The presentation covered Android architecture, security model, and ways attackers can exploit Android devices. It discussed how Android is based on the Linux kernel and uses the Dalvik VM. The presentation demonstrated how to build an Android malware through reverse engineering apps and developing malicious apps from scratch. Various real-world Android malware were also described.