
|
| 31 |
+
"val": {
|
| 32 |
+
"pos": 146,
|
| 33 |
+
"neg": 1460
|
| 34 |
+
},
|
| 35 |
+
"test": {
|
| 36 |
+
"pos": 37,
|
| 37 |
+
"neg": 370
|
| 38 |
+
}
|
| 39 |
+
}
|
| 40 |
+
}
|
benchmark_v2/task2_signal_detection/test.jsonl
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
benchmark_v2/task2_signal_detection/train.jsonl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:447265445ef25318723acae155537ac79340c25484d9777e5db75f3df49f99f6
|
| 3 |
+
size 49825811
|
benchmark_v2/task2_signal_detection/val.jsonl
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
benchmark_v2/task3_temporal_generalization/corpus.jsonl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:875266e9e23a9e7862fe31c0d96ef1ed27828390ab34fa31a4f679feca5d60f8
|
| 3 |
+
size 123194610
|
benchmark_v2/task3_temporal_generalization/corpus_test_cves.jsonl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:d895ecdd2b751092932237e07985d68a1648219d76db02565b083a96c3f16920
|
| 3 |
+
size 41166462
|
benchmark_v2/task3_temporal_generalization/corpus_train_cves.jsonl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:8bfbb79278b9c1842feef62d5486e7ad494b5266b8b4497de316879d17d4e4ca
|
| 3 |
+
size 60002443
|
benchmark_v2/task3_temporal_generalization/meta.json
ADDED
|
@@ -0,0 +1,31 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
{
|
| 2 |
+
"task": "temporal_generalization",
|
| 3 |
+
"description": "Prospective CVE-disjoint retrieval: C_train \u2229 C_test = \u2205. Tests whether models generalize to wholly unseen vulnerabilities.",
|
| 4 |
+
"metrics": [
|
| 5 |
+
"recall@1",
|
| 6 |
+
"recall@5",
|
| 7 |
+
"recall@10",
|
| 8 |
+
"mrr",
|
| 9 |
+
"ndcg@10"
|
| 10 |
+
],
|
| 11 |
+
"cve_year_boundaries": {
|
| 12 |
+
"train": "<2022",
|
| 13 |
+
"val": "2022-2023",
|
| 14 |
+
"test": "2024+"
|
| 15 |
+
},
|
| 16 |
+
"cve_disjointness": {
|
| 17 |
+
"train_test_overlap": 0,
|
| 18 |
+
"verified_disjoint": true
|
| 19 |
+
},
|
| 20 |
+
"unique_cves": {
|
| 21 |
+
"train": 29713,
|
| 22 |
+
"val": 1647,
|
| 23 |
+
"test": 388
|
| 24 |
+
},
|
| 25 |
+
"corpus_size": 340536,
|
| 26 |
+
"splits": {
|
| 27 |
+
"train": 41630,
|
| 28 |
+
"val": 1776,
|
| 29 |
+
"test": 393
|
| 30 |
+
}
|
| 31 |
+
}
|
benchmark_v2/task3_temporal_generalization/test.jsonl
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|
benchmark_v2/task3_temporal_generalization/train.jsonl
ADDED
|
@@ -0,0 +1,3 @@
|
|
|
|
|
|
|
|
|
|
|
|
|
| 1 |
+
version https://git-lfs.github.com/spec/v1
|
| 2 |
+
oid sha256:8645db309f77ef44faec10b833483dcbfb62ca807e642d44da9661af03ae922f
|
| 3 |
+
size 29196629
|
benchmark_v2/task3_temporal_generalization/val.jsonl
ADDED
|
The diff for this file is too large to render.
See raw diff
|
|
|