The document discusses attacking proprietary Android vendor customizations through fuzz testing and fault injection testing. It presents Chizpurfle, a gray-box Android fuzzer designed to generate invalid inputs to identify vulnerabilities in vendor customization code without access to source code. Chizpurfle leverages dynamic instrumentation to trace code coverage on actual devices during fuzzing. It detected two bugs from fuzzing Samsung services. The document also discusses a fault injection testing tool that injects faults into Android components to evaluate failure propagation and mitigation. The tool found vendors have varying success in handling faults across components.