This document summarizes a presentation about exploiting Android's Binder inter-process communication (IPC) mechanism to conduct malware attacks. It describes how Binder works and how malware authors have increasingly targeted it. Three demonstration attacks are shown: a keylogger that intercepts keyboard inputs via Binder, grabbing sensitive form data that transits between app activities via Binder, and intercepting SMS messages by intercepting Binder calls made by the SMS app to retrieve messages from the telephony manager. The document advocates encrypting sensitive data moving between apps via Binder to help prevent these kinds of attacks.