Open exhumea opened 2 weeks ago
By default, obfuscated flutter app is stripped. So, the Dart functions information in dwarf is removed.
To recover all functions, I plan to do linear sweep disassembling and function call analysis. I still have no time to do it.
From what I get,
blutter
is failing at recovering most of ASM instructions when AOT snapshot is compiled withdwarf-stack-traces
mode (in particular, as soon as flutter app is built with--obfuscate
flag), sinceCodeSourceMap
objects are no longer present in snapshot.Do you have any plan to also support this case in
blutter
, or any ideas on how we could handle this case as well?