Published in Hakin9 Extra Magazine."In this article we’ll discuss about steps involved in performing security assessment of an Android based application. We will see use of various tools and methodologies. There are various other methods and tools but steps are very common in nature..."
It can be downloaded here.