This session is structured to highlight mobile payment infrastructures, mobile payment services, mobile payment provisioning, mobile payment architectures, and mobile payment security threats.There will be a live demo of how an attacker can use a combination of different tools like an emulator, decompiler, bytecode instrumentation, dependency analyzer, and structured analysis to digitally invade a mobile platform if there are inherent vulnerabilities.