Steven Smiley
Corellium Researcher

Steven Smiley •
05 Jan 2023
Intro to Android mobile reverse engineering
Reverse engineering Android apps Reverse engineering an Android application typically involves using specialized tools to decompile the applications compiled code and resources into a human-readable form. As we go through this blog post, we will...
Technical Writeup

Steven Smiley •
05 Jan 2023
Intro to iOS mobile reverse engineering
Reverse Engineering iOS AppsiOS applications are distributed as compiled binaries and are not readable by default. To reverse engineer an iOS application, the binary needs to be disassembled into a form that is easier to read and understand. This...
Technical Writeup

Steven Smiley •
30 Nov 2022
Certificate pinning explained
In this blog post, we will look at certificate pinning, how it is implemented for iOS and Android and the associated risks of using this added security control.
Technical Writeup

Steven Smiley •
26 Oct 2022
Exploiting Android local storage with Corellium
Storing data is essential to many mobile applications. What data is being stored? How is the data being stored? How is my data being protected? These are all great questions. In this blog post we are going to demonstrate exploiting local Android...
Technical Writeup

Steven Smiley •
20 Oct 2022
Exploiting iOS local storage with Corellium
Storing data is essential to many mobile applications. What data is being stored? How is the data being stored? How is my data being protected? These are all great questions. In this blog post, we are going to demonstrate how to examine, detect and...
Technical Writeup

Steven Smiley •
07 Oct 2022
Apple signing with Corellium
Introduction — iOS security testing woes Want to sideload your iOS application for mobile security testing? Or do you want to pass your application to QA, dev or third-party teams? Are you struggling with binary signing and consistent errors? This...
Technical Writeup
Subscribe to stay connected
Stay up to date with the latest news and announcements.