Table of Contents - X.1129 (12/2025) - Security guidelines for mobile terminal integrity protection
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Introduction 7 Security threats to mobile terminal integrity 7.1 Security threats to mobile terminal integrity during boot phase 7.2 Security threats to mobile terminal integrity during runtime phase 7.3 Security threats to mobile terminal integrity during firmware/software update phase 8 Security requirements for mobile terminal integrity protection 8.1 Security requirements for mobile terminal integrity protection at boot time 8.2 Security requirements for mobile terminal integrity protection at runtime 8.3 Security requirements for mobile terminal integrity protection during update 9 Security guidelines for mobile terminal integrity protection 9.1 Security guidelines for mobile terminal integrity protection at boot time 9.2 Security guidelines for mobile terminal integrity protection at runtime 9.3 Security guidelines for mobile terminal integrity protection during update Bibliography
|