- Android Exploits & Attacks
- Android Permissions & Privileges
- Android Webviews & Javascript Interfaces
- Android Reverse Engineering & Obfuscation
- Android Bluetooth Security
- Payment Systems & ATMs
- Dirty Stream Attack, Turning Android Share Targets Into Attack Vectors
- Black Hat Asia 2023 by Dimitrios Valsamaras
- TiYunZong Exploit Chain to Remotely Root Modern Android Devices
- Black Hat USA 2020 by Guang Gong
- Android Parcels: The Bad, the Good and the Better
- Black Hat Europe 2022 by Hao Ke, Bernardo Rufino, Maria Uretsky, Yang Yang
- Simple Spyware: Android's Invisible Foreground Services
- Black Hat Europe 2019 by Thomas Sutter and Bernhard Tellenbach
- Android Universal Root: Exploiting Mobile GPU / Command Queue Drivers
- Black Hat USA 2022 by Jon Bottarini, Xingyu Jin, Richard Neal
- Elevating The TrustZone To Achieve A Powerful Android Kernel Exploit
- Nullcon Goa 2022 by Tamir Zahavi
- Monitoring Surveillance Vendors: In-the-Wild Android Full Chains in 2021
- Black Hat USA 2022 by Xingyu Jin, Richard Neal, Christian Resell, Clement Lecigne
- Revisiting Stealthy Sensitive Information Collection from Android Apps
- Black Hat Asia 2023 by Guangdong Bai, Guangshuai Xia, Qing Zhang
- Start Arbitrary Activity App Components as System User: Vulnerability Affecting Samsung Android Devices
- Black Hat Asia 2022 by Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou
- ExplosION: The Hidden Mines in the Android ION Driver
- Black Hat Asia 2022 by Le Wu, Xuen Li, Tim Xia
- (UN)protected Broadcasts in Android 9 & 10
- Black Hat Asia 2021 by Ryan Johnson
- Bypassing Android Permissions From All Protection Levels
- DEF CON 30 by Nikita Kurtin
- The Tangled Webview - Javascriptinterface Once More
- Black Hat Asia 2021 by Ce Qin
- Using Android WebViews to Steal All the Files
- Shmoocon 2020 by Jesson Soto Ventura
- Securing the System: Reversing Android Pre-Installed Apps
- Black Hat USA 2019 by Maddie Stone
- Beyond Java: Obfuscating Android Apps with Native Code
- TROOPERS23 by Laurie Kirk
- Runtime Riddles: Manipulation Points in the Android Source
- DEF CON 31 by Laurie Kirk
- Unmasking the Godfather - Reverse Engineering the Latest Android Banking Trojan
- Strange Loop Conference by Laurie Kirk
- Deep into Android Bluetooth Bug Hunting: New Attack Surfaces & Code Patterns
- Black Hat Europe 2022 by Zinuo Han
- Stealthily Access Android Phones: Bypass the Bluetooth Authentication
- Black Hat USA 2020 by Sourcell Xu and Xin Xin
- Contactless Overflow Code Execution in Payment Terminals & ATMs
- DEF CON 31 by Josep Rodriguez
- Turning my virtual wallet into a skimming device
- DEF CON 31 by Borgogno, Barrionuevo