Dockerized Android is a Docker-based virtualization platform that lets cyber-range designers simulate mobile attack and defense scenarios efficiently. Its modular design allows features like Bluetooth and GPS emulation to be toggled via Docker Compose, enhancing automation and realism. While best run on Linux, the system promises future cloud support and stronger security integrations, paving the way for more dynamic and realistic cybersecurity training environments.Dockerized Android is a Docker-based virtualization platform that lets cyber-range designers simulate mobile attack and defense scenarios efficiently. Its modular design allows features like Bluetooth and GPS emulation to be toggled via Docker Compose, enhancing automation and realism. While best run on Linux, the system promises future cloud support and stronger security integrations, paving the way for more dynamic and realistic cybersecurity training environments.

Building Smarter Cyber Ranges with Dockerized Android

2025/10/17 05:15

:::info Authors:

(1) Daniele Capone, SecSI srl, Napoli, Italy ([email protected]);

(2) Francesco Caturano, Dept. of Electrical Engineering and Information, Technology University of Napoli Federico II, Napoli, Italy ([email protected])

(3) Angelo Delicato, SecSI srl, Napoli, Italy ([email protected]);

(4) Gaetano Perrone, Dept. of Electrical Engineering and Information Technology, University of Napoli Federico II, Napoli, Italy ([email protected])

(5) Simon Pietro Romano, Dept. of Electrical Engineering and Information Technology, University of Napoli Federico II, Napoli, Italy ([email protected]).

:::

Abstract and I. Introduction

II. Related Work

III. Dockerized Android: Design

IV. Dockerized Android Architecture

V. Evaluation

VI. Conclusion and Future Developments, and References

VI. CONCLUSION AND FUTURE DEVELOPMENTS

In this work, we have described Dockerized Android, a platform that supports cyber-range designers in realizing mobile virtual scenarios. The application is based on Docker, i.e., a container-based virtualization framework extensively adopted in the cyber-range field for several benefits already mentioned. We described the main components and showed how it is possible to realize a complex cyber kill-chain scenario that involves the utilization of Bluetooth components. The architecture has been conceived at the outset as an extensible one. Its feature set can be dynamically enabled or disabled through the docker-compose creator, and some fine-grained options can be configured to customize the scenarios. The strength of this system is its ability to quickly run a mobile component through Docker, with many interesting features out of the box. Furthermore, the centralization of several components increases the overall usability level. The cons are all related to compatibility issues with Windows and OS X when running the Core for Emulator. While the former will probably be solved with the next updates, the latter is not solvable without significant changes to the OS X implementation. Another limitation is the lack of support for emulating some hardware components, e.g., Bluetooth. For these reasons, the Linux environment as a host machine is strongly recommended. We will also assess the potential benefits of using Dockerized Android in cloud-based environments in future works. Other improvements include the full integration of security-based features in the Android Emulator. For example, the GPS location could be useful to simulate a realistic route traveled by a simulated user. In recent works, cyber ranges are configured by using the high-level SDL (Specification and Description Language) representation [8]. Integrating this language in Dockerized Android is relatively easy, as every feature is set through Docker environment variables. Additional efforts will be focused on improving automation features, such as the design of an event-based architecture to simulate complex sequential actions involving human interaction.

REFERENCES

[1] Jan Vykopal et al. “Lessons learned from complex hands-on defence exercises in a cyber range”. In: 2017 IEEE Frontiers in Education Conference (FIE). 2017, pp. 1–8. DOI: 10.1109/FIE.2017.8190713.

\ [2] Adam McNeil and W. Stuart Jones. Mobile Malware is Surging in Europe: A Look at the Biggest Threats. https://www.proofpoint.com/us/blog/email-and-cloudthreats/mobile-malware- surging-europe-look- biggestthreats. Online; 14-May-2022. 2022.

\ [3] René Mayrhofer et al. “The Android Platform Security Model”. In: ACM Transactions on Privacy and Security 24.3 (Aug. 2021), pp. 1–35. DOI: 10 . 1145/ 3448609. URL: https://doi.org/10.1145/3448609.

\ [4] Ryotaro Nakata and Akira Otsuka. “CyExec*: A HighPerformance Container-Based Cyber Range With Scenario Randomization”. In: IEEE Access 9 (2021), pp. 109095–109114. DOI: 10 . 1109 / ACCESS . 2021 . 3101245.

\ [5] Ryotaro Nakata and Akira Otsuka. Evaluation of vulnerability reproducibility in container-based Cyber Range. 2020. DOI: 10.48550/ARXIV.2010.16024. URL: https: //arxiv.org/abs/2010.16024.

\ [6] Francesco Caturano, Gaetano Perrone, and Simon Pietro Romano. “Capturing flags in a dynamically deployed microservices-based heterogeneous environment”. In: 2020 Principles, Systems and Applications of IP Telecommunications (IPTComm). 2020, pp. 1–7. DOI: 10.1109/IPTComm50535.2020.9261519.

\ [7] Muhammad Mudassar Yamin, Basel Katt, and Vasileios Gkioulos. “Cyber ranges and security testbeds: Scenarios, functions, tools and architecture”. In: Computers & Security 88 (Jan. 2020), p. 101636. DOI: 10. 1016/ J. COSE.2019.101636.

\ [8] Enrico Russo, Luca Verderame, and Alessio Merlo. “Enabling Next-Generation Cyber Ranges with Mobile Security Components”. In: IFIP International Conference on Testing Software and Systems. Springer, 2020, pp. 150–165.

\ [9] Giuseppe Trotta Andrea Pierini. From APK to Golden Ticket. https://www.exploit-db.com/docs/english/44032- from- apk-to- golden-ticket.pdf. [Online; accessed 01- March-2021]. 2017.

\ [10] Genymotion. Android as a Service. https : / / www . genymotion.com/. [Online; accessed 1-March-2021].

\ [11] Corellium. ARM Device Virtualization. https : / / corellium.com/. [Online; accessed 10-March-2021].

\ [12] Android Emulator. https : / / developer . android . com / studio/run/emulator. Accessed: 11-01-2021.

\ [13] thyrlian. AndroidSDK. https : / / github . com / thyrlian / AndroidSDK. [Online; accessed 10-March-2021].

\ [14] budtmo. docker-android. https:// github. com/ budtmo/ docker-android. [Online; accessed 10-March-2021].

\ [15] bitrise-io. android. https://github.com/bitrise-io/android. [Online; accessed 10-March-2021].

\ [16] MobSF. Mobile Security Framework. https : / / www . github . com / MobSF / Mobile - Security - Framework - MobSF. [Online; accessed 1-March-2021].

\ [17] Dockerfile best practices. https : / / docs . docker. com / develop / develop - images / dockerfile _ best - practices/. Accessed: 13-02-2021.

\ [18] Flaticon. Free vector icons. https://www.flaticon.com/. [Online; accessed 17-April-2021].

\ [19] Frida. Frida. https://frida.re/. Online; 13-May-2022.

\ [20] Anonymized authors. Dockerized Android github repo. . In order to adhere to the double-blind review principle, the github repo information has been obfuscated and will be made available if and when the paper is accepted.

\ [21] Android-Exploits. https : / / github . com / sundaysec / Android - Exploits / blob / master / remote / 44242 . md. [Online; accessed 19-April-2021].

\ [22] Ben Seri and Gregory Vishnepolsky. BlueBorne - The dangers of Bluetooth implementations: Unveiling zero day vulnerabilities and security flaws in modern Bluetooth stacks. Tech. rep. Armis, 2017.

\ [23] Armis Security. BlueBorne. https://www.armis.com/ research/blueborne/. Online; 13-May-2022. 2017.

\

:::info This paper is available on arxiv under CC by-SA 4.0 Deed (Attribution-Sahrealike 4.0 International license.

:::

\

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.
Share Insights

You May Also Like

Astonishing Kevin Durant Bitcoin Fortune: A Decade-Long Hold Yields 195-Fold Return

Astonishing Kevin Durant Bitcoin Fortune: A Decade-Long Hold Yields 195-Fold Return

BitcoinWorld Astonishing Kevin Durant Bitcoin Fortune: A Decade-Long Hold Yields 195-Fold Return Imagine logging into an old account and discovering a fortune! That’s exactly what happened to NBA superstar Kevin Durant. His decade-old, forgotten Coinbase account, which held an early Kevin Durant Bitcoin investment, has now resurfaced, revealing an incredible 195-fold return. This remarkable story highlights the immense potential of long-term cryptocurrency holdings and serves as a fascinating example for anyone interested in digital assets. The Accidental ‘Hodl’: How Kevin Durant’s Bitcoin Investment Skyrocketed The journey of Kevin Durant’s Bitcoin investment began in 2016. He encountered Bitcoin, then priced at a modest $600, during a birthday celebration for venture capitalist Ben Horowitz. Intrigued, Durant decided to invest, setting up a Coinbase account. However, as many early adopters can attest, managing digital assets in the nascent crypto landscape wasn’t always straightforward. Durant subsequently misplaced his Coinbase login credentials, leading to an involuntary long-term hold – a phenomenon affectionately known as "HODL" (Hold On for Dear Life) in the crypto community. This accidental strategy proved to be a stroke of pure luck. After a decade, with assistance from Coinbase and a thorough identity verification process, Durant successfully recovered his account. While the exact amount of BTC remains undisclosed, the outcome is clear: a staggering 195-fold return on his initial investment. Initial Investment: Bitcoin at $600 in 2016. Accidental Strategy: Lost login details led to an unintentional "HODL." Recovery: Coinbase assisted with identity verification. Return: A remarkable 195-fold increase in value. Beyond Personal Gains: Kevin Durant’s Broader Crypto Engagement This isn’t Kevin Durant’s first foray into the world of digital assets, nor is it his only connection to the industry. Long before this incredible recovery, Durant had already demonstrated a positive and forward-thinking stance toward cryptocurrency. His engagement extends beyond just holding assets; he has actively participated in the crypto ecosystem. Durant previously partnered with Coinbase, one of the leading cryptocurrency exchanges, showcasing his belief in the platform and the broader potential of digital currencies. He has also ventured into the realm of Non-Fungible Tokens (NFTs), purchasing digital collectibles and exploring this evolving sector. These actions underscore his understanding and acceptance of crypto’s growing influence. His continued involvement helps bridge the gap between mainstream culture and the crypto world, bringing increased visibility and legitimacy to digital assets. The story of his Kevin Durant Bitcoin recovery only adds another layer to his impressive crypto narrative, inspiring many to consider the long-term prospects of digital investments. Valuable Lessons from Kevin Durant’s Bitcoin Journey Kevin Durant’s story offers compelling insights for both seasoned investors and newcomers to the crypto space. It powerfully illustrates the potential rewards of a patient, long-term investment approach, even if accidental. While not everyone will forget their login details for a decade, the principle of "HODLing" through market volatility can yield significant returns. However, it also subtly highlights the importance of proper security and record-keeping. Losing access to an account, even if eventually recovered, can be a stressful experience. Here are some actionable takeaways: Embrace Long-Term Vision: Bitcoin’s history shows substantial growth over extended periods. Patience often outperforms short-term trading. Secure Your Assets: Always keep your login details, seed phrases, and recovery information in multiple, secure locations. Consider hardware wallets for significant holdings. Understand the Volatility: Crypto markets are volatile. Investing only what you can afford to lose and being prepared for price swings is crucial. Stay Informed: While Durant’s hold was accidental, continuous learning about the crypto market can help make informed decisions. His experience reinforces the idea that strategic, even if involuntary, patience can be profoundly rewarding in the world of cryptocurrency. The Kevin Durant Bitcoin story is a testament to this. The tale of Kevin Durant’s forgotten Coinbase account and his astonishing 195-fold return on a decade-old Bitcoin investment is nothing short of extraordinary. It’s a vivid reminder of the transformative power of early adoption and the incredible growth potential within the cryptocurrency market. Beyond the personal windfall, Durant’s continued engagement with crypto, from partnerships to NFTs, reinforces his role as a prominent figure in the digital asset space. His accidental "HODL" has become a legendary example, inspiring many to look at long-term crypto investments with renewed optimism and a keen eye on future possibilities. Frequently Asked Questions About Kevin Durant’s Bitcoin Investment Here are some common questions regarding Kevin Durant’s recent crypto revelation: Q: How much did Kevin Durant initially invest in Bitcoin?A: The exact amount of Bitcoin Kevin Durant initially invested has not been disclosed. However, it was purchased around 2016 when Bitcoin was priced at approximately $600. Q: How did Kevin Durant recover his forgotten Coinbase account?A: Coinbase assisted Kevin Durant in recovering his account after he completed a thorough identity verification process, confirming his ownership of the decade-old account. Q: What does "195-fold return" mean?A: A "195-fold return" means that the value of his initial investment multiplied by 195 times. If he invested $1,000, it would now be worth $195,000. Q: Has Kevin Durant invested in other cryptocurrencies or NFTs?A: Yes, Kevin Durant has shown a friendly stance toward cryptocurrency beyond Bitcoin. He has partnered with Coinbase and has also purchased Non-Fungible Tokens (NFTs) in the past. Q: Is Kevin Durant’s story typical for Bitcoin investors?A: While the 195-fold return is exceptional, the principle of significant gains from long-term holding (HODLing) is a common theme in Bitcoin’s history. However, not all investments yield such high returns, and market volatility is always a factor. Did Kevin Durant’s incredible crypto journey inspire you? Share this astonishing story with your friends and followers on social media to spark conversations about the future of digital assets and the power of long-term investing! Your shares help us bring more fascinating crypto news to a wider audience. To learn more about the latest Bitcoin trends, explore our article on key developments shaping Bitcoin’s institutional adoption. This post Astonishing Kevin Durant Bitcoin Fortune: A Decade-Long Hold Yields 195-Fold Return first appeared on BitcoinWorld.
Share
Coinstats2025/09/19 18:45