The document discusses security analysis techniques for mobile operating systems. It covers how smartphones differ from traditional computing in their usage model and risk profile. It also discusses rethinking host security for smartphones by defining permissions that applications can access and focusing on what permissions applications ask for and how they use those permissions. The document uses Kirin, a modified Android application installer, as an example to evaluate application policies and permissions at install time to determine if they pose security risks.