Skip to main content

Blueprints of an Automated Android Test-Bed

  • Conference paper
  • First Online:
E-Business and Telecommunications (ICETE 2014)

Abstract

This paper discusses the automation of experiments on the Android platform. The most obvious choice for such a test-bed is virtualization as it provides an easy solution to several challenges, e.g., configuration, automation, clean up. However, virtualization sometimes imposes limitations, for instance, with respect to a realistic environment. Although this paper focusses mainly on our virtual test-bed for Android (named AVP for Android Virtual Playground) it also explores a solution for a physical test-bed. Both test-beds were built with the primary concern of being able to control (as much as possible) the devices participating in the experiment. Moreover, the virtual test-bed provides a wide variety of data collection possibilities while the physical one has a leaner design allowing to perform experiments in a more ad hoc way (with the devices available in a room).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    http://qemu.org

  2. 2.

    https://www.virtualbox.org/

  3. 3.

    http://www.android-x86.org/

  4. 4.

    AVP can be used to automate the experiment flow of TaintDroid.

  5. 5.

    http://www.joesecurity.org

  6. 6.

    http://developer.android.com/tools/help/monkeyrunner_concepts.html

  7. 7.

    Available through the ADT (Android Development Tools) environment.

  8. 8.

    http://www.genymotion.com

  9. 9.

    http://androvm.org

  10. 10.

    From a few seconds to a few minutes depending on the physical machine and the virtualization acceleration.

  11. 11.

    process ID, owner ID, process Name, etc.

  12. 12.

    http://sourceforge.net/projects/strace/

  13. 13.

    The Android logging system: http://developer.android.com/tools/help/logcat.html

  14. 14.

    http://developer.android.com/tools/help/monkey.html

References

  1. Massicotte, F., Couture, M.: Blueprints of a lightweight automated experimentation system: a building block towards experimental cyber security. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2011), pp. 19–28 (2011)

    Google Scholar 

  2. Bellard, F.: QEMU, a fast and portable dynamic translator. In: USENIX 2005 Annual Technical Conference, FREENIX Track - Abstract, pp. 41–46 (2005)

    Google Scholar 

  3. Moth, D.: Microsoft visual studio’s android emulator. http://blogs.msdn.com/b/visualstudioalm/archive/2014/11/12/introducing-visual-studio-s-emulator-for-android.aspx. Accessed 15 December 2014

  4. Watson, J.: Virtualbox: bits and bytes masquerading as machines. Linux J. 2008(166). Belltown Media, Houston, Febraury 2008. ISSN: 1075-3583

    Google Scholar 

  5. Sandia Labs: Sandia builds self-contained, android-based network to study cyber disruptions and help secure hand-held devices. https://share.sandia.gov/news/resources/news_releases/sandia-builds-self-contained-android-based-network-to-study-cyber-disruptions-and-help-secure-hand-held-devices/#.VI9CYSvF-So. Accessed 15 December 2014

  6. Enck, W., Gilbert, P., Chun, B.G., Cox, L.P., Jung, J., McDaniel, P., Sheth, A.N.: Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In: Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI) (2010)

    Google Scholar 

  7. Blasing, T., Batyuk, L., Schmidt, A.D.: An android application sandbox system for suspicious software detection. In: 5th International Conference on Malicious and Unwanted Software (MALWARE), pp. 55–62 (2010)

    Google Scholar 

  8. Yan, L.K., Yin, H.: Droidscope: seamlessly reconstructing the OS and dalvik semantic views for dynamic android malware analysis. In: 21st USENIX Conference on Security (Security 2012), pp. 29–44 (2012)

    Google Scholar 

  9. Lockheimer, H.: Android and security. http://googlemobile.blogspot.ca/2012/02/android-and-security.html. Accessed 15 December 2014

  10. Percoco, N.J., Schulte, S.: Adventures in Bouncerland - Failures of Automated Malware Detection within Mobile Application Markets. BlackHat, USA (2012)

    Google Scholar 

  11. Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6, 151–180 (1998)

    Google Scholar 

  12. Kocialkowski, P.: Replicant developers find and close samsung galaxy backdoor. http://www.androidpolice.com/2014/03/13/security-researcher-dan-rosenberg-calls-bullshit-on-samsung-backdoor-vulnerability-published-by-fsf/. Accessed 15 January 2015

  13. Gagnon, F., Esfandiari, B., Dej, T.: Network in a box. In: Proceedings of the 2010 International Conference on Data Communication Networking (DCNET 2010) (2010)

    Google Scholar 

Download references

Acknowledgements

We would like to thank Thales Canada for their help and support through this project. This work is funded by the National Sciences and Engineering Research Council of Canada through grants RDA1-447989-13 and RDA2-452896-13. We are in the process of releasing AVP as open source, for more information, contact the corresponding author frgagnon@cegep-ste-foy.qc.ca.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to François Gagnon .

Editor information

Editors and Affiliations

Appendices

Appendix A

Table 6. Example scenario file.

Appendix B

Table 7. Supported actions by technology.

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Gagnon, F., Poisson, J., Frenette, S., Lafrance, F., Hallé, S., Michaud, F. (2015). Blueprints of an Automated Android Test-Bed. In: Obaidat, M., Holzinger, A., Filipe, J. (eds) E-Business and Telecommunications. ICETE 2014. Communications in Computer and Information Science, vol 554. Springer, Cham. https://doi.org/10.1007/978-3-319-25915-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25915-4_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25914-7

  • Online ISBN: 978-3-319-25915-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics