Techniques for Analysis of Mobile Malware