Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Background              
        6.1     Overview of security considerations   
        6.2     The evolution of botnet threats on smartphones         
        6.3     Protection for smartphones  
 7     Characteristics of smartphone-based botnets           
        7.1     Personally identifiable information on bots     
        7.2     Various means of propagation              
        7.3     Openness      
        7.4     Targeted infection     
        7.5     Concealment
        7.6     Commercial interests
        7.7     Ever-changing network connections  
 8     Security threats      
        8.1     Personally identifiable information disclosure
        8.2     Malicious fee deductions        
        8.3     Rogue behaviours      
        8.4     Performance consumption    
        8.5     Malicious transmission             
        8.6     Loss of credibility        
 9     Security capability requirements    
        9.1     Network security capability requirements       
        9.2     Smartphones security capability requirements              
Appendix I – Malware connecting to botnet    
        I.1     Foreword        
        I.2     Background    
        I.3     Macroscopic environment in China      
        I.4     iPhone problems         
        I.5     Examples and some trends of new malware     
        I.6     Conclusion      
Bibliography