Dockerized Android is a Docker-based virtualization platform that lets cyber-range designers simulate mobile attack and defense scenarios efficiently. Its modular design allows features like Bluetooth and GPS emulation to be toggled via Docker Compose, enhancing automation and realism. While best run on Linux, the system promises future cloud support and stronger security integrations, paving the way for more dynamic and realistic cybersecurity training environments.Dockerized Android is a Docker-based virtualization platform that lets cyber-range designers simulate mobile attack and defense scenarios efficiently. Its modular design allows features like Bluetooth and GPS emulation to be toggled via Docker Compose, enhancing automation and realism. While best run on Linux, the system promises future cloud support and stronger security integrations, paving the way for more dynamic and realistic cybersecurity training environments.

Building Smarter Cyber Ranges with Dockerized Android

2025/10/17 05:15

:::info Authors:

(1) Daniele Capone, SecSI srl, Napoli, Italy (daniele.capone@secsi.io);

(2) Francesco Caturano, Dept. of Electrical Engineering and Information, Technology University of Napoli Federico II, Napoli, Italy (francesco.caturano@unina.i)

(3) Angelo Delicato, SecSI srl, Napoli, Italy (angelo.delicato@secsi.io);

(4) Gaetano Perrone, Dept. of Electrical Engineering and Information Technology, University of Napoli Federico II, Napoli, Italy (gaetano.perrone@unina.it)

(5) Simon Pietro Romano, Dept. of Electrical Engineering and Information Technology, University of Napoli Federico II, Napoli, Italy (spromano@unina.it).

:::

Abstract and I. Introduction

II. Related Work

III. Dockerized Android: Design

IV. Dockerized Android Architecture

V. Evaluation

VI. Conclusion and Future Developments, and References

VI. CONCLUSION AND FUTURE DEVELOPMENTS

In this work, we have described Dockerized Android, a platform that supports cyber-range designers in realizing mobile virtual scenarios. The application is based on Docker, i.e., a container-based virtualization framework extensively adopted in the cyber-range field for several benefits already mentioned. We described the main components and showed how it is possible to realize a complex cyber kill-chain scenario that involves the utilization of Bluetooth components. The architecture has been conceived at the outset as an extensible one. Its feature set can be dynamically enabled or disabled through the docker-compose creator, and some fine-grained options can be configured to customize the scenarios. The strength of this system is its ability to quickly run a mobile component through Docker, with many interesting features out of the box. Furthermore, the centralization of several components increases the overall usability level. The cons are all related to compatibility issues with Windows and OS X when running the Core for Emulator. While the former will probably be solved with the next updates, the latter is not solvable without significant changes to the OS X implementation. Another limitation is the lack of support for emulating some hardware components, e.g., Bluetooth. For these reasons, the Linux environment as a host machine is strongly recommended. We will also assess the potential benefits of using Dockerized Android in cloud-based environments in future works. Other improvements include the full integration of security-based features in the Android Emulator. For example, the GPS location could be useful to simulate a realistic route traveled by a simulated user. In recent works, cyber ranges are configured by using the high-level SDL (Specification and Description Language) representation [8]. Integrating this language in Dockerized Android is relatively easy, as every feature is set through Docker environment variables. Additional efforts will be focused on improving automation features, such as the design of an event-based architecture to simulate complex sequential actions involving human interaction.

REFERENCES

[1] Jan Vykopal et al. “Lessons learned from complex hands-on defence exercises in a cyber range”. In: 2017 IEEE Frontiers in Education Conference (FIE). 2017, pp. 1–8. DOI: 10.1109/FIE.2017.8190713.

\ [2] Adam McNeil and W. Stuart Jones. Mobile Malware is Surging in Europe: A Look at the Biggest Threats. https://www.proofpoint.com/us/blog/email-and-cloudthreats/mobile-malware- surging-europe-look- biggestthreats. Online; 14-May-2022. 2022.

\ [3] René Mayrhofer et al. “The Android Platform Security Model”. In: ACM Transactions on Privacy and Security 24.3 (Aug. 2021), pp. 1–35. DOI: 10 . 1145/ 3448609. URL: https://doi.org/10.1145/3448609.

\ [4] Ryotaro Nakata and Akira Otsuka. “CyExec*: A HighPerformance Container-Based Cyber Range With Scenario Randomization”. In: IEEE Access 9 (2021), pp. 109095–109114. DOI: 10 . 1109 / ACCESS . 2021 . 3101245.

\ [5] Ryotaro Nakata and Akira Otsuka. Evaluation of vulnerability reproducibility in container-based Cyber Range. 2020. DOI: 10.48550/ARXIV.2010.16024. URL: https: //arxiv.org/abs/2010.16024.

\ [6] Francesco Caturano, Gaetano Perrone, and Simon Pietro Romano. “Capturing flags in a dynamically deployed microservices-based heterogeneous environment”. In: 2020 Principles, Systems and Applications of IP Telecommunications (IPTComm). 2020, pp. 1–7. DOI: 10.1109/IPTComm50535.2020.9261519.

\ [7] Muhammad Mudassar Yamin, Basel Katt, and Vasileios Gkioulos. “Cyber ranges and security testbeds: Scenarios, functions, tools and architecture”. In: Computers & Security 88 (Jan. 2020), p. 101636. DOI: 10. 1016/ J. COSE.2019.101636.

\ [8] Enrico Russo, Luca Verderame, and Alessio Merlo. “Enabling Next-Generation Cyber Ranges with Mobile Security Components”. In: IFIP International Conference on Testing Software and Systems. Springer, 2020, pp. 150–165.

\ [9] Giuseppe Trotta Andrea Pierini. From APK to Golden Ticket. https://www.exploit-db.com/docs/english/44032- from- apk-to- golden-ticket.pdf. [Online; accessed 01- March-2021]. 2017.

\ [10] Genymotion. Android as a Service. https : / / www . genymotion.com/. [Online; accessed 1-March-2021].

\ [11] Corellium. ARM Device Virtualization. https : / / corellium.com/. [Online; accessed 10-March-2021].

\ [12] Android Emulator. https : / / developer . android . com / studio/run/emulator. Accessed: 11-01-2021.

\ [13] thyrlian. AndroidSDK. https : / / github . com / thyrlian / AndroidSDK. [Online; accessed 10-March-2021].

\ [14] budtmo. docker-android. https:// github. com/ budtmo/ docker-android. [Online; accessed 10-March-2021].

\ [15] bitrise-io. android. https://github.com/bitrise-io/android. [Online; accessed 10-March-2021].

\ [16] MobSF. Mobile Security Framework. https : / / www . github . com / MobSF / Mobile - Security - Framework - MobSF. [Online; accessed 1-March-2021].

\ [17] Dockerfile best practices. https : / / docs . docker. com / develop / develop - images / dockerfile _ best - practices/. Accessed: 13-02-2021.

\ [18] Flaticon. Free vector icons. https://www.flaticon.com/. [Online; accessed 17-April-2021].

\ [19] Frida. Frida. https://frida.re/. Online; 13-May-2022.

\ [20] Anonymized authors. Dockerized Android github repo. . In order to adhere to the double-blind review principle, the github repo information has been obfuscated and will be made available if and when the paper is accepted.

\ [21] Android-Exploits. https : / / github . com / sundaysec / Android - Exploits / blob / master / remote / 44242 . md. [Online; accessed 19-April-2021].

\ [22] Ben Seri and Gregory Vishnepolsky. BlueBorne - The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks. Tech. rep. Armis, 2017.

\ [23] Armis Security. BlueBorne. https://www.armis.com/ research/blueborne/. Online; 13-May-2022. 2017.

\

:::info This paper is available on arxiv under CC by-SA 4.0 Deed (Attribution-Sahrealike 4.0 International license.

:::

\

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

Crucial Delay: How Lack of Data Could Impact Fed Policy Adjustments

Crucial Delay: How Lack of Data Could Impact Fed Policy Adjustments

BitcoinWorld Crucial Delay: How Lack of Data Could Impact Fed Policy Adjustments The financial world is abuzz following Federal Reserve Chair Jerome Powell’s recent remarks, which highlight a significant challenge facing the central bank’s future Fed policy adjustments. A lack of reliable economic data, particularly employment indicators, stemming from the government shutdown, could force the Fed to pump the brakes on its planned policy shifts. This situation introduces a layer of uncertainty for markets and investors alike, as the central bank relies heavily on comprehensive data to guide its decisions. What’s Driving the Uncertainty in Fed Policy Adjustments? Jerome Powell explicitly stated that the recent government shutdown created a void in critical economic reporting. Key employment indicators, consumer sentiment surveys, and other vital statistics that typically inform the Federal Reserve’s understanding of the economy simply weren’t available. Without this complete picture, making informed decisions about interest rates or other monetary tools becomes incredibly difficult. The Federal Reserve operates on a data-dependent framework. This means every decision regarding Fed policy adjustments, such as whether to raise, lower, or maintain interest rates, is meticulously weighed against the latest economic performance data. When this data stream is interrupted, the foundation for policy decisions weakens, leading to potential delays. Why Are Comprehensive Economic Data Crucial for Monetary Policy? Think of the economy as a complex machine, and economic data as the dashboard gauges. The Fed needs to see these gauges clearly – unemployment rates, inflation figures, GDP growth, and wage increases – to know if the machine is running too hot or too cold. Without accurate readings, it’s like driving blindfolded. For instance, employment data offers insights into labor market health, consumer spending power, and potential inflationary pressures. If the Fed can’t accurately assess these factors, it risks making an adjustment that could either stifle growth unnecessarily or allow inflation to accelerate unchecked. This underscores the profound importance of timely and accurate information for effective monetary policy adjustments. Potential Challenges and Implications for Future Fed Policy Adjustments This data gap presents several challenges: Market Volatility: Uncertainty about the Fed’s next move can lead to increased volatility in financial markets, impacting everything from stock prices to bond yields. Investor Confidence: A less predictable monetary policy environment can erode investor confidence, potentially affecting investment and growth. Delayed Decisions: The most direct impact is the potential for the Fed to slow the pace of its Fed policy adjustments. This could mean interest rate decisions are postponed or approached with greater caution. Economic Forecasting: Other economic forecasters and businesses also rely on this data, making their own planning more difficult. Powell himself acknowledged this, expressing a strong desire to have more comprehensive data available by December. This timeline suggests that the central bank is actively waiting for clarity before committing to its next steps. Looking Ahead: What Does This Mean for Future Fed Policy Adjustments? The immediate takeaway is patience. The Federal Reserve will likely adopt a more cautious stance, preferring to wait for a clearer economic picture before making any significant moves. This doesn’t necessarily mean a halt to all Fed policy adjustments, but rather a more deliberate and potentially slower approach. For individuals and businesses, this period calls for close attention to upcoming economic reports and statements from the Federal Reserve. Understanding the data the Fed is watching will be key to anticipating their next actions. The central bank’s commitment to data-driven decisions remains paramount, even when the data itself is temporarily elusive. In conclusion, Jerome Powell’s candid admission underscores the critical role of robust economic data in shaping monetary policy. The temporary void created by the government shutdown could indeed slow the pace of Fed policy adjustments, introducing a period of heightened caution and data dependency for the central bank. As we move forward, the availability of comprehensive economic indicators will be the guiding light for the Federal Reserve’s crucial decisions, influencing the stability and growth of the broader economy. Frequently Asked Questions (FAQs) Q1: Why is a lack of data so problematic for the Federal Reserve? The Federal Reserve relies on accurate and timely economic data to assess the health of the economy and make informed decisions about interest rates and other monetary tools. Without this data, their ability to make effective Fed policy adjustments is severely hampered, increasing the risk of missteps. Q2: What specific types of data are most important for the Fed? Key data points include employment indicators (like unemployment rates and job growth), inflation figures (Consumer Price Index), GDP growth, retail sales, and manufacturing output. These provide a comprehensive view of economic activity and inflationary pressures, guiding monetary policy adjustments. Q3: How might this delay in policy adjustments affect the average person? A delay in Fed policy adjustments could lead to increased market volatility, impacting investments and retirement savings. It might also prolong uncertainty about future interest rates, which can affect borrowing costs for mortgages, car loans, and credit cards. Q4: When does Jerome Powell expect to have sufficient data? Jerome Powell expressed hope that more comprehensive data would be available by December. This suggests that the central bank is anticipating a clearer economic picture towards the end of the year before making further Fed policy adjustments. Q5: Does this mean the Fed won’t make any policy changes until December? Not necessarily. It means the Fed will likely adopt a more cautious and deliberate approach to any Fed policy adjustments. While significant shifts might be postponed, the central bank will continue to monitor available information and could make minor adjustments if deemed necessary, albeit with greater prudence. Did you find this analysis helpful in understanding the complexities of monetary policy? Share this article with your network on social media to keep others informed about the critical factors influencing the Federal Reserve’s decisions! To learn more about the latest explore our article on key developments shaping global economic trends and their impact on future market stability. This post Crucial Delay: How Lack of Data Could Impact Fed Policy Adjustments first appeared on BitcoinWorld.
Share
Coinstats2025/10/30 03:40