This document provides an overview and agenda for securing Android applications. It discusses working with the Android SDK and emulator, setting up the vulnerable GoatDroid application, analyzing application memory and traffic, reverse engineering Android apps, and analyzing SQLite databases. It also demonstrates analyzing the GoatDroid and ExploitMe applications using tools like Burp Suite, SQLite Browser, and Agnitio. The document contains information on Android architecture, developing for Android, common vulnerabilities, and techniques for auditing Android security.
Related topics: