Mobile Phone Threats and VulnerabilitiesExploits, Tools, and TechniquesGoogle Android Security ChallengesCriticism of AndroidAndroid Exploitation ToolsAndroid Security ArchitectureAndroid Application ArchitectureGoogle PlayApple iOS Security ChallengesApple iOS ExploitsApple iOS ArchitectureThe App StoreWindows Phone Security ChallengesWindows Phone OS ExploitsWindows Phone Security ArchitectureWindows Phone ArchitectureWindows StoreChapter SummaryKey Concepts and TermsChapter 11 Assessment