
Hayden Bleasel •
13 Mar 2023
A brief look at the new Corellium
As Corellium evolves into the defacto solution for Mobile Security Research and expands its reach globally, we’ve been giving a lot of thought as to the direction and impact of our brand — what we value, how we perceive ourselves and how others...
Announcement

David Manouchehri •
10 Mar 2023
Creating a Safe Browsing, Serverless API to scan iOS apps with Corellium & Frida on AWS Lambda
The Challenge You're checking your messages in the morning, and your new friend James Willy has sent you a link to a cool new iOS app he's developed. While you'd like to give feedback, the last Visual Studio project he sent you didn't load properly,...
Technical Writeup

Steven Smiley •
05 Jan 2023
Intro to Android mobile reverse engineering
Reverse engineering Android apps Reverse engineering an Android application typically involves using specialized tools to decompile the applications compiled code and resources into a human-readable form. As we go through this blog post, we will...
Technical Writeup

Steven Smiley •
05 Jan 2023
Intro to iOS mobile reverse engineering
Reverse Engineering iOS AppsiOS applications are distributed as compiled binaries and are not readable by default. To reverse engineer an iOS application, the binary needs to be disassembled into a form that is easier to read and understand. This...
Technical Writeup

Steven Smiley •
30 Nov 2022
Certificate pinning explained
In this blog post, we will look at certificate pinning, how it is implemented for iOS and Android and the associated risks of using this added security control.
Technical Writeup

Amanda Gorton •
21 Nov 2022
How we vet our customers
Recently, our sales team turned down a six-figure deal because we had reason to believe the would-be-customer had ties to actors known for weaponizing iOS exploits to conduct genocide in China.
Announcement

Case Study •
17 Nov 2022
Faster mobile app pentesting with Corellium
How a pentesting team at a large Australian telecom saved time and money using Corellium.
Case Study

Case Study •
17 Nov 2022
Large US telco pentests 3x faster
A leading U.S. telecommunications provider conquered their mobile security testing challenges with the help of Corellium.
Case Study

Steven Smiley •
26 Oct 2022
Exploiting Android local storage with Corellium
Storing data is essential to many mobile applications. What data is being stored? How is the data being stored? How is my data being protected? These are all great questions. In this blog post we are going to demonstrate exploiting local Android...
Technical Writeup

Steven Smiley •
20 Oct 2022
Exploiting iOS local storage with Corellium
Storing data is essential to many mobile applications. What data is being stored? How is the data being stored? How is my data being protected? These are all great questions. In this blog post, we are going to demonstrate how to examine, detect and...
Technical Writeup

Alex Hude •
12 Oct 2022
Behind the scenes: Using Corellium to build Corellium models
Introduction: How to debug code using Corellium Testing Corellium for another release we found out that Xcode is unable to prepare some iOS 15.x virtual devices for development. Moreover, Xcode doesn't return any errors and seems to be just stuck...
Technical Writeup

Steven Smiley •
07 Oct 2022
Apple signing with Corellium
Introduction — iOS security testing woes Want to sideload your iOS application for mobile security testing? Or do you want to pass your application to QA, dev or third-party teams? Are you struggling with binary signing and consistent errors? This...
Technical Writeup
Subscribe to stay connected
Stay up to date with the latest news and announcements.