Threat modeling a mobile application