Current mobile security techniques have evolved from a desktop-centric approach. These techniques have already fallen short in handling today’s mobile malware. Compared to traditional computers, it is harder to regulate functionality on mobile devices. To exacerbate the problem, mobile devices support more complex interfaces (e.g., cellular, Wi-Fi, Bluetooth, GPS, etc.) exposing more surfaces to attack. Greater visibility into the device’s behavior and interaction with the environment is needed to prevent, identify, and remediate mobility threats.