Back to: Automated Mobile Application Security Assessment – MAS > Conclusion