Dockerized Android: a container-based platform to build mobile Android scenarios for Cyber Ranges

05/19/2022
by   Daniele Capone, et al.
0

The best way to train people about security is through Cyber Ranges, i.e., the virtual platform used by cyber-security experts to learn new skills and attack vectors. In order to realize such virtual scenarios, container-based virtualization is commonly adopted, as it provides several benefits in terms of performance, resource usage, and portability. Unfortunately, the current generation of Cyber Ranges does not consider mobile devices, which nowadays are ubiquitous in our daily lives. Such devices do often represent the very first entry point for hackers into target networks. It is thus important to make available tools allowing to emulate mobile devices in a safe environment without incurring the risk of causing any damage in the real world. This work aims to propose Dockerized Android, i.e., a framework that addresses the problem of realizing vulnerable environments for mobile devices in the next generation of Cyber Ranges. We show the platform's design and implementation and show how it is possible to use the implemented features to realize complex virtual mobile kill-chains scenarios.

READ FULL TEXT
research
10/29/2020

Towards a certified reference monitor of the Android 10 permission system

Android is a platform for mobile devices that captures more than 85 tota...
research
05/18/2022

ExploitWP2Docker: a Platform for Automating the Generation of Vulnerable WordPress Environments for Cyber Ranges

A cyber range is a realistic simulation of an organization's network inf...
research
02/22/2020

An Empirical Study of Android Security Bulletins in Different Vendors

Mobile devices encroach on almost every part of our lives, including wor...
research
01/26/2021

Enhancing Application Performance by Memory Partitioning in Android Platforms

This paper suggests a new memory partitioning scheme that can enhance pr...
research
01/18/2020

Automating the Generation of Cyber Range Virtual Scenarios with VSDL

A cyber range is an environment used for training security experts and t...
research
01/23/2020

SeCloak: ARM Trustzone-based Mobile Peripheral Control

Reliable on-off control of peripherals on smart devices is a key to secu...

Please sign up or login with your details

Forgot password? Click here to reset