Checking Suspicious Links in Corellium
Ever received a suspicious SMS with a link? In this post, we look at how you can use Corellium to determine whether the link is just spam or something more nefarious.
Using Frida to find hooks in Android applications
Using Frida to find hooks in an Android application
Corellium Open Security Initiative
In honor of Corellium’s fourth birthday, we’re announcing the Corellium Open Security Initiative to support independent public research into the security and privacy of mobile applications and devices.
Setting up a virtual Signal device using Corellium
In this post, we walk through setting up the Signal messaging app on a virtual Android device. This can be helpful if you need to use Signal, but do not wish to share your primary phone number or use your primary device.
How We Ported Linux to the M1
A brief overview of our approach to porting Linux to the Apple Mac Mini M1 and a tutorial for installing our Ubuntu POC
Upcoming Training Opportunities with Corellium
We're very excited to share a schedule of upcoming training events where you can not only learn from the best engineers in the security industry, but also get hands on with Corellium CORSEC Security Platform.
Accessing Kernel and Physical RAM from Userland
Corellium VMs offer user programs running inside the CHARM hypervisor a way to access either kernel or physical views of VM RAM. This allows users to write research tools that do not rely on other -- more complex -- paths to gain that privilege, which is normally reserved to the kernel.
Getting Started with Charles and Corellium
If you’re new to Corellium, you may have questions about using virtual devices with your favorite proxy tools. Today, we wanted to walk you through how easy it is to set up Charles with your virtual Corellium device.
Introducing Camera and Sensors on Android
Virtual Android Devices now support Camera pass-through, GPS, and environment sensors
Introduction to Snapshots
With Corellium's snapshot feature, you can save valuable setup time by instantly returning to a previously saved state or creating clones to run multiple tests from the exact same starting environment.
Armv9 and Corellium: Why we chose Arm vs X86
Last week, Arm gave us a glimpse into the future by unveiling the next-generation of Arm processors: the Armv9 architecture. This is a huge deal for the future of mobile devices, and there are two groups of features in Armv9 that we’re particularly excited about.
Announcing Support for iOS on Individual Cloud Accounts
We’re very excited to announce that virtual iOS-based devices are now available for individual accounts on our groundbreaking security research platform.
Using Root from Apps
A technical overview for using root from Android applications on Corellium virtual devices
Introduction to System Call Tracing with CoreTrace
In this video, we'll show you the basics of using CoreTrace, a powerful tool for holisticly viewing all system calls.
Mobile Physical Memory Security
While developing our mobile hardware models, we've run into a large array of schemes aimed at improving physical memory security.
Getting Started with Corellium and Burp
A quick video demonstrating how to get started using your Corellium virtual device with Burp Suite.
Network Monitor: Easy Traffic Inspection
Get a quick introduction to the basics of using the Corellium Network Monitor to easily inspect device traffic.
Corellium Workshop at ARM DevSummit 2020
In October, Corellium presented an interactive workshop at the ARM DevSummit called “App Unknown: An Introduction to Rapid Security Analysis on ARM.”
A statement from Amanda Gorton, CEO of Corellium, regarding Apple DMCA filing
Apple’s latest filing against Corellium should give all security researchers, app developers, and jailbreakers reason to be concerned.