Thus, issues like state of the art attacks that
might be performed by sophisticated attackers
(Seriot, 2010; Lineberry et al., 2010) and the relation
between malware attacks on smartphones and desktop computing devices are out of the scope of this
paper