- Android Exploits & Attacks
- Android Permissions & Privileges
- Android Webviews & Javascript Interfaces
- Android Reverse Engineering & Obfuscation
- Android Bluetooth Security
- Payment Systems & ATMs
- Dirty Stream Attack, Turning Android Share Targets Into Attack Vectors
- Black Hat Asia 2023 by Dimitrios Valsamaras
- TiYunZong Exploit Chain to Remotely Root Modern Android Devices
- Black Hat USA 2020 by Guang Gong
- Android Parcels: The Bad, the Good and the Better
- Black Hat Europe 2022 by Hao Ke, Bernardo Rufino, Maria Uretsky, Yang Yang
- A Deep Dive into Privacy Dashboard of Top Android Vendors
- Black Hat Europe 2021 by Bin Ma, Xiangxing Qian, Wei Wen & Zhenyu Zhu
- Simple Spyware: Android's Invisible Foreground Services
- Black Hat Europe 2019 by Thomas Sutter and Bernhard Tellenbach
- Android Universal Root: Exploiting Mobile GPU / Command Queue Drivers
- Black Hat USA 2022 by Jon Bottarini, Xingyu Jin, Richard Neal
- Elevating The TrustZone To Achieve A Powerful Android Kernel Exploit
- Nullcon Goa 2022 by Tamir Zahavi
- SigMorph: Covert Communication Exploiting Android Signing Schemes
- Nullcon Goa 2023 by by Ayan Saha And Achute Sharma
- Attack on Titan M, Reloaded: Vulnerability Research on a Modern Security Chip
- Black Hat USA 2022 by: Damiano Melotti , Maxime Rossi Bellom
- Monitoring Surveillance Vendors: In-the-Wild Android Full Chains in 2021
- Black Hat USA 2022 by Xingyu Jin, Richard Neal, Christian Resell, Clement Lecigne
- Revisiting Stealthy Sensitive Information Collection from Android Apps
- Black Hat Asia 2023 by Guangdong Bai, Guangshuai Xia, Qing Zhang
- Start Arbitrary Activity App Components as System User: Vulnerability Affecting Samsung Android Devices
- Black Hat Asia 2022 by Ryan Johnson, Mohamed Elsabagh, Angelos Stavrou
- ExplosION: The Hidden Mines in the Android ION Driver
- Black Hat Asia 2022 by Le Wu, Xuen Li, Tim Xia
- (UN)protected Broadcasts in Android 9 & 10
- Black Hat Asia 2021 by Ryan Johnson
- BAD BINDER: Finding an Android in the Wild 0day
- OffensiveCon20 by Maddie Stone
- Physical Attacks Against Smartphones
- DEFCON 31 by Christopher Wade
- Still Vulnerable Out of the Box: Revisiting the Security of Prepaid Android Carrier Devices
- DEFCON 31 by Ryan Johnson
- Breaking The Impossible: Bypassing Android's Secure Hardware Backed Attestation
- BSides Basingstoke 2022 by Joseph Foote
- Re-route Your Intent for Privilege Escalation: A Universal Way to Exploit Android PendingIntents in High-profile and System Apps
- Black Hat Europe 2021 by En He
- Bypassing Android Permissions From All Protection Levels
- DEFCON 30 by Nikita Kurtin
- Hacking Android Foreground Services Escalation Of Privileges
- Nullcon Goa 2022 by Rony Das
- The Tangled Webview - Javascriptinterface Once More
- Black Hat Asia 2021 by Ce Qin
- Using Android WebViews to Steal All the Files
- Shmoocon 2020 by Jesson Soto Ventura
- Securing the System: Reversing Android Pre-Installed Apps
- Black Hat USA 2019 by Maddie Stone
- Beyond Java: Obfuscating Android Apps with Native Code
- TROOPERS23 by Laurie Kirk
- Runtime Riddles: Manipulation Points in the Android Source
- DEFCON 31 by Laurie Kirk
- Unmasking the Godfather - Reverse Engineering the Latest Android Banking Trojan
- Strange Loop Conference 2023 by Laurie Kirk
- ADBHoney: Low interaction honeypot designed for Android Debug Bridge
- Android Security Symposium 2020 by Gabriel Cirlig
- Deep into Android Bluetooth Bug Hunting: New Attack Surfaces & Code Patterns
- Black Hat Europe 2022 by Zinuo Han
- Stealthily Access Android Phones: Bypass the Bluetooth Authentication
- Black Hat USA 2020 by Sourcell Xu and Xin Xin
- Contactless Overflow Code Execution in Payment Terminals & ATMs
- DEFCON 31 by Josep Rodriguez
- Turning my virtual wallet into a skimming device
- DEFCON 31 by Borgogno, Barrionuevo
- How an android application can drain your wallet
- Bsides Lisbon 2022 by Dimitrios Valsamaras