News & Tech Notes
News and technical information from Corellium and the community.

Brian Robison •
Sep 14, 2023
Deep Dive into Reverse Engineering on Android
Learn the tools and tactics needed to optimize your approach to Android reverse engineering. Watch our expert webinar or read the recap and case study.

Rob Ferri •
Sep 07, 2023
Brute Forcing PINs with Frida: Mobile Penetration Testing
Walk through a mobile penetration test on a 2FA application that resulted in the creation of a Frida script to brute force hardcoded values.

David Manouchehri •
Aug 28, 2023
Taking Off with Golang: An Introduction to the Corellium API Bindings for Go
We simulated changing the accelerometer of an iPhone using Corellium API bindings for Golang, an example of simulating the real world with Corellium and Golang for iOS.

Anthony Ricco •
Aug 23, 2023
Building What's Next: The Future of R&D for Mobile, IoT, and Beyond
The mobile and IoT attack surface is expanding but today’s software R&D and testing tools can’t keep pace. Device virtualization, however, is redefining the future.

Anthony Ricco •
Aug 22, 2023
Next-Gen Devices Require Next-Gen R&D: Reinventing IoT Device Development
IoT device development, where time-to-market and security concerns lie in opposition, needs reinventing. Learn why virtualization is the solution for next-gen R&D.

Corellium •
Aug 14, 2023
The Power of Virtualization in the Fight Against Mobile Based Malware Threats
Unveiling the future of mobile security: Corellium CEO's insights on battling mobile device malware threats.

Steven Smiley •
Aug 11, 2023
Finding Hooks in Android Applications: Tools for Security Research
Understand how hooking is used by bad actors, how hooking relates to mobile security research, and how you can use tools like Frida for security research.

Steven Smiley •
Aug 02, 2023
Testing Third-Party iOS Apps: Why Independent Investigative Research Is Crucial
Forward-looking security researchers are using virtualization for iOS app testing, getting ahead of criminals and identifying vulnerabilities before they cause harm.

Steven Smiley •
Jul 26, 2023
Boolean-Based iOS Jailbreak Detection Bypass with Frida
Walk through the process of setting up Corellium's virtualized device environment, examining DVIA-2 classes, and implementing changes to bypass jailbreak detection.

Brian Robison •
Jun 27, 2023
Investigating iOS Phishing Using Virtualization Technology
By taking advantage of virtualization technology, security engineers can actively engage with iPhone phishing scams directly from a virtual iOS device. Here’s how.

Corellium •
Jun 13, 2023
Major Cybersecurity Services Firm Works with Corellium
Big business and governments rely on this global cybersecurity services firm, and this firm relies on Corellium.

Brian Robison •
Jun 09, 2023
Unveiling the World of Mobile Malware and Threat Research: Tools, Tactics, and Procedures
Mobile malware detection is challenging, but with the right combination of tools, tactics, and procedures, threat researchers can conduct mobile malware testing.