CEO and Co-Founder at Corellium
Armv9 and Corellium: Why we chose Arm vs X86
Last week, Arm gave us a glimpse into the future by unveiling the next-generation of Arm processors: the Armv9 architecture. This is a huge deal for the future of mobile devices, and there are two groups of features in Armv9 that we’re particularly excited about.
A statement from Amanda Gorton, CEO of Corellium, regarding Apple lawsuit
In an effort, we believe, to stifle innovation and the freedom of mobile developers, Apple has filed a complaint against Corellium, claiming our company infringed on its copyrighted works.
Corellium Workshop at Arm DevSummit 2020
In October, Corellium presented an interactive workshop at the Arm DevSummit called “App Unknown: An Introduction to Rapid Security Analysis on Arm.”
Usage-Based Billing
A quick demo of our usage-based subscription option.
$25M to Accelerate Arm Testing, Research, and Development
We've raised a Series A round with our friends at Paladin and Cisco Investments.
A statement from Amanda Gorton, CEO of Corellium, regarding Apple DMCA filing
Apple’s latest filing against Corellium should give all security researchers, app developers, and jailbreakers reason to be concerned.
Corellium Open Security Initiative
In honor of Corellium’s fourth birthday, we’re announcing the Corellium Open Security Initiative to support independent public research into the security and privacy of mobile applications and devices.
How We Ported Linux to the M1
A brief overview of our approach to porting Linux to the Apple Mac Mini M1 and a tutorial for installing our Ubuntu POC
Announcing Support for iOS on Individual Cloud Accounts
We’re very excited to announce that virtual iOS-based devices are now available for individual accounts on our groundbreaking security research platform.
Announcing the 2021 COSI Award Winner
Today, we're very excited to announce that the winner of the 2021 COSI Award is James Sebree, a Principal Research Engineer at Tenable.
Mobile Physical Memory Security
While developing our mobile hardware models, we've run into a large array of schemes aimed at improving physical memory security.