This talk will describe how mobile application impersonation attacks work today and mitigations to protect your mobile applications from such threats. Anand Biligiri, George Fletcher