"Fossies" - the Fresh Open Source Software Archive

Member "android-sdk-windows/tools/proguard/docs/manual/retrace/introduction.html" (14 Oct 2015, 2560 Bytes) of package /windows/misc/android-sdk_r24.4.1-windows.zip:

Caution: In this restricted "Fossies" environment the current HTML page may not be correctly presentated and may have some non-functional links. Alternatively you can here view or download the uninterpreted raw source code. A member file download can also be achieved by clicking within a package contents listing on the according byte size field.


ReTrace is a companion tool for ProGuard that 'de-obfuscates' stack traces.

When an obfuscated program throws an exception, the resulting stack trace typically isn't very informative. Class names and method names have been replaced by short meaningless strings. Source file names and line numbers are missing altogether. While this may be intentional, it can also be inconvenient when debugging problems.

Original code - ProGuard Obfuscated code
Mapping file
Readable stack trace ReTrace - Obfuscated stack trace

ReTrace can read an obfuscated stack trace and restore it to what it would look like without obfuscation. The restoration is based on the mapping file that ProGuard can write out during obfuscation. The mapping file links the original class names and class member names to their obfuscated names.

Copyright © 2002-2011 Eric Lafortune.