Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere        
        3.2     Terms defined in this Supplement       
 4     Abbreviations and acronyms             
 5     Conventions             
 6     Introduction             
 7     Security threats on countering spam in mobile phones         
 8     Guidance to assist in countering spam for mobile phone developers              
        8.1     Countering spam in mobile phones by binary obfuscation         
        8.2     Countering spam in mobile phones by integrity checking           
        8.3     Guidance to assist in countering spam for mobile phone developers   
Bibliography