claire71 KevinX-Penn28 commited on
Commit
ff6f9b1
·
verified ·
1 Parent(s): ac1b2bd

Update README.md with more information (#2)

Browse files

- Update README.md with more information (5aadfca25c34301fe20c2da5b1ca5980a3dc7146)


Co-authored-by: Kevin X <[email protected]>

Files changed (1) hide show
  1. README.md +73 -18
README.md CHANGED
@@ -50,6 +50,35 @@ The core set of information in this dataset lies in two files, `data/project_inf
50
  We also provide other essential information such as CVE advisory, and build information for the projects.
51
  We now go into the project information and fix information CSVs.
52
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
53
  ### Project Info
54
 
55
  | id | project_slug | cve_id | cwe_id | cwe_name | github_username | github_repository_name | github_tag | github_url | advisory_id | buggy_commit_id | fix_commit_ids |
@@ -120,48 +149,62 @@ An extension of this dataset can be found on the Github repository, which provid
120
 
121
  <!-- Address questions around how the dataset is intended to be used. -->
122
 
123
- ### Direct Use
 
 
 
 
 
 
124
 
125
  <!-- This section describes suitable use cases for the dataset. -->
126
 
127
- [More Information Needed]
 
 
128
 
129
  ### Out-of-Scope Use
130
 
131
- <!-- This section addresses misuse, malicious use, and uses that the dataset will not work well for. -->
132
-
133
- [More Information Needed]
134
 
135
- ## Dataset Structure
136
 
137
- <!-- This section provides a description of the dataset fields, and additional information about the dataset structure such as criteria used to create the splits, relationships between data points, etc. -->
 
138
 
139
  [More Information Needed]
140
 
141
- ## Dataset Creation
142
-
143
  ### Curation Rationale
144
 
145
- <!-- Motivation for the creation of this dataset. -->
146
-
147
- [More Information Needed]
148
 
149
  ### Source Data
150
 
151
  <!-- This section describes the source data (e.g. news text and headlines, social media posts, translated sentences, ...). -->
 
 
 
152
 
153
  #### Data Collection and Processing
154
 
155
  <!-- This section describes the data collection and processing process such as data selection criteria, filtering and normalization methods, tools and libraries used, etc. -->
156
 
 
 
 
 
 
 
157
  [More Information Needed]
158
 
159
  #### Who are the source data producers?
160
 
161
  <!-- This section describes the people or systems who originally created the data. It should also include self-reported demographic or identity information for the source data creators if this information is available. -->
162
 
163
- [More Information Needed]
164
-
165
  ### Annotations [optional]
166
 
167
  <!-- If the dataset contains annotations which are not part of the initial data collection, use this section to describe them. -->
@@ -188,7 +231,10 @@ An extension of this dataset can be found on the Github repository, which provid
188
 
189
  <!-- This section is meant to convey both technical and sociotechnical limitations. -->
190
 
191
- [More Information Needed]
 
 
 
192
 
193
  ### Recommendations
194
 
@@ -225,15 +271,24 @@ Consider citing our paper:
225
 
226
  <!-- If relevant, include terms and calculations in this section that can help readers understand the dataset or dataset card. -->
227
 
228
- [More Information Needed]
 
 
 
 
229
 
230
  ## More Information [optional]
231
 
232
  [More Information Needed]
233
 
234
- ## Dataset Card Authors [optional]
235
 
236
- [More Information Needed]
 
 
 
 
 
237
 
238
  ## Dataset Card Contact
239
 
 
50
  We also provide other essential information such as CVE advisory, and build information for the projects.
51
  We now go into the project information and fix information CSVs.
52
 
53
+ ### Advisory
54
+
55
+ vuln_id | schema_version | published_date | modified_date | aliases | summary | details | cvss_version | cvss_vector | cvss_score | severity_rating | cwe_ids | ecosystem | package_name | introduced_version | fixed_version | references | github_reviewed | github_reviewed_at | nvd_published_at
56
+ --------|----------------|----------------|---------------|---------|---------|---------|---------------|--------------|-------------|------------------|---------|-----------|----------------|--------------------|---------------|------------|------------------|---------------------|------------------
57
+ CVE-2022-12345 | 1.4.0 | 2022-01-01 | 2022-01-10 | GHSA-xxxx-yyyy-zzzz | Example XSS vuln | Reflected XSS in parameter `q` | CVSS:3.1 | AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | 6.1 | MODERATE | CWE-79 | Maven | com.example:library | 1.0.0 | 1.0.1 | https://example.com/advisory | true | 2022-01-05T12:00:00Z | 2022-01-01T00:00:00Z
58
+
59
+ This data is extracted from the CWE-Mitre net database and converted to JSON format.
60
+ We now get into each field and explain what they are.
61
+ - `vuln_id`: a string like `CVE-2021-44667` or `GHSA-xxxx-yyyy-zzzz` representing the unique ID of the vulnerability.
62
+ - `schema_version`: a string indicating the schema used to encode this data (e.g., `"1.4.0"`).
63
+ - `published_date`: a date (in ISO 8601 format, e.g. `2022-03-12`) representing when the vulnerability was first disclosed.
64
+ - `modified_date`: a date representing when the record was last updated.
65
+ - `aliases`: a list of strings (e.g., `[ "CVE-2021-44667" ]`) capturing alternate identifiers.
66
+ - `summary`: a short string summarizing the vulnerability in one sentence.
67
+ - `details`: a longer string giving a full description of how the vulnerability occurs and its impact.
68
+ - `cvss_version`: a string like `CVSS:3.1` indicating the version of the CVSS specification used.
69
+ - `cvss_vector`: a CVSS vector string (e.g., `AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`) describing the severity dimensions.
70
+ - `cvss_score`: a float between 0.0 and 10.0 quantifying the vulnerability severity.
71
+ - `severity_rating`: a string with one of `LOW`, `MODERATE`, `HIGH`, or `CRITICAL` as a qualitative severity label.
72
+ - `cwe_ids`: a list of strings like `["CWE-79"]` referring to Common Weakness Enumeration identifiers.
73
+ - `ecosystem`: a string such as `"Maven"` or `"npm"` indicating the software package manager ecosystem affected.
74
+ - `package_name`: a string like `com.alibaba.nacos:nacos-common` identifying the specific package.
75
+ - `introduced_version`: a string denoting the first version where the vulnerability was introduced (e.g., `"0"`).
76
+ - `fixed_version`: a string indicating the version where the issue was patched (e.g., `"2.0.4"`).
77
+ - `references`: a list of URLs pointing to advisory pages, commits, issue trackers, etc.
78
+ - `github_reviewed`: a boolean (`true` or `false`) showing whether GitHub has reviewed this vulnerability.
79
+ - `github_reviewed_at`: a timestamp (e.g., `2022-03-14T23:25:35Z`) of when GitHub reviewed the advisory.
80
+ - `nvd_published_at`: a timestamp of when the NVD officially published the vulnerability.
81
+
82
  ### Project Info
83
 
84
  | id | project_slug | cve_id | cwe_id | cwe_name | github_username | github_repository_name | github_tag | github_url | advisory_id | buggy_commit_id | fix_commit_ids |
 
149
 
150
  <!-- Address questions around how the dataset is intended to be used. -->
151
 
152
+ - Study patterns from previous vulnerability fixes to address current vulnerabilities effectively.
153
+ - Evaluate and compare performance of static analysis tools (e.g., CodeQL, Semgrep) on real-world vulnerabilities.
154
+ - Assess and measure accuracy, recall, precision, and false-positive rates of various security tools across different vulnerability types.
155
+ - Use detailed fix information to improve automatic patch generation and vulnerability remediation systems.
156
+ - Provide examples of code vulnerabilities and their respective fixes to educate developers, cybersecurity professionals, and students.
157
+
158
+ ### Direct Use Examples
159
 
160
  <!-- This section describes suitable use cases for the dataset. -->
161
 
162
+ - Analyzing past Java-based CVE fixes on CWE-022 classifications to develop guidelines for addressing file-access vulnerabilities
163
+ - Conducting controlled experiments to systematically quantify false positives and true positive detections of security tools for injection
164
+ - Developing interactive security training modules that showcase vulnerabilities alongside detailed explanations of the actual patches
165
 
166
  ### Out-of-Scope Use
167
 
168
+ - Because the dataset covers only specific vulnerability types and limited CVEs, it should not be treated as a complete security benchmark for evaluating the entire security posture of software projects.
169
+ - Sole reliance on the provided CVE data without additional context or tooling may lead to misinterpretations on what the vulnerability actually is.
170
+ - Tools unrelated to static analysis or vulnerability patching (e.g., antivirus software) would likely see limited benefit from this dataset.
171
 
172
+ ### Misuse and Malicious Use
173
 
174
+ - Attackers could analyze vulnerable code examples to understand how to exploit similar software weaknesses
175
+ - Detailed information about vulnerabilities might aid in crafting targeted attacks against unpatched software versions.
176
 
177
  [More Information Needed]
178
 
 
 
179
  ### Curation Rationale
180
 
181
+ The dataset was created to provide a high-quality benchmark for evaluating the ability of IRIS to detect and fix real-world vulnerabilities in Java code.
182
+ Existing benchmarks often lack direct links to real CVEs and actionable fixes.
183
+ This dataset bridges that gap with reproducible, well-labeled examples tied to CVEs and CWEs.
184
 
185
  ### Source Data
186
 
187
  <!-- This section describes the source data (e.g. news text and headlines, social media posts, translated sentences, ...). -->
188
+ - GitHub Security Advisories (https://github.com/advisories): Used to extract structured CVE metadata, severity ratings, affected packages, ecosystem information.
189
+ - Github commits (https://docs.github.com/en/pull-requests/committing-changes-to-your-project/creating-and-editing-commits/about-commits): Commit logs and diffs were used to identify the buggy and fixed versions of code and determine class/method-level changes needed to fix the vulnerability.
190
+ - MITRE CWE Database (https://cwe.mitre.org): Provided the classification, naming, description, and available links related to each vulnerability type.
191
 
192
  #### Data Collection and Processing
193
 
194
  <!-- This section describes the data collection and processing process such as data selection criteria, filtering and normalization methods, tools and libraries used, etc. -->
195
 
196
+ - Projects were selected based on the availability of Java source code and documentation on how to fix the error
197
+ - Buggy and fixed code versions using git diff and commit history
198
+ - Associated advisory information from GitHub Security Advisories and NVD
199
+ - Class and method boundaries using AST analysis
200
+ - Patch validation was performed via manual review and automated testing where possible.
201
+
202
  [More Information Needed]
203
 
204
  #### Who are the source data producers?
205
 
206
  <!-- This section describes the people or systems who originally created the data. It should also include self-reported demographic or identity information for the source data creators if this information is available. -->
207
 
 
 
208
  ### Annotations [optional]
209
 
210
  <!-- If the dataset contains annotations which are not part of the initial data collection, use this section to describe them. -->
 
231
 
232
  <!-- This section is meant to convey both technical and sociotechnical limitations. -->
233
 
234
+ - Biased toward Java: Only Java-based CVEs are included; generalization to other languages (e.g., C/C++, Python) should be done with caution.
235
+ - Limited in CWE scope: Covers only 4 CWEs — CWE-022, CWE-078, CWE-079, CWE-094.
236
+ - Biased toward open-source: Enterprise and closed-source vulnerabilities are excluded, limiting the scope of evaluation.
237
+ - Manually vetted, which introduces potential human error or subjective judgment in what counts as the “core fix.”
238
 
239
  ### Recommendations
240
 
 
271
 
272
  <!-- If relevant, include terms and calculations in this section that can help readers understand the dataset or dataset card. -->
273
 
274
+ - CVE (Common Vulnerabilities and Exposures): A unique identifier for a known security vulnerability.
275
+ - CWE (Common Weakness Enumeration): A formalized taxonomy of software vulnerability types.
276
+ - CVSS (Common Vulnerability Scoring System): A standard for assessing the severity of security vulnerabilities.
277
+ - Static Analysis: Code analysis technique that examines source code without executing it.
278
+ - Patch: A set of changes to a program designed to fix a known issue or vulnerability
279
 
280
  ## More Information [optional]
281
 
282
  [More Information Needed]
283
 
284
+ ## Dataset Card Authors
285
 
286
+ - Ziyang Li (University of Pennsylvania)
287
+ - Saikat Dutta (University of Pennsylvania)
288
+ - Mayur Naik (University of Pennsylvania)
289
+ - Claire Wang (University of Pennsylvania)
290
+ - Kevin Xue (University of Pennsylvania)
291
+ - Amartya Das
292
 
293
  ## Dataset Card Contact
294