Enhancing Reverse Engineering: Investigating and Benchmarking Large Language Models for Vulnerability Analysis in Decompiled Binaries
This repository contains the DeBinVul dataset, source code, and experimental results of the paper Enhancing Reverse Engineering: Investigating and Benchmarking Large Language Models for Vulnerability Analysis in Decompiled Binaries.
The dataset is a compressed CSV file stored as DeBinVul.zip
. DeBinVul
has 12 columns:
source_code
: The complete source code function definition.comments
: Extracted comments from the function's source code.label
: The assigned CWE label (ornone
if benign).file
: The file containing the function.function
: The name of the function.decompiled_code
: Ghidra decompiled code of the function.compiler_options
: Compiler command used for compiling the function.stripped_decompiled_code
: Ghidra decompiled code with symbols stripped.description
: Description of the vulnerability (if applicable) and the function’s behavior.prompt
: The complete prompt given to the model for the task.instruction
: Specific instructions given to the model for the task.task
: The nature of the task, such as identification, classification, description, or function name recovery.
All code related to training, inference, and evaluation can be found in the src
subdirectory. The experimental results can be found under the Experimental_results
subdirectory. Miscellaneous scripts associated with the dataset are located in the scripts
directory.