This document provides an overview of Android application sandboxes and how they can be used for suspicious software detection. It discusses how Android uses a modified Linux kernel to run Java-based apps in an isolated environment. The document describes how an Android application sandbox called AASandbox works by hijacking system calls using a loadable kernel module and then performing both static analysis of app files and dynamic analysis by running apps in an Android emulator and monitoring system calls. It provides examples of analyzing self-written apps and experiments using over 150 popular apps from the Android Market.