|
--- |
|
language: |
|
- en |
|
size_categories: |
|
- n<1K |
|
--- |
|
# Dataset Card for SecurityEval |
|
|
|
|
|
This dataset is from the paper titled **SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques**. |
|
The project is accepted for The first edition of the International Workshop on Mining Software Repositories Applications for Privacy and Security (MSR4P&S '22). |
|
The paper describes the dataset for evaluating machine learning-based code generation output and the application of the dataset to the code generation tools. |
|
|
|
|
|
|
|
## Dataset Details |
|
|
|
### Dataset Description |
|
|
|
|
|
- **Curated by:** Mohammed Latif Siddiq & Joanna C. S. Santos |
|
- **Language(s):** Python |
|
|
|
### Dataset Sources |
|
|
|
|
|
- **Repository:** https://github.com/s2e-lab/SecurityEval |
|
- **Paper:** |
|
"SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques". |
|
International Workshop on Mining Software Repositories Applications for Privacy and Security (MSR4P&S '22). |
|
https://s2e-lab.github.io/preprints/msr4ps22-preprint.pdf |
|
|
|
|
|
|
|
## Dataset Structure |
|
|
|
- dataset.jsonl: dataset file in jsonl format. Every line contains a JSON object with the following fields: |
|
- `ID`: unique identifier of the sample. |
|
- `Prompt`: Prompt for the code generation model. |
|
- `Insecure_code`: code of the vulnerability example that may be generated from the prompt. |
|
|
|
|
|
## Citation |
|
|
|
|
|
**BibTeX:** |
|
|
|
``` |
|
@inproceedings{siddiq2022seceval, |
|
author={Siddiq, Mohammed Latif and Santos, Joanna C. S. }, |
|
booktitle={Proceedings of the 1st International Workshop on Mining Software Repositories Applications for Privacy and Security (MSR4P&S22)}, |
|
title={SecurityEval Dataset: Mining Vulnerability Examples to Evaluate Machine Learning-Based Code Generation Techniques}, |
|
year={2022}, |
|
doi={10.1145/3549035.3561184} |
|
} |
|
``` |
|
|
|
**APA:** |
|
|
|
Siddiq, M. L., & Santos, J. C. (2022, November). SecurityEval dataset: mining vulnerability examples to evaluate machine learning-based code generation techniques. In Proceedings of the 1st International Workshop on Mining Software Repositories Applications for Privacy and Security (pp. 29-33). |