1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Background
6.1 Overview of security considerations
6.2 The evolution of botnet threats on smartphones
6.3 Protection for smartphones
7 Characteristics of smartphone-based botnets
7.1 Personally identifiable information on bots
7.2 Various means of propagation
7.3 Openness
7.4 Targeted infection
7.5 Concealment
7.6 Commercial interests
7.7 Ever-changing network connections
8 Security threats
8.1 Personally identifiable information disclosure
8.2 Malicious fee deductions
8.3 Rogue behaviours
8.4 Performance consumption
8.5 Malicious transmission
8.6 Loss of credibility
9 Security capability requirements
9.1 Network security capability requirements
9.2 Smartphones security capability requirements
Appendix I – Malware connecting to botnet
I.1 Foreword
I.2 Background
I.3 Macroscopic environment in China
I.4 iPhone problems
I.5 Examples and some trends of new malware
I.6 Conclusion
Bibliography