Table of Contents

 1     Scope          
 2     References 
 3     Definitions 
        3.1     Terms defined elsewhere           
        3.2     Terms defined in this Supplement           
 4     Abbreviations and acronyms
 5     Conventions             
 6     General aspects        
        6.1     Security background    
        6.2     Characteristics of smartphones 
        6.3     Smartphone assets        
        6.4     Security considerations              
 7     Threats to smartphones          
        7.1     Overview of threats      
        7.2     Vulnerabilities of smartphones 
        7.3     Attacks to smartphones              
 8     Security framework of smartphones   
        8.1     Security objectives       
        8.2     Security framework      
        8.3     Security considerations              
 9     Security solutions for smartphones    
        9.1     Overall aspects             
        9.2     System improvements  
        9.3     Security tools 
        9.4     Integration of security solutions              
Bibliography