Return to Article Details Threats, Attacks, and Mitigations of Smartphone Security Download Download PDF