Mobility and connectivity offered by smartphones and
tablets make them an essential part of our modern life.
Many types of attacks have compromised mobile devices
such as worms and viruses, posting malicious applications
to the application stores, obtaining sensitive information,
modifying data on a device, sending unwanted SMS
massages, gaining location information, etc.
According to Canalys [1, 2], the number