This document presents an analysis of deception and countermeasures in the Android user interface. It discusses how malicious applications can use GUI confusion attacks to disguise themselves as other applications. It then analyzes such attacks using state exploration tools and proposes approaches for detecting malicious applications through static analysis. Finally, it discusses potential defensive mechanisms like establishing a trusted path for users to identify the actual application in use.