AVP - An Android Virtual Playground

François Gagnon, Frédéric Lafrance, Simon Frenette, Simon Hallé

2014

Abstract

This paper presents a virtual test-bed for the Android platform named AVP - Android Virtual Playground. The focus of AVP is the automatization of the manipulations required to perform a network experiment, in a very broad sense, involving Android virtual devices. A central objective of AVP is data collection during experiments. Together with describing the different steps of using AVP, from the specification of the experiment to the visualization of the results, the paper presents the current capabilities of AVP.

References

  1. Bellard, F. (2005). Qemu, a fast and portable dynamic translator. In USENIX 2005 Annual Technical Conference, FREENIX Track - Abstract, pages 41-46.
  2. Blasing, T., Batyuk, L., and Schmidt, A.-D. (2010). An android application sandbox system for suspicious software detection. In 5th International Conference on Malicious and Unwanted Software (MALWARE), pages 55-62.
  3. Enck, W., Gilbert, P., Chun, B.-G., Cox, L. P., Jung, J., McDaniel, P., and Sheth, A. N. (2010). Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI).
  4. Gagnon, F., Esfandiari, B., and Dej, T. (2010). Network in a box. In Proceedings of the 2010 International Conference on Data Communication Networking (DCNET'10).
  5. Lockheimer, H. (2012). Android and security. http://googlemobile.blogspot.ca/2012/02/androidand-security.html.
  6. Massicotte, F. and Couture, M. (2011). Blueprints of a lightweight automated experimentation system: a building block towards experimental cyber security. In Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 7811), pages 19-28.
  7. Percoco, N. J. and Schulte, S. (2012). Adventures in bouncerland - failures of automated malware detection within mobile application markets. BlackHat USA.
  8. Watson, J. (2008). Virtualbox: bits and bytes masquerading as machines. Linux Journal, 2008(166).
  9. Yan, L. K. and Yin, H. (2012). Droidscope: seamlessly reconstructing the os and dalvik semantic views for dynamic android malware analysis. In 21st USENIX conference on Security (Security'12), pages 29-44.
Download


Paper Citation


in Harvard Style

Gagnon F., Lafrance F., Frenette S. and Hallé S. (2014). AVP - An Android Virtual Playground . In Proceedings of the 5th International Conference on Data Communication Networking - Volume 1: DCNET, (ICETE 2014) ISBN 978-989-758-042-0, pages 13-20. DOI: 10.5220/0005016500130020


in Bibtex Style

@conference{dcnet14,
author={François Gagnon and Frédéric Lafrance and Simon Frenette and Simon Hallé},
title={AVP - An Android Virtual Playground},
booktitle={Proceedings of the 5th International Conference on Data Communication Networking - Volume 1: DCNET, (ICETE 2014)},
year={2014},
pages={13-20},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005016500130020},
isbn={978-989-758-042-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 5th International Conference on Data Communication Networking - Volume 1: DCNET, (ICETE 2014)
TI - AVP - An Android Virtual Playground
SN - 978-989-758-042-0
AU - Gagnon F.
AU - Lafrance F.
AU - Frenette S.
AU - Hallé S.
PY - 2014
SP - 13
EP - 20
DO - 10.5220/0005016500130020