This evaluation examines Dockerized Android’s strengths and limits: emulators support automated ADB features (SMS injection, GPS emulation, container IPs) but miss hardware like Bluetooth, forcing real-device tests for vectors like BlueBorne. The paper reproduces attacks (CVE-2018-7661 PoC and BlueBorne kill-chains), highlights cross-platform compatibility issues (WSL nested virtualization, macOS USB sharing), and maps which platform requirements are fully/partially met.This evaluation examines Dockerized Android’s strengths and limits: emulators support automated ADB features (SMS injection, GPS emulation, container IPs) but miss hardware like Bluetooth, forcing real-device tests for vectors like BlueBorne. The paper reproduces attacks (CVE-2018-7661 PoC and BlueBorne kill-chains), highlights cross-platform compatibility issues (WSL nested virtualization, macOS USB sharing), and maps which platform requirements are fully/partially met.

How Dockerized Android Performs Across Different Operating Systems

2025/10/16 06:00

:::info Authors:

(1) Daniele Capone, SecSI srl, Napoli, Italy ([email protected]);

(2) Francesco Caturano, Dept. of Electrical Engineering and Information, Technology University of Napoli Federico II, Napoli, Italy ([email protected])

(3) Angelo Delicato, SecSI srl, Napoli, Italy ([email protected]);

(4) Gaetano Perrone, Dept. of Electrical Engineering and Information Technology, University of Napoli Federico II, Napoli, Italy ([email protected])

(5) Simon Pietro Romano, Dept. of Electrical Engineering and Information Technology, University of Napoli Federico II, Napoli, Italy ([email protected]).

:::

Abstract and I. Introduction

II. Related Work

III. Dockerized Android: Design

IV. Dockerized Android Architecture

V. Evaluation

VI. Conclusion and Future Developments, and References

V. EVALUATION

This section assesses the Dockerized Android platform by examining several aspects. Firstly, we emphasize the differences between the Core for Emulator and Core for Real Device components in terms of features and highlight compatibility with the three most used Operating Systems. Then, we provide practical usage examples of Dockerized Android and discuss coverage of the requirements defined in Section III.

\ Fig. 3. UI Dockerized Android

\ A. Differences between Core for Emulator and Core for Real Device

\ Even if a significant effort has been put into creating a system that has the same features for both kinds of devices, there are limitations when emulation is used:

\ • SMS ADB send/reception feature: in emulated devices, it is possible to automate the send and reception of SMS messages through the ADB software. Obviously, this is not natively possible for real devices. Therefore, the user must manually send and receive SMS messages to implement SMS attack scenarios. A solution to address this problem could be the realization of a custom Android application that could be installed on a real device and could be instrumented to send and receive messages automatically.

\ • Networking: networking is quite different between the Emulator and the Real device flavors. In the emulator version, the AVD is created inside the Docker container, and therefore it shares the container’s IP address. Instead, the real device is physically connected to the machine that runs the container and keeps its own IP address.

\ • Hardware virtualization: for the hardware components, the situation is quite different, too: some hardware devices like the GPS and the microphone can be emulated. In particular, the GPS location of the device can be set through ADB, and the microphone of the host machine can be shared with the emulator. There are other hardware components that currently cannot be emulated, like, e.g. Bluetooth.

\ B. Host evaluation for cross-platform compatibility

\ The non-functional requirement NF04 (Cross-platform compatibility) states that the resulting system should be usable from within any host OS. This refers to the OS of the machine that runs the Docker containers. Table III provides a summary of the compatibility with Linux, Windows, and OS X.

\ TABLE IIIHOST OS COMPATIBILITY COMPARISON

\ The problem with Windows is that currently, the best way to use Docker is through the Windows Subsystem for Linux (WSL) framework. Unfortunately, WSL does not support nested virtualization yet, and this feature is required to run the Android emulator inside a Docker container. However, the feature will be available in upcoming WSL releases. It might be possible to run the Core for Emulator flavor on Windows by using a virtual machine, though losing all of the performance benefits associated with containerization. A similar issue does exist with OS X, with which there is currently no way to run the Core for Emulator. Besides, OS X does not allow sharing the USB device with a Docker container. For this reason, the only ways to use the Core for Real Device flavor are to either run ADB over Wi-Fi or connect to the host ADB from within the Docker container.

\ In the remainder of this section, we show the effectiveness of Dockerized Android in reproducing security kill chains by using both the Core for Emulator and Core for Real Device.

\ C. Security attack reproduction on the emulator

\ We herein focus on a sample vulnerability scenario associated with CVE-2018-7661[1]. This CVE is related to the free version of the application “Wi-Fi Baby Monitor”. This application has to be installed on two devices in order to act as a so-called baby monitor (a radio system used to remotely listen to sounds emitted by an infant). As reported in the National Vulnerability Database, “Wi-Fi Baby Monitor Free & Lite” before version 2.02.2 allows remote attackers to obtain audio data via certain specific requests to TCP port numbers 8258 and 8257”.

\ TABLE IVREQUIREMENTS FOR WI-FI BABY MONITOR

\ The premium version of this application offers users the ability to specify a password to use in the pairing process. By monitoring the network traffic, it is possible to observe that:

\ • the initial connection takes place on port 8257;

\ • the same sequence is always sent to start the pairing process;

\ • at the end of the pairing process, a new connection is started on port 8258. This port is used to transmit the audio data;

\ • after connecting to the port 8258, the other connection on the port 8257 is kept open and used as a heartbeat for the session;

\ • on the heartbeat connection, the client periodically sends the hexadecimal byte 0x01 (about once per second);

\ The proof of concept that allows the attacker to obtain audio data is given in [21]. This Proof of Concept (PoC) is easily reproducible on Dockerized Android through the realization of an infrastructure composed of three services:

\ • core-emulator: an instance of the Core component with a pre-installed Baby Monitor app acting as the sender;

\ • ui: the UI component to control what is going on;

\ • attacker: a customized version of Kali Linux that automatically installs all the dependencies needed for the execution of the PoC.

\ This is also a perfect example to show the Port Forwarding feature used to enable the communications.

\ D. Security attack reproduction on the real device

\ With the real device, we examine a further vulnerability, known as BlueBorne. The term “BlueBorne” refers to multiple security vulnerabilities related to the implementation of Bluetooth. These vulnerabilities were discovered by a group of researchers from Armis Security, an IoT security company, in September 2017. According to Armis, at the time of discovery, around 8.2 billion devices were potentially affected by the BlueBorne attack vector, which affects the Bluetooth implementations in Android, iOS, Microsoft, and Linux, hence impacting almost all Bluetooth device types such as smartphones, laptops, and smartwatches. BlueBorne was analyzed in detail in a paper published on the 12th of September 2017 by Ben Seri and Gregor Vishnepolsk [22]. Eight different vulnerabilities can be used as part of the attack vector.

\ Regarding Android, all devices and versions (therefore versions older than Android Oreo, which was released in December 2017) are affected by the above-mentioned vulnerabilities, except for devices that support BLE (Bluetooth Low Energy). In general, two requirements should be satisfied to exploit the vulnerability: (i) the target device must have Bluetooth enabled; (ii) the attacker must be close enough to the target device. As the Bluetooth feature is not available in the Core Emulator, the kill-chain in question can only be reproduced on real devices.

\ 1) BlueBorne full reproduction on Dockerized Android: In order to show the effectiveness of Dockerized Android, we developed a kill chain that exploits two Remote Code Execution (RCE) vulnerabilities that affect Android, i.e., CVE-2017- 0781 and CVE-2017-0782. These vulnerabilities fall within the Bluetooth set vulnerability’s set defined “BlueBorne” and discovered by a group of security researchers from Armis Security [23].

\ The diagram in Fig. 4 gives an overview of the developed kill chain:

\

  1. The attacker creates a phishing email through Gophish, a phishing generator software.

\ 2) The phishing email is sent to a victim’s mailbox.

\ 3) The victim reads the phishing email and erroneously clicks a malicious link contained in the email’s body.

\ 4) The malicious link allows the attacker to trigger an attack that downloads and installs a fake application on the victim’s mobile device.

\ 5) The malicious information sends relevant mobile information to the attacker. This information is required for the exploitation of the two vulnerabilities.

\ 6) The attacker crafts a malicious payload to exploit the vulnerabilities.

\ 7) The attacker sends the attack by exploiting the Bluetooth component’s vulnerabilities and has remote access to the victim’s device.

\ Fig. 4. Exploit Chain Overview

\ The complex scenario covers several threats defined in Table I. Table V shows such threats and both the platform functionalities and components that allow the scenario reproduction. The

\ TABLE VTHREATS, SCENARIO’S STEPS, FEATURES AND COMPONENTS

\ scenario requires complex network communications (F07) and involves the utilization of Bluetooth. For this reason, we have to use a physical device (F10). In the proposed scenario, we have to simulate the installation of the malicious application when the user receives the email. This can be done either manually (F02) or by implementing utility ADB scripts (F03). In order to reproduce the scenario, additional elements are needed:

\ • Gophish: a webapp that allows to craft and send phishing emails, for which a Docker version already exists.

\ • Ghidra: an application created by the National Security Agency (NSA) for reverse engineering purposes. In this context, it is used to get some useful information about the target device. This application is used on the host machine without Docker.

\ • Fake Spotify: a seemingly benign application that pretends to provide the user with a free version of the well-known Spotify Premium app, but rather sends to the attacker’s server exfiltrated files that are reverse-engineered on Ghidra. Also, this app was created without the usage of Docker.

\ Listing 1. docker-compose.yaml for the BlueBorne kill chain

\ It is composed of five services, two of which are the subcomponents of Dockerized Android. The remaining three are briefly described in the following:

\ • attacker_phishing: contains the Gophish component used to craft and send the phishing email that tricks the user into downloading the malicious Fake Spotify app;

\ • attackerwebserver: contains the webserver used to receive the files sent by the malicious app, which are reverse engineered in order to find information allowing the attacker to exploit the vulnerability on the target device;

\ • attacker_blueborne: the service used by the attacker to execute the attack on the target device and obtain a reverse shell on it.

\ E. Requirements coverage

\ In Table II we have illustrated the defined requirements for the realization of our platform. The following table contains all the requirements and their corresponding status:

\ TABLE VIREQUIREMENTS EVALUATION

\ Requirement F04, as detailed before, is set to Partial because of the inability to correctly configure all the hardware components (for example the Bluetooth device). Requirement F06 is set to partial because ADB gives the ability to record the screen out-of-the-box, but this feature was not exposed or made easier to use through the UI. Finally, requirements F07 (Network Configuration) and F09 (Third-Party Tools integration) are granted by default because of the usage of Docker. The network can be defined in any possible way through the docker-compose file, and third-party tools can be easily used together with this system.

\

:::info This paper is available on arxiv under CC by-SA 4.0 Deed (Attribution-Sahrealike 4.0 International license.

:::


[1] https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-7661

Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

Ripple Buyers Step In at $2.00 Floor on BTC’s Hover Above $91K

Ripple Buyers Step In at $2.00 Floor on BTC’s Hover Above $91K

The post Ripple Buyers Step In at $2.00 Floor on BTC’s Hover Above $91K appeared on BitcoinEthereumNews.com. Token breaks above key support while volume surges 251% during psychological level defense at $2.00. News Background U.S. spot XRP ETFs continue pulling in uninterrupted inflows, with cumulative demand now exceeding $1 billion since launch — the fastest early adoption pace for any altcoin ETF. Institutional participation remains strong even as retail sentiment remains muted, contributing to market conditions where large players accumulate during weakness while short-term traders hesitate to re-enter. XRP’s macro environment remains dominated by capital rotation into regulated products, with ETF demand offsetting declining open interest in derivatives markets. Technical Analysis The defining moment of the session came during the $2.03 → $2.00 flush when volume spiked to 129.7M — 251% above the 24-hour average. This confirmed heavy selling pressure but, more importantly, marked the exact moment where institutional buyers absorbed liquidity at the psychological floor. The V-shaped rebound from $2.00 back into the $2.07–$2.08 range validates active demand at this level. XRP continues to form a series of higher lows on intraday charts, signaling early trend reacceleration. However, failure to break through the $2.08–$2.11 resistance cluster shows lingering supply overhead as the market awaits a decisive catalyst. Momentum indicators show bullish divergence forming, but volume needs to expand during upside moves rather than only during downside flushes to confirm a sustainable breakout. Price Action Summary XRP traded between $2.00 and $2.08 across the 24-hour window, with a sharp selloff testing the psychological floor before immediate absorption. Three intraday advances toward $2.08 failed to clear resistance, keeping price capped despite improving structure. Consolidation near $2.06–$2.08 into the session close signals stabilization above support, though broader range compression persists. What Traders Should Know The $2.00 level remains the most important line in the sand — both technically and psychologically. Institutional accumulation beneath this threshold hints at larger players…
Share
BitcoinEthereumNews2025/12/08 13:22
SPX6900 Hits the Brakes, While MOBU Hits the Afterburners with its Next 100x Crypto presale, and TRUMP Dips

SPX6900 Hits the Brakes, While MOBU Hits the Afterburners with its Next 100x Crypto presale, and TRUMP Dips

Ever wondered which meme coins could offer the next big breakout in 2025? With altcoins like SPX6900 and Official Trump trending in community chatter, the market is buzzing with potential, yet only a few offer genuine early-stage investment opportunities. Investors who missed previous moonshots are looking for projects that combine novelty, strong community, and robust presale mechanics. Among these, MOBU crypto has emerged as a strong contender for the next 100x crypto presale, thanks to its structured presale mechanics, active community engagement, and impressive early-stage ROI. MOBU Crypto: Next 100x Crypto Presale in Motion MOBU crypto stands out as the next 100x crypto presale with its meticulously structured presale offering and unique investment potential. Stage 6 is live at $0.00008388, boasting over 2,100 token holders and a presale tally surpassing $650K. Joining the presale is simple: connect the official website, choose your currency, and lock in before prices rise again. SPX6900 Hits the Brakes, While MOBU Hits the Afterburners with its Next 100x Crypto presale, and TRUMP Dips 10 Moreover, the 95% APY Staking program gives holders consistent passive returns while maintaining flexibility. Tokens can be staked anytime through the dashboard, with rewards calculated daily and only a two-month lock-in on earnings. With $14.6 billion $MOBU allocated, this system rewards loyalty, encourages long-term participation, and strengthens liquidity, ensuring that all holders, small or large, share in the project’s growth and success. MOBU Crypto Precision Entry: Presale Power Boost The $MOBU presale is designed to maximize early investor rewards through first-come, first-served access. Investors can capitalize on scenarios such as a $200 purchase turning into $14,687.65 or a $300 investment that could reach $22,031.47. The presale mechanics encourage active participation while fostering community growth. SPX6900 (SPX) Shows Strong Weekly Momentum as Investor Interest Rises SPX6900 (SPX) recorded a notable upswing over the past week, reflecting renewed investor interest and increased participation across the meme coin sector. The asset’s recent upward movement showcases improving market sentiment and highlights the growing attention SPX6900 continues to attract within the crypto community. Market performance for SPX6900 also shows substantial activity, with its market capitalization and 24-hour trading volume remaining robust. The project’s fully diluted valuation similarly reflects strong potential should all tokens enter circulation, signaling steady confidence from traders and long-term holders. Official Trump (TRUMP) Faces Weekly Pullback as Market Correction Unfolds Official Trump (Official Trump) experienced a noticeable decline in its weekly performance as market-wide corrections and short-term investor profit-taking contributed to downward pressure. Despite the pullback, the asset continues to remain active within trading circles, supported by consistent engagement from its community. The cryptocurrency maintains substantial market capitalization and daily trading volume, illustrating steady market participation even during corrective phases. Its fully diluted valuation also highlights the long-term potential of the project if all tokens were to circulate, demonstrating ongoing interest from speculators and long-term market observers. SPX6900 Hits the Brakes, While MOBU Hits the Afterburners with its Next 100x Crypto presale, and TRUMP Dips 11 Final Words SPX6900 and Official Trump continue to capture attention through meme-driven community engagement and trending collaborations. Their ongoing growth reflects broader market enthusiasm, yet they lack structured presale benefits like those offered by MOBU crypto. MOBU crypto, with Stage 6 live and over 2,100 token holders, provides a unique opportunity for investors seeking the next 100x crypto presale.  The presale provides first-come, first-served advantages, verified token allocations, and significant ROI potential, making it a must-watch project in the evolving meme coin landscape. SPX6900 Hits the Brakes, While MOBU Hits the Afterburners with its Next 100x Crypto presale, and TRUMP Dips 12 For More Information: Website: Visit the Official MOBU Website  Telegram: Join the MOBU Telegram Channel Twitter: Follow MOBU ON X (Formerly Twitter) Frequently Asked Questions About the Next 100x Crypto Presale What is the 1000x meme coin in 2025? MOBU crypto is considered a strong candidate for high ROI potential, aiming for significant growth in 2025. Which coin is best to invest for 2025? The MOBU crypto presale is currently the next 100x crypto presale, thanks to its early-stage investment benefits. What meme coin has 1000x? Early investors in MOBU crypto presale have the potential for exponential gains as the project progresses to listing. What is the projected ROI for early MOBU crypto investors? Early investors until Stage 6 have achieved a 235.52% ROI with further price surge expected. Are MOBU crypto presale tokens safe? Yes, MOBU crypto tokens are distributed transparently, with audited processes that ensure security. Glossary of Key Terms Meme Coin: A cryptocurrency inspired by internet memes and pop culture.  Presale: An early-stage token sale offering initial access to investors.  ROI: Return on Investment; profit earned from an investment.  Token Holder: An individual or entity owning tokens of a cryptocurrency.  Listing Price: The price at which a cryptocurrency becomes available on exchanges.  First Come, First Served: Allocation strategy prioritizing early participants.  NFT: Non-Fungible Token; a unique digital asset often associated with meme projects. Summary MOBU crypto, SPX6900, and Official Trump offer diverse opportunities in the meme coin space, but MOBU crypto presale Stage 6 presents unmatched early-stage investment potential. With over 2,100 token holders, presale tally exceeding $640K, and ROI already surpassing 235%, MOBU crypto emerges as the next 100x crypto presale. The presale’s first-come, first-served approach creates FOMO-driven urgency, while a transparent token distribution ensures trust and accessibility. Disclaimer This article is for informational purposes only and does not constitute financial advice. Investors should conduct their own research before participating in any cryptocurrency presale or investment. Read More: SPX6900 Hits the Brakes, While MOBU Hits the Afterburners with its Next 100x Crypto presale, and TRUMP Dips">SPX6900 Hits the Brakes, While MOBU Hits the Afterburners with its Next 100x Crypto presale, and TRUMP Dips
Share
Coinstats2025/12/08 11:45