|
|
--- |
|
|
license: mit |
|
|
task_categories: |
|
|
- text-generation |
|
|
- question-answering |
|
|
- text-classification |
|
|
language: |
|
|
- en |
|
|
tags: |
|
|
- cryptography |
|
|
- security |
|
|
- cybersecurity |
|
|
- security-protocols |
|
|
- protocol-verification |
|
|
- formal-methods |
|
|
- spore |
|
|
- clark-jacob-library |
|
|
- avispa-library |
|
|
- avantssar-library |
|
|
pretty_name: Security Protocols Open Repository (SPORE) |
|
|
size_categories: |
|
|
- n<1K |
|
|
configs: |
|
|
- config_name: instruction |
|
|
data_files: |
|
|
- split: train |
|
|
path: "instruction.jsonl" |
|
|
- config_name: conversation |
|
|
data_files: |
|
|
- split: train |
|
|
path: "conversation.jsonl" |
|
|
--- |
|
|
|
|
|
# Security Protocols Open Repository (SPORE) Dataset |
|
|
|
|
|
This dataset contains security protocol specifications formatted for training large language models to understand and reason about cryptographic protocols. |
|
|
|
|
|
## Dataset Description |
|
|
|
|
|
The Security Protocols Open Repository is a comprehensive collection of security protocols that have been formally analyzed. Each protocol specification includes: |
|
|
|
|
|
- Principal declarations (participants in the protocol) |
|
|
- Cryptographic primitives (keys, nonces, timestamps, etc.) |
|
|
- Message exchange sequences with cryptographic operations |
|
|
- Clear notation for encryption, signing, and other security operations |
|
|
|
|
|
## UPDATE |
|
|
|
|
|
- **Oct-23-2025:** This dataset now includes additional protocols from the Clark-Jacob Library, the AVISPA Library and the AVANTSSAR Library not originally available in the SPORE dataset. |
|
|
|
|
|
### Dataset Structure |
|
|
|
|
|
The dataset is available in two flavours: *instruction* and *conversation*. |
|
|
|
|
|
Each entry in the instruction dataset has the schema: |
|
|
|
|
|
```json |
|
|
{"text": "<Protocol Name>\n\n<Protocol Specifications>"} |
|
|
``` |
|
|
|
|
|
Each entry in the conversation dataset has the schema: |
|
|
|
|
|
```json |
|
|
{ |
|
|
"messages": [ |
|
|
{"role": "system", "content": "You are an expert in formal verification of security protocols."}, |
|
|
{"role": "user", "content": "Analyze the following protocol:\n\n<Protocol Name>\n\n<Protocol Specifications>"}, |
|
|
{"role": "assistant", "content": ""} |
|
|
] |
|
|
} |
|
|
``` |
|
|
|
|
|
The protocol specifications use a standard notation: |
|
|
- `A, B, S`: Principals (participants) |
|
|
- `Na, Nb`: Nonces (random values) |
|
|
- `Ka, Kb`: Cryptographic keys |
|
|
- `{M}K`: Message M encrypted with key K |
|
|
- `A -> B`: Message flow from A to B |
|
|
|
|
|
## Use Cases |
|
|
|
|
|
This dataset is designed for: |
|
|
|
|
|
1. **Protocol Understanding**: Training LLMs to parse and comprehend security protocol specifications |
|
|
2. **Protocol Analysis**: Learning to identify participants, message flows, and cryptographic operations |
|
|
3. **Security Research**: Understanding historical protocols and their vulnerabilities |
|
|
4. **Formal Methods**: Learning formal notation for security protocols |
|
|
|
|
|
## Dataset Creation |
|
|
|
|
|
### Source Data |
|
|
|
|
|
All protocols are sourced from: |
|
|
- The [Security Protocols Open REpository (SPORE)](http://www.lsv.ens-cachan.fr/spore), maintained by the Laboratoire Spécification et Vérification (LSV) at ENS Paris-Saclay. |
|
|
- The [Clark-Jacob Library with specifications in MSR 2.0](https://www.cs.cmu.edu/~iliano/projects/MSR/cjl/index.shtml), maintained by Carnegie Mellon University Qatar. |
|
|
- The [Automated Validation of Internet Security Protocols and Applications (AVISPA) Library](https://web.archive.org/web/20160606114053fw_/http://www.avispa-project.org/library/avispa-library.html#IETF), funded under the EU Framework Programme 7 (FP7), now discontinued. |
|
|
- The [Automated VAlidatioN of Trust and Security of Service-oriented ARchitectures (AVANTSSAR) Library](https://web.archive.org/web/20170603130116/http://www.avantssar.eu/), funded under the EU Framework Programme 7 (FP7), now discontinued. |
|
|
|
|
|
### Data Processing |
|
|
|
|
|
The original protocol specifications have been: |
|
|
- Cleaned of formatting artifacts |
|
|
- Stripped of comments and metadata |
|
|
- Standardized to a consistent text format |
|
|
- Sorted in alphabetical order of the protocol names |
|
|
- Converted to JSONL for easy loading |
|
|
|
|
|
## Training Example |
|
|
|
|
|
```python |
|
|
from datasets import load_dataset |
|
|
|
|
|
dataset = load_dataset("dassarthak18/spore-protocols", "instruction") |
|
|
|
|
|
training_args = TrainingArguments( |
|
|
# your args |
|
|
) |
|
|
|
|
|
trainer = SFTTrainer( |
|
|
model=model, |
|
|
args=training_args, |
|
|
train_dataset=dataset['train'], |
|
|
dataset_text_field="text", |
|
|
) |
|
|
``` |
|
|
|
|
|
## Dataset Statistics |
|
|
|
|
|
- **Total Protocols**: 49 protocols from SPORE + 18 protocols from Clark-Jacob library + 16 protocols from AVISPA library + 6 protocols from AVANTSSAR library |
|
|
- **Protocol Families**: Includes variations, fixes, and modified versions of classic protocols |
|
|
- **Average Length**: Varies from simple 3-message protocols to complex multi-party protocols |
|
|
- **Language**: Formal protocol specification language |
|
|
|
|
|
## Limitations |
|
|
|
|
|
- The dataset is relatively small (89 protocols) |
|
|
- Protocols are represented in a specific formal notation |
|
|
- Does not include natural language descriptions or security proofs |
|
|
|
|
|
## Citation |
|
|
|
|
|
```bibtex |
|
|
@misc{spore, |
|
|
title = {Security Protocols Open Repository}, |
|
|
author = {{LSV - ENS Paris-Saclay}}, |
|
|
howpublished = {\url{https://lsv.ens-paris-saclay.fr/Software/spore/}}, |
|
|
note = {Laboratoire Spécification et Vérification, ENS Paris-Saclay, France} |
|
|
} |
|
|
|
|
|
@techreport{wrro72494, |
|
|
note = {Query date: 14/01/2011}, |
|
|
year = {1997}, |
|
|
title = {A survey of authentication protocol literature: Version 1.0}, |
|
|
type = {Report}, |
|
|
institution = {ARRAY(0x557103a11320)}, |
|
|
publisher = {Citeseer}, |
|
|
keywords = {Authentication. ,Security Protocols}, |
|
|
url = {https://eprints.whiterose.ac.uk/id/eprint/72494/}, |
|
|
author = {Clark, John Andrew and Jacob, Jeremy Lawrence} |
|
|
} |
|
|
|
|
|
@inproceedings{Armando2005AVISPA, |
|
|
author = {Armando, Alessandro and Basin, David and Boichut, Yohan and |
|
|
Chevalier, Yannick and Compagna, Luca and Cuellar, Juan and |
|
|
Hankes Drielsma, Peter and He{\'a}m, P.~C. and Kouchnarenko, O. and |
|
|
Mantovani, J. and M{\"o}dersheim, Sebastian and von Oheimb, D. and |
|
|
Rusinowitch, Michael and Santiago, J. and Turuani, M. and |
|
|
Vigan\`o, Luca and Vigneron, L.}, |
|
|
title = {The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications}, |
|
|
booktitle = {Proceedings of Computer Aided Verification (CAV)}, |
|
|
series = {Lecture Notes in Computer Science}, |
|
|
volume = {3576}, |
|
|
pages = {281--285}, |
|
|
year = {2005}, |
|
|
publisher = {Springer}, |
|
|
doi = {10.1007/11513988\_27} |
|
|
} |
|
|
|
|
|
@inproceedings{AVANTSSAR2012, |
|
|
author = {Armando, Alessandro and Carbone, Roberto and Compagna, Luca and |
|
|
Cuellar, Jorge and Pellegrino, Giancarlo and Sorniotti, Alessandro}, |
|
|
title = {From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?}, |
|
|
booktitle = {Proceedings of the IFIP TC 11 27th International Information Security Conference (SEC)}, |
|
|
series = {IFIP Advances in Information and Communication Technology}, |
|
|
volume = {376}, |
|
|
pages = {68--79}, |
|
|
year = {2012}, |
|
|
publisher = {Springer}, |
|
|
doi = {10.1007/978-3-642-30436-1\_6} |
|
|
} |
|
|
``` |