
Steven Smiley •
05 Jan 2023
Intro to Android mobile reverse engineering
Reverse engineering Android apps Reverse engineering an Android application typically involves using specialized tools to decompile the applications compiled code and resources into a human-readable form. As we go through this blog post, we will...
Technical Writeup

Steven Smiley •
05 Jan 2023
Intro to iOS mobile reverse engineering
Reverse engineering iOS apps iOS applications are distributed as compiled binaries and are not readable by default. To reverse engineer an iOS application, the binary needs to be disassembled into a form that is easier to read and understand. This...
Technical Writeup

Steven Smiley •
30 Nov 2022
Certificate pinning explained
In this blog post, we will look at certificate pinning, how it is implemented for iOS and Android and the associated risks of using this added security control.
Technical Writeup

Amanda Gorton •
21 Nov 2022
How we vet our customers
Recently, our sales team turned down a six-figure deal because we had reason to believe the would-be-customer had ties to actors known for weaponizing iOS exploits to conduct genocide in China.
Announcement

Case Study •
17 Nov 2022
Faster mobile app pentesting with Corellium
How a pentesting team at a large Australian telecom saved time and money using Corellium.
Case Study

Case Study •
17 Nov 2022
Large US telco pentests 3x faster
A leading U.S. telecommunications provider conquered their mobile security testing challenges with the help of Corellium.
Case Study

Steven Smiley •
26 Oct 2022
Exploiting Android local storage with Corellium
Storing data is essential to many mobile applications. What data is being stored? How is the data being stored? How is my data being protected? These are all great questions. In this blog post we are going to demonstrate exploiting local Android...
Technical Writeup

Steven Smiley •
20 Oct 2022
Exploiting iOS local storage with Corellium
Storing data is essential to many mobile applications. What data is being stored? How is the data being stored? How is my data being protected? These are all great questions. In this blog post, we are going to demonstrate how to examine, detect and...
Technical Writeup

Alex Hude •
12 Oct 2022
Behind the scenes: Using Corellium to build Corellium models
Introduction: How to debug code using Corellium Testing Corellium for another release we found out that Xcode is unable to prepare some iOS 15.x virtual devices for development. Moreover, Xcode doesn't return any errors and seems to be just stuck...
Technical Writeup

Steven Smiley •
07 Oct 2022
Apple signing with Corellium
Introduction — iOS security testing woes Want to sideload your iOS application for mobile security testing? Or do you want to pass your application to QA, dev or third-party teams? Are you struggling with binary signing and consistent errors? This...
Technical Writeup

Amanda Gorton •
05 Oct 2022
Corellium partners with Arm to accelerate IoT development and testing
Today, there are almost as many connected IoT devices globally as there are people – over 7 billion. That number is expected to grow to 25.4 billion IoT devices by 2030.
Announcement

Amanda Gorton •
12 Sep 2022
Corellium support for iOS 16
At Corellium, we’re committed to providing the mobile security research and app developer communities the ability to comprehensively test and analyze Apple’s mobile operating systems without having to jailbreak physical devices. To that end, we’re...
Announcement
Subscribe to stay connected
Stay up to date with the latest news and announcements.