spore-protocols / README.md
dassarthak18's picture
Update README.md
0aa6f90 verified
---
license: mit
task_categories:
- text-generation
- question-answering
- text-classification
language:
- en
tags:
- cryptography
- security
- cybersecurity
- security-protocols
- protocol-verification
- formal-methods
- spore
- clark-jacob-library
- avispa-library
- avantssar-library
pretty_name: Security Protocols Open Repository (SPORE)
size_categories:
- n<1K
configs:
- config_name: instruction
data_files:
- split: train
path: "instruction.jsonl"
- config_name: conversation
data_files:
- split: train
path: "conversation.jsonl"
---
# Security Protocols Open Repository (SPORE) Dataset
This dataset contains security protocol specifications formatted for training large language models to understand and reason about cryptographic protocols.
## Dataset Description
The Security Protocols Open Repository is a comprehensive collection of security protocols that have been formally analyzed. Each protocol specification includes:
- Principal declarations (participants in the protocol)
- Cryptographic primitives (keys, nonces, timestamps, etc.)
- Message exchange sequences with cryptographic operations
- Clear notation for encryption, signing, and other security operations
## UPDATE
- **Oct-23-2025:** This dataset now includes additional protocols from the Clark-Jacob Library, the AVISPA Library and the AVANTSSAR Library not originally available in the SPORE dataset.
### Dataset Structure
The dataset is available in two flavours: *instruction* and *conversation*.
Each entry in the instruction dataset has the schema:
```json
{"text": "<Protocol Name>\n\n<Protocol Specifications>"}
```
Each entry in the conversation dataset has the schema:
```json
{
"messages": [
{"role": "system", "content": "You are an expert in formal verification of security protocols."},
{"role": "user", "content": "Analyze the following protocol:\n\n<Protocol Name>\n\n<Protocol Specifications>"},
{"role": "assistant", "content": ""}
]
}
```
The protocol specifications use a standard notation:
- `A, B, S`: Principals (participants)
- `Na, Nb`: Nonces (random values)
- `Ka, Kb`: Cryptographic keys
- `{M}K`: Message M encrypted with key K
- `A -> B`: Message flow from A to B
## Use Cases
This dataset is designed for:
1. **Protocol Understanding**: Training LLMs to parse and comprehend security protocol specifications
2. **Protocol Analysis**: Learning to identify participants, message flows, and cryptographic operations
3. **Security Research**: Understanding historical protocols and their vulnerabilities
4. **Formal Methods**: Learning formal notation for security protocols
## Dataset Creation
### Source Data
All protocols are sourced from:
- The [Security Protocols Open REpository (SPORE)](http://www.lsv.ens-cachan.fr/spore), maintained by the Laboratoire Spécification et Vérification (LSV) at ENS Paris-Saclay.
- The [Clark-Jacob Library with specifications in MSR 2.0](https://www.cs.cmu.edu/~iliano/projects/MSR/cjl/index.shtml), maintained by Carnegie Mellon University Qatar.
- The [Automated Validation of Internet Security Protocols and Applications (AVISPA) Library](https://web.archive.org/web/20160606114053fw_/http://www.avispa-project.org/library/avispa-library.html#IETF), funded under the EU Framework Programme 7 (FP7), now discontinued.
- The [Automated VAlidatioN of Trust and Security of Service-oriented ARchitectures (AVANTSSAR) Library](https://web.archive.org/web/20170603130116/http://www.avantssar.eu/), funded under the EU Framework Programme 7 (FP7), now discontinued.
### Data Processing
The original protocol specifications have been:
- Cleaned of formatting artifacts
- Stripped of comments and metadata
- Standardized to a consistent text format
- Sorted in alphabetical order of the protocol names
- Converted to JSONL for easy loading
## Training Example
```python
from datasets import load_dataset
dataset = load_dataset("dassarthak18/spore-protocols", "instruction")
training_args = TrainingArguments(
# your args
)
trainer = SFTTrainer(
model=model,
args=training_args,
train_dataset=dataset['train'],
dataset_text_field="text",
)
```
## Dataset Statistics
- **Total Protocols**: 49 protocols from SPORE + 18 protocols from Clark-Jacob library + 16 protocols from AVISPA library + 6 protocols from AVANTSSAR library
- **Protocol Families**: Includes variations, fixes, and modified versions of classic protocols
- **Average Length**: Varies from simple 3-message protocols to complex multi-party protocols
- **Language**: Formal protocol specification language
## Limitations
- The dataset is relatively small (89 protocols)
- Protocols are represented in a specific formal notation
- Does not include natural language descriptions or security proofs
## Citation
```bibtex
@misc{spore,
title = {Security Protocols Open Repository},
author = {{LSV - ENS Paris-Saclay}},
howpublished = {\url{https://lsv.ens-paris-saclay.fr/Software/spore/}},
note = {Laboratoire Spécification et Vérification, ENS Paris-Saclay, France}
}
@techreport{wrro72494,
note = {Query date: 14/01/2011},
year = {1997},
title = {A survey of authentication protocol literature: Version 1.0},
type = {Report},
institution = {ARRAY(0x557103a11320)},
publisher = {Citeseer},
keywords = {Authentication. ,Security Protocols},
url = {https://eprints.whiterose.ac.uk/id/eprint/72494/},
author = {Clark, John Andrew and Jacob, Jeremy Lawrence}
}
@inproceedings{Armando2005AVISPA,
author = {Armando, Alessandro and Basin, David and Boichut, Yohan and
Chevalier, Yannick and Compagna, Luca and Cuellar, Juan and
Hankes Drielsma, Peter and He{\'a}m, P.~C. and Kouchnarenko, O. and
Mantovani, J. and M{\"o}dersheim, Sebastian and von Oheimb, D. and
Rusinowitch, Michael and Santiago, J. and Turuani, M. and
Vigan\`o, Luca and Vigneron, L.},
title = {The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications},
booktitle = {Proceedings of Computer Aided Verification (CAV)},
series = {Lecture Notes in Computer Science},
volume = {3576},
pages = {281--285},
year = {2005},
publisher = {Springer},
doi = {10.1007/11513988\_27}
}
@inproceedings{AVANTSSAR2012,
author = {Armando, Alessandro and Carbone, Roberto and Compagna, Luca and
Cuellar, Jorge and Pellegrino, Giancarlo and Sorniotti, Alessandro},
title = {From Multiple Credentials to Browser-Based Single Sign-On: Are We More Secure?},
booktitle = {Proceedings of the IFIP TC 11 27th International Information Security Conference (SEC)},
series = {IFIP Advances in Information and Communication Technology},
volume = {376},
pages = {68--79},
year = {2012},
publisher = {Springer},
doi = {10.1007/978-3-642-30436-1\_6}
}
```