Table of Contents - X.1130 (12/2025) - Technical guidelines for detecting malicious activities of mobile applications
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 7 Characteristics and risks of malicious APPs 7.1 Characteristics of malicious APPs 7.2 Risks of malicious APPs 8 Technical framework for detection of malicious activities of malicious APPs 8.1 Reference architecture 8.2 Detection components 8.3 Workflows 9 Technical capabilities for detection of malicious activities of malicious APPs 9.1 Feature extraction and detection capability 9.2 Interaction capability 9.3 Secure environment capability Bibliography
|