Bug 352928 - Debugging in reverse (reverse engineering)
Summary: Debugging in reverse (reverse engineering)
Status: NEW
Alias: None
Product: JDT
Classification: Eclipse Project
Component: Debug (show other bugs)
Version: 3.7   Edit
Hardware: PC Windows XP
: P3 enhancement (vote)
Target Milestone: ---   Edit
Assignee: JDT-Debug-Inbox CLA
QA Contact:
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2011-07-23 07:02 EDT by Jonathan Camilleri CLA
Modified: 2011-07-24 01:37 EDT (History)
0 users

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jonathan Camilleri CLA 2011-07-23 07:02:38 EDT
Build Identifier:  M20110210-1200

It would be nice if when debugging code, it was possible to include the calling method by way of having a reverse function of the step functions (e.g. step through, step into, step out, run code), that provides for reverse engineering of code.

This is particularly useful to security analysts, and, support developers who are studying code which might be legacy code that was developed in a non readable manner, or perhaps by a malicious coder of a virus/worm/malware who intentionally obfuscates readability of code.

Donations are accepted if you think that this idea would be helpful :)

Reproducible: Sometimes
Comment 1 Jonathan Camilleri CLA 2011-07-24 01:37:42 EDT
The following research paper might be useful to providing insights into designing a design navigator: http://essex.academia.edu/JonNicholson/Papers/587502/The_Design_Navigator_Charting_Java_Programs.