AI security threat model:
A comprehensive approach
From threat model to mitigation plan: How to secure AI inside mobile apps
AI is now inside the app—not just behind it. As organizations embed AI directly into mobile experiences, the number and complexity of threats have exploded.
This new paper by Dr. Anton Tkachenko introduces a complete AI security framework for identifying, categorizing, and prioritizing risks across device, model, application, and agent levels. It also shows how Promon’s protection layers map to these threats to defend against real-world AI attacks.
What you'll learn
- The 49 key AI threats targeting on-device and embedded models
- How to classify and prioritize AI risks across your app ecosystem
- Practical defense strategies based on OWASP, MITRE, and NIST frameworks
- How Promon’s Shield, Data Protect, and Code Protect mitigate the most critical AI threats
Want to request an AI security assessment?
Meet with a Promon expert to understand and strengthen your on-device AI security posture.
As AI moves onto the device, new attack surfaces emerge, from model theft to runtime tampering. Our experts help you pinpoint risks and strengthen protection where it matters most.
Stay updated on the latest news on
application security
-
Malware and the threat landscapeCoretax RAT malware: A rising threat to banking security in Southeast Asia
Discover the rising threat of Coretax RAT malware in Indonesia's banking sector, how it works, and what defense is possible against this emerging cyber risk.11 May 2026
Eric Iswara
-
Malware and the threat landscapePlayPraetor malware: Why banking apps need protection from the inside out
PlayPraetor abuses legitimate Android features to steal credentials, hijack sessions, and support on-device fraud. It's another reason why banks need runtime protection embedded inside the app itself.6 May 2026
Caner Kaya
-
Security researchAI-assisted vulnerability research still requires responsible disclosure
AI can help security researchers move faster, but evidence still matters. Credible vulnerability claims must be handled in a way that protects users.4 May 2026
Benjamin Adolphi
-
AI & the future of cybersecurity
The future of on-device GenAI: Why mobile app security must protect at runtime
On-device GenAI changes what runs locally and what attackers can reach. If the intelligence lives in the app, protection has to hold at runtime.23 Apr 2026
Sarah Sanders
-
Gain app threat intelligenceHow to make mobile attack telemetry useful for fraud, security operations, and audit teams
What does strong, mature mobile telemetry look like today? What telemetry data is the most valuable for mobile app security? Is there a practical operating model for mobile attack telemetry, with common execution failures to avoid?16 Apr 2026
Volker Gerstenberger
-
Mobile app security
Behind the shield: A guided approach to protecting mobile apps and SDKs
App shielding is the baseline for mobile app security. But can black-box shielding slow teams down? Does post-compile protection still matter? And is protecting an app and an SDK the same? Find clarity and guidance here.9 Apr 2026
Byron McNaught
-
Mobile app security
Red flags: How dating apps ignore security until revenue waves goodbye
Trace the fragile economics and untracked revenue killers of the dating app industry. Investigate how mobile malware and device compromise are creating a industry-wide security crisis. Learn how runtime protection is revenue protection for dating apps.30 Mar 2026
Byron McNaught
-
AI & the future of cybersecurity
App Threat Report 2026 Q1: The State of Code Obfuscation Against AI
Discover what happened when Promon's security team tested leading AI models against OLLVM obfuscation. Where did mobile app code protection hold up and where did it fall short? What are the key takeaways and recommendations for security and product teams?26 Mar 2026
Dr. Anton Tkachenko
Blogs
Keep up with the latest developments in iOS and Android security, code obfuscation, compliance, API protection, and more.
View all