Adversary Models for Mobile Device Authentication