Return to Article Details Gaming Mobile Applications: Proof of Concept for Security Exploitation Download Download PDF