| --- |
| |
| language: |
| - en |
| tags: |
| - vulnerability-detection |
| - cve |
| - code-changes |
| - software-security |
| - stratified-split |
| license: mit |
| dataset_info: |
| features: |
| - name: idx |
| dtype: int64 |
| - name: func_before |
| dtype: string |
| - name: Vulnerability Classification |
| dtype: string |
| - name: vul |
| dtype: int64 |
| - name: func_after |
| dtype: string |
| - name: patch |
| dtype: string |
| - name: CWE ID |
| dtype: string |
| - name: lines_before |
| dtype: string |
| - name: lines_after |
| dtype: string |
| splits: |
| - name: train |
| num_examples: 150909 |
| - name: validation |
| num_examples: 18864 |
| - name: test |
| num_examples: 18863 |
| |
| |
| dataset_original_file_size: 10GB uuncompressed |
| --- |
| |
| # MSR Data Cleaned - C/C++ Code Vulnerability Dataset |
|
|
| [](LICENSE) |
|
|
|
|
|
|
| ## π Dataset Description |
| A curated collection of C/C++ code vulnerabilities paired with: |
| - CVE details (scores, classifications, exploit status) |
| - Code changes (commit messages, added/deleted lines) |
| - File-level and function-level diffs |
|
|
| ## π Sample Data Structure from original file |
| ```python |
| +---------------+-----------------+----------------------+---------------------------+ |
| | CVE ID | Attack Origin | Publish Date | Summary | |
| +===============+=================+======================+===========================+ |
| | CVE-2015-8467 | Remote | 2015-12-29 | "The samldb_check_user..."| |
| +---------------+-----------------+----------------------+---------------------------+ |
| | CVE-2016-1234 | Local | 2016-01-15 | "Buffer overflow in..." | |
| +---------------+-----------------+----------------------+---------------------------+ |
| |
| ``` |
| Note: This is a simplified preview; the full dataset includes additional fields like commit_id, func_before, etc. |
|
|
|
|
| ### 1. Accessing in Colab |
| ```python |
| !pip install huggingface_hub -q |
| from huggingface_hub import snapshot_download |
| |
| repo_id = "starsofchance/MSR_data_cleaned" |
| dataset_path = snapshot_download(repo_id=repo_id, repo_type="dataset") |
| ``` |
|
|
| ### 2. Extracting the Dataset |
| ```python |
| !apt-get install unzip -qq |
| !unzip "/root/.cache/huggingface/.../MSR_data_cleaned.zip" -d "/content/extracted_data" |
| ``` |
| **Note: Extracted size is 10GB (1.5GB compressed). Ensure sufficient disk space. |
| |
| ### 3. Creating Splits (Colab Pro Recommended) |
| We used this memory-efficient approach: |
| ```python |
| from datasets import load_dataset |
| dataset = load_dataset("csv", data_files="MSR_data_cleaned.csv", streaming=True) |
| |
| # Randomly distribute rows (80-10-10) |
| for row in dataset: |
| rand = random.random() |
| if rand < 0.8: write_to(train.csv) |
| elif rand < 0.9: write_to(validation.csv) |
| else: write_to(test.csv) |
| ``` |
| |
| |
| **Hardware Requirements:** |
| - Minimum 25GB RAM |
| - Strong CPU (Colab Pro T4 GPU recommended) |
|
|
| ##π Dataset Statistics |
|
|
| - Number of Rows: 188,636 |
| - Vulnerability Distribution: |
| - Vulnerable (1): 18,863 (~10%) |
| - Non-Vulnerable (0): 169,773 (~90%) |
| ##π Data Fields Description |
| - CVE_ID: Unique identifier for the vulnerability (Common Vulnerabilities and Exposures). |
| - CWE_ID: Weakness category identifier (Common Weakness Enumeration). |
| - Score: CVSS score indicating severity (float, 0-10). |
| - Summary: Brief description of the vulnerability. |
| - commit_id: Git commit hash linked to the code change. |
| - codeLink: URL to the code repository or commit. |
| - file_name: Name of the file containing the vulnerability. |
| - func_after: Function code after the change. |
| - lines_after: Code lines after the change. |
| - Access_Gained: Type of access gained by exploiting the vulnerability. |
| - Attack_Origin: Source of the attack (e.g., Remote, Local). |
| - Authentication_Required: Whether authentication is needed to exploit. |
| - Availability: Impact on system availability. |
| - CVE_Page: URL to the CVE details page. |
| - Complexity: Complexity of exploiting the vulnerability. |
| - Confidentiality: Impact on data confidentiality. |
| - Integrity: Impact on data integrity. |
| - Known_Exploits: Details of known exploits, if any. |
| - Publish_Date: Date the vulnerability was published. |
| - Update_Date: Date of the last update to the vulnerability data. |
| - Vulnerability_Classification: Type or category of the vulnerability. |
| - add_lines: Lines added in the commit. |
| - del_lines: Lines deleted in the commit. |
| - commit_message: Description of the commit. |
| - files_changed: List of files modified in the commit. |
| - func_before: Function code before the change. |
| - lang: Programming language (e.g., C, C++). |
| - lines_before: Code lines before the change. |
|
|
|
|
| ## splits file for UltiVul project: |
|
|
| ## π Sample Data Structure (from train.csv) |
| ```python |
| { |
| 'idx': 0, # Unique ID within the train split |
| 'func_before': '...', # String containing function code before change |
| 'Vulnerability Classification': '...', # Original vulnerability type classification |
| 'vul': 0, # Integer: 0 for non-vulnerable, 1 for vulnerable (target label) |
| 'func_after': '...', # String containing function code after change |
| 'patch': '...', # String containing diff patch |
| 'CWE ID': '...', # String CWE ID, e.g., "CWE-119" |
| 'lines_before': '...', # String lines before change context |
| 'lines_after': '...' # String lines after change context |
| } |
| ``` |
| **Note: This shows the structure of the final split files (train.csv, validation.csv, test.csv). The original MSR_data_cleaned.csv contains many more metadata fields. |
| |
| |
| ##π¦ Dataset New Files |
| The dataset is available as three CSV files (specially created for the UltiVul project) hosted on Hugging Face, uploaded via huggingface_hub: |
| |
| - train.csv |
| Size: 667 MB |
| Description: Training split with 150,909 samples, approximately 80% of the data. |
| - validation.csv |
| Size: 86 MB |
| Description: Validation split with 18,864 samples, approximately 10% of the data. |
| - test.csv |
| Size: 84.8 MB |
| Description: Test split with 18,863 samples, approximately 10% of the data. |
| |
| |
| |
| π Acknowledgements |
| Original dataset provided by Fan et al., 2020 |
| Thanks to the Hugging Face team for dataset hosting tools. |
| |
| ## π Citation |
| ```bibtex |
| @inproceedings{fan2020ccode, |
| title={A C/C++ Code Vulnerability Dataset with Code Changes and CVE Summaries}, |
| author={Fan, Jiahao and Li, Yi and Wang, Shaohua and Nguyen, Tien N}, |
| booktitle={MSR '20: 17th International Conference on Mining Software Repositories}, |
| pages={1--5}, |
| year={2020}, |
| doi={10.1145/3379597.3387501} |
| } |
| ``` |
| |
| ## π Dataset Creation |
| - **Source**: Original data from [MSR 2020 Paper](https://doi.org/10.1145/3379597.3387501) |
| - **Processing**: |
| - Cleaned and standardized CSV format |
| - Stream-based splitting to handle large size |
| - Preserved all original metadata |
| |
| |