Certificate Pinning Explained
In this blog post, we will look at certificate pinning, how it is implemented for iOS and Android and the associated risks of using this added security control.
How We Vet Our Customers
Recently, our sales team turned down a six-figure deal because we had reason to believe the would-be-customer had ties to actors known for weaponizing iOS exploits to conduct genocide in China.
Faster Mobile App Pentesting with Corellium
How a pentesting team at a large Australian telecom saved time and money using Corellium.
Large US Telco Pentests 3x Faster
A leading U.S. telecommunications provider conquered their mobile security testing challenges with the help of Corellium.
Exploiting Android Local Storage with Corellium
Storing data is essential to many mobile applications. What data is being stored? How is the data being stored? How is my data being protected? These are all great questions. In this blog post we are going to demonstrate exploiting local Android...
Exploiting iOS Local Storage with Corellium
Storing data is essential to many mobile applications. What data is being stored? How is the data being stored? How is my data being protected? These are all great questions. In this blog post, we are going to demonstrate how to examine, detect and...
Behind the Scenes: Using Corellium to Build Corellium Models
Introduction: How to Debug Code Using Corellium Testing Corellium for another release we found out that Xcode is unable to prepare some iOS 15.x virtual devices for development. Moreover, Xcode doesn't return any errors and seems to be just stuck...
Apple Signing with Corellium
Introduction — iOS Security Testing Woes Want to sideload your iOS application for mobile security testing? Or do you want to pass your application to QA, dev or third-party teams? Are you struggling with binary signing and consistent errors? This...
Corellium Partners with Arm to Accelerate IoT Development and Testing
Today, there are almost as many connected IoT devices globally as there are people – over 7 billion. That number is expected to grow to 25.4 billion IoT devices by 2030.
Corellium Support for iOS 16
At Corellium, we’re committed to providing the mobile security research and app developer communities the ability to comprehensively test and analyze Apple’s mobile operating systems without having to jailbreak physical devices. To that end, we’re...
Mapping iOS Persistence Attack Surface using Corellium
Persistence is a tactic used by attackers and jailbreakers1 to maintain a foothold on a device after reboot, and can be a valuable component of an exploit chain. Fundamentally, this requires attacker-controlled data to be processed at some point in...
Using the Safari Web Inspector with Corellium
Overview In this guide, we'll be setting up a Corellium iOS virtual device to perform debugging of web applications using Safari's Web Inspector tool. For web developers, this is useful for testing rapid tweaks to CSS or troubleshooting responsive...