Peering Inside the Mobile Attack Surface