How to read crash dump of Android

by koba » Sat, 14 May 2011 21:35:17 GMT

Sponsored Links
 Hi, I wrote about crash dump in my blog.

objdump -S is useful to see source code from object.

"How to read crash dump of Android" 

crash dump is generated by debuggerd.

"debuggerd of Android" 


Other Threads

1. Password Security / Encryption / Decompile?

I am developing an app that uploads files to an FTP server, and the
app will have the ftp user name / password in the code. I'm
investigating making the FTP user name and password as secure as
possible (including an encrypted value for each in a strings.xml and
decrypting in the app when it needs to connect to the FTP server).

My concern is this is not actually secure at all, it seems someone
could unzip the .apk, decompile it, view the strings.xml and java code
that decrypts it - and thereby obtain the ftp login info.

So my question is.. am I approaching this wrong way? Is there a
standard method of ensuring passwords that are hard coded into an app
can be secure? (note - in this case this is not a password a user of
the app would enter, the FTP password is universal to all that install
it so it is included in the app).

Apologies if this is a noob question but I don't know my way around
this whole decompiling / hacking android apps thing. Any input would
be greatly appreciated!


2. Headset Detection


i hope somebody can help me. i have developed a service to detect a
connected headset at the mobile using following constant

The definition of this constant defines two extra values which will be
available in the resulting intent.

Now, the question:

What does the extra value "name" describes?
Is this the product name of the connected headset?

When i connect the htc headset or adapter this extra value contains
the string "Headset" and i'm not smarter than before.

It would be great when someone can help me!


3. TimeStamp to record Start and Stop times!

4. Capturing HEADSET_PLUG (android.intent.action.HEADSET_PLUG)

5. ProgressDialog question

6. Galley of thumbnails from the web running out of memory

7. executing a shell script from Android application