Dockerized Android is a Docker-based virtualization platform that lets cyber-range designers simulate mobile attack and defense scenarios efficiently. Its modular design allows features like Bluetooth and GPS emulation to be toggled via Docker Compose, enhancing automation and realism. While best run on Linux, the system promises future cloud support and stronger security integrations, paving the way for more dynamic and realistic cybersecurity training environments.Dockerized Android is a Docker-based virtualization platform that lets cyber-range designers simulate mobile attack and defense scenarios efficiently. Its modular design allows features like Bluetooth and GPS emulation to be toggled via Docker Compose, enhancing automation and realism. While best run on Linux, the system promises future cloud support and stronger security integrations, paving the way for more dynamic and realistic cybersecurity training environments.

Building Smarter Cyber Ranges with Dockerized Android

2025/10/17 05:15

:::info Authors:

(1) Daniele Capone, SecSI srl, Napoli, Italy (daniele.capone@secsi.io);

(2) Francesco Caturano, Dept. of Electrical Engineering and Information, Technology University of Napoli Federico II, Napoli, Italy (francesco.caturano@unina.i)

(3) Angelo Delicato, SecSI srl, Napoli, Italy (angelo.delicato@secsi.io);

(4) Gaetano Perrone, Dept. of Electrical Engineering and Information Technology, University of Napoli Federico II, Napoli, Italy (gaetano.perrone@unina.it)

(5) Simon Pietro Romano, Dept. of Electrical Engineering and Information Technology, University of Napoli Federico II, Napoli, Italy (spromano@unina.it).

:::

Abstract and I. Introduction

II. Related Work

III. Dockerized Android: Design

IV. Dockerized Android Architecture

V. Evaluation

VI. Conclusion and Future Developments, and References

VI. CONCLUSION AND FUTURE DEVELOPMENTS

In this work, we have described Dockerized Android, a platform that supports cyber-range designers in realizing mobile virtual scenarios. The application is based on Docker, i.e., a container-based virtualization framework extensively adopted in the cyber-range field for several benefits already mentioned. We described the main components and showed how it is possible to realize a complex cyber kill-chain scenario that involves the utilization of Bluetooth components. The architecture has been conceived at the outset as an extensible one. Its feature set can be dynamically enabled or disabled through the docker-compose creator, and some fine-grained options can be configured to customize the scenarios. The strength of this system is its ability to quickly run a mobile component through Docker, with many interesting features out of the box. Furthermore, the centralization of several components increases the overall usability level. The cons are all related to compatibility issues with Windows and OS X when running the Core for Emulator. While the former will probably be solved with the next updates, the latter is not solvable without significant changes to the OS X implementation. Another limitation is the lack of support for emulating some hardware components, e.g., Bluetooth. For these reasons, the Linux environment as a host machine is strongly recommended. We will also assess the potential benefits of using Dockerized Android in cloud-based environments in future works. Other improvements include the full integration of security-based features in the Android Emulator. For example, the GPS location could be useful to simulate a realistic route traveled by a simulated user. In recent works, cyber ranges are configured by using the high-level SDL (Specification and Description Language) representation [8]. Integrating this language in Dockerized Android is relatively easy, as every feature is set through Docker environment variables. Additional efforts will be focused on improving automation features, such as the design of an event-based architecture to simulate complex sequential actions involving human interaction.

REFERENCES

[1] Jan Vykopal et al. “Lessons learned from complex hands-on defence exercises in a cyber range”. In: 2017 IEEE Frontiers in Education Conference (FIE). 2017, pp. 1–8. DOI: 10.1109/FIE.2017.8190713.

\ [2] Adam McNeil and W. Stuart Jones. Mobile Malware is Surging in Europe: A Look at the Biggest Threats. https://www.proofpoint.com/us/blog/email-and-cloudthreats/mobile-malware- surging-europe-look- biggestthreats. Online; 14-May-2022. 2022.

\ [3] René Mayrhofer et al. “The Android Platform Security Model”. In: ACM Transactions on Privacy and Security 24.3 (Aug. 2021), pp. 1–35. DOI: 10 . 1145/ 3448609. URL: https://doi.org/10.1145/3448609.

\ [4] Ryotaro Nakata and Akira Otsuka. “CyExec*: A HighPerformance Container-Based Cyber Range With Scenario Randomization”. In: IEEE Access 9 (2021), pp. 109095–109114. DOI: 10 . 1109 / ACCESS . 2021 . 3101245.

\ [5] Ryotaro Nakata and Akira Otsuka. Evaluation of vulnerability reproducibility in container-based Cyber Range. 2020. DOI: 10.48550/ARXIV.2010.16024. URL: https: //arxiv.org/abs/2010.16024.

\ [6] Francesco Caturano, Gaetano Perrone, and Simon Pietro Romano. “Capturing flags in a dynamically deployed microservices-based heterogeneous environment”. In: 2020 Principles, Systems and Applications of IP Telecommunications (IPTComm). 2020, pp. 1–7. DOI: 10.1109/IPTComm50535.2020.9261519.

\ [7] Muhammad Mudassar Yamin, Basel Katt, and Vasileios Gkioulos. “Cyber ranges and security testbeds: Scenarios, functions, tools and architecture”. In: Computers & Security 88 (Jan. 2020), p. 101636. DOI: 10. 1016/ J. COSE.2019.101636.

\ [8] Enrico Russo, Luca Verderame, and Alessio Merlo. “Enabling Next-Generation Cyber Ranges with Mobile Security Components”. In: IFIP International Conference on Testing Software and Systems. Springer, 2020, pp. 150–165.

\ [9] Giuseppe Trotta Andrea Pierini. From APK to Golden Ticket. https://www.exploit-db.com/docs/english/44032- from- apk-to- golden-ticket.pdf. [Online; accessed 01- March-2021]. 2017.

\ [10] Genymotion. Android as a Service. https : / / www . genymotion.com/. [Online; accessed 1-March-2021].

\ [11] Corellium. ARM Device Virtualization. https : / / corellium.com/. [Online; accessed 10-March-2021].

\ [12] Android Emulator. https : / / developer . android . com / studio/run/emulator. Accessed: 11-01-2021.

\ [13] thyrlian. AndroidSDK. https : / / github . com / thyrlian / AndroidSDK. [Online; accessed 10-March-2021].

\ [14] budtmo. docker-android. https:// github. com/ budtmo/ docker-android. [Online; accessed 10-March-2021].

\ [15] bitrise-io. android. https://github.com/bitrise-io/android. [Online; accessed 10-March-2021].

\ [16] MobSF. Mobile Security Framework. https : / / www . github . com / MobSF / Mobile - Security - Framework - MobSF. [Online; accessed 1-March-2021].

\ [17] Dockerfile best practices. https : / / docs . docker. com / develop / develop - images / dockerfile _ best - practices/. Accessed: 13-02-2021.

\ [18] Flaticon. Free vector icons. https://www.flaticon.com/. [Online; accessed 17-April-2021].

\ [19] Frida. Frida. https://frida.re/. Online; 13-May-2022.

\ [20] Anonymized authors. Dockerized Android github repo. . In order to adhere to the double-blind review principle, the github repo information has been obfuscated and will be made available if and when the paper is accepted.

\ [21] Android-Exploits. https : / / github . com / sundaysec / Android - Exploits / blob / master / remote / 44242 . md. [Online; accessed 19-April-2021].

\ [22] Ben Seri and Gregory Vishnepolsky. BlueBorne - The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks. Tech. rep. Armis, 2017.

\ [23] Armis Security. BlueBorne. https://www.armis.com/ research/blueborne/. Online; 13-May-2022. 2017.

\

:::info This paper is available on arxiv under CC by-SA 4.0 Deed (Attribution-Sahrealike 4.0 International license.

:::

\

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact service@support.mexc.com for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

BitMine koopt $44 miljoen aan ETH

BitMine koopt $44 miljoen aan ETH

De grootste Ethereum (ETH) treasury ter wereld, BitMine Immersion Technologies, heeft weer toegeslagen op de crypto markt. Uit on-chain data blijkt dat BitMine, ook bekend onder het ticker symbool BMNR, voor $44 miljoen aan ETH munten heeft gekocht. Wat betekent dit voor de grootste altcoin? Check onze Discord Connect met "like-minded" crypto enthousiastelingen Leer gratis de basis van Bitcoin & trading - stap voor stap, zonder voorkennis. Krijg duidelijke uitleg & charts van ervaren analisten. Sluit je aan bij een community die samen groeit. Nu naar Discord BitMine verdubbelt inzet op Ethereum Om precies te zijn koopt BitMine 14.618 ETH munten erbij, goed voor dus $44 miljoen. Zo blijkt uit on-chain gegevens gedeeld door Lookonchain op X. Daarmee tilt de grote Ethereum treasury zijn voorraad naar maar liefst 3,63 miljoen ETH ter waarde van ruim $11 miljard, aldus data van StrategicETHReserve. Daarmee controleert het bedrijf nu 3% van alle Ethereum in omloop. Tom Lee(@fundstrat)’s #Bitmine just bought another 14,618 $ETH($44.34M) 4 hours ago.https://t.co/P684j5Yil8 pic.twitter.com/LHOpDto1R5 — Lookonchain (@lookonchain) November 28, 2025 De ambities liggen desondanks een stuk hoger: BitMine wil uiteindelijk 5% van de volledige ETH voorraad bezitten. Oftewel, we kunnen nog flink wat Ethereum aankopen verwachten van het bedrijf in de komende maanden. Door de aggresssieve ETH strategie van het bedrijf zijn ze bij uitstek de grootste Ethereum reserve. De nummer twee, SharpLink Gaming, bezit ongeveer 859.400 ETH munten ter waarde van zo’n $2,62 miljard. Deze agressieve uitbreiding volgt een duidelijke strategie. BitMine verwacht dat Ethereum een grotere rol in de tokenisatie. Bedrijven bezitten samen al bijna 5,01% van alle ETH, een signaal dat corporates zich voorbereiden op een toekomst waarin Ethereum een basislaag wordt voor financiële infrastructuur. Waarom BitMine zijn treasury blijft uitbreiden BitMine bouwt zijn treasury verder uit omdat het een dominante positie in het Ethereum netwerk wil innemen. Meer ETH geeft BitMine straks hogere staking-opbrengsten en meer invloed op de liquiditeit binnen het netwerk. Ook gelooft BMNR sterk in de rol van Ethereum in de toekomst van financiële infrastructuur. Bestuurslid Tom Lee verwacht dat ETH een dominante speler zal zijn in de stablecoin en tokenisatie markt. Beide sectoren zijn hard aan het groeien, mede dankzij duidelijke wet- en regelgeving onder de Trump administratie zoals de GENIUS Act. Daarnaast gelooft Tom Lee in een zogeheten supercycle voor ETH. Volgens de bekende top analist kan de grootste altcoin zelfs Bitcoin (BTC) voorbijstreven, allemaal dankzij grootschalige adoptie door tokenisatie. Als Ethereum de huidige marketcap van BTC wil evenaren dan zou de ETH koers al op ruim $15.000 komen. ETH en BMNR krabbelen langzaam op uit diepe dip De ethereum prijs reageerde vandaag beperkt op het nieuws. De altcoin steeg over de afgelopen 24 uur met 0,8% tot een huidige koers van $3.050. Daarmee zet de munt samen met de rest van de crypto markt een stijgende trend voort. Na een heftige crash in de afgelopen weken zakte de ETH koers vorige week vrijdag tot onder de $2.700. Ook het BMNR aandeel is langzaam aan het terugkrabbelen. Het ETH treasury bedrijf zakte vorige week tot $26. Een flinke crash ten opzichte van de all time high van $135 dat het bedrijf in juli van dit jaar nog wist te realiseren. De sterke daling van het BMNR aandeel valt samen met een algehele neerwaartse trend onder crypto treasury bedrijven. Ook Strategy, de grootste publieke Bitcoin houder, is ook flink lager aan het handelen vanaf zijn all time. Zo staat het MSTR aandeel momenteel op $175 tegenover een prijs record van $457 in juli. Ethereum (ETH) kopen op Bitvavo Bitvavo - grootste crypto exchange in Nederland Meer dan 340 beschikbare cryptocurrencies Lage transactiekosten Gemakkelijk via iDeal geld storten Professionele traders dashboard Bitvavo review Koop ETH op Bitvavo Let op: cryptocurrency is een zeer volatiele en ongereguleerde investering. Doe je eigen onderzoek. Het bericht BitMine koopt $44 miljoen aan ETH is geschreven door Thomas van Welsenes en verscheen als eerst op Bitcoinmagazine.nl.
Share
Coinstats2025/11/28 20:31
Upbit hack sparks altcoin season in Korea? Thailand targets WLD

Upbit hack sparks altcoin season in Korea? Thailand targets WLD

The post Upbit hack sparks altcoin season in Korea? Thailand targets WLD appeared on BitcoinEthereumNews.com. Korean crypto bros are pumping altcoins after Upbit’s $36M exploit Korean crypto traders are having an outsize effect on local altcoin prices following a major hack at South Korean exchange Upbit, according to CryptoQuant CEO Ki Young Ju. (Ki Young Ju) “Upbit got hacked and paused withdrawals, but Koreans are pumping alts since arbitrage bots are no longer running,” Ju said in an X post on Thursday, shortly after the exchange halted transaction activity after detecting an “abnormal transaction” with a value of around $36 million. With arbitrage activity suspended, local buy orders are having more significant pressure on prices, allowing Korean-listed altcoins to surge, as the selling pressure that typically puts a ceiling on price increases has disappeared. Crypto trader R2D2 said, “Unbelievable scenes here.” Crypto analyst A79 said, “Hack happens, and Koreans just flip it into a rally.” Upbit announced on Thursday that it had suspended deposits and withdrawals after identifying an unauthorized transaction worth approximately 54 billion won ($36 million), involving mainly Solana-based assets that were transferred to an unidentified wallet address. Assets reportedly affected by the hack include BONK (BONK), Official Trump (TRUMP), MOODENG (MOODENG), and Render (RENDER). Upbit to cover loss to prevent “any damage” to user assets The exchange clarified that while the hot wallet was impacted, its cold wallets — where the majority of user funds are stored — were not compromised. Dunamu CEO Oh Kyung-seok said: “We immediately identified the extent of the digital asset outflow caused by the abnormal withdrawals and will cover the entire amount with Upbit assets to prevent any damage to our members’ assets.” Some industry participants were confused by the fact that all the red numbers Ju shared were positive. StarkWare ecosystem lead Brother Odin was quick to ask the obvious question, before Ju explained that red…
Share
BitcoinEthereumNews2025/11/28 21:20