This repository implements the methodology described in the research paper "Decompiling Smart Contracts with a Large Language Model" (arXiv:2506.19624v1) for fine-tuning Llama 3.2 3B to convert EVM ...
Abstract: The security of software builds has attracted increased attention in recent years in response to incidents like solarwinds and xz. Now, several companies including Oracle and Google rebuild ...
Usage: dex-translator [-hV] [COMMAND] See the sub-commands for available operations -h, --help Show this help message and exit. -V, --version Print version information and exit. Commands: d2j Convert ...
Abstract: Existing Android malware detection methods are usually hard to simultaneously resist various obfuscation techniques. Therefore, bytecode-based code obfuscation becomes an effective means to ...