Techniques for identifying mobile platform vulnerabilities and detecting policy-violating applications