
Chris Williams •
19 Aug 2022
Mapping iOS persistence attack surface using Corellium
Persistence is a tactic used by attackers and jailbreakers1 to maintain a foothold on a device after reboot, and can be a valuable component of an exploit chain. Fundamentally, this requires attacker-controlled data to be processed at some point in...
Technical Writeup

Chris Williams •
07 Jun 2022
Using the Safari Web Inspector with Corellium
Overview In this guide, we'll be setting up a Corellium iOS virtual device to perform debugging of web applications using Safari's Web Inspector tool. For web developers, this is useful for testing rapid tweaks to CSS or troubleshooting responsive...
Technical Writeup

Anthony Ricco •
14 May 2022
Where does mobile app security testing fit into the latest NIST SSDF and CISA Zero Trust publications?
It’s difficult to find technically useful, well contributed information on mobile security testing and mobile software development life cycle (SDLC) best practices. There is a lot of high-level info scattered around, and it seems like new government...
Technical Writeup

Hayden Bleasel •
17 Dec 2021
$25M to accelerate arm testing, research, and development
2021 has been an incredible year for us. Like most of the world, it's been a year of change, hope, and growth. We've proudly welcomed hundreds of new businesses, government agencies, and security community professionals to our virtualization...
Announcement

Amanda Gorton •
05 Apr 2021
Armv9 and Corellium: Why we chose Arm vs X86
In 2021, Arm gave us a glimpse into the future by unveiling the next-generation of Arm processors: the Armv9 architecture. This is a huge deal for the future of mobile devices. The device you’re carrying around in your pocket is almost certainly...
Technical Writeup

Amanda Gorton •
20 Jan 2021
How we ported Linux to the M1
1. Apple special sauce: The M1 Processor When Apple released their desktop products with the M1 processor in November 2020, quite a few people in the tech community were surprised by the excellent performance of these systems. But those who have...
Technical Writeup

Amanda Gorton •
21 Dec 2020
Mobile physical memory security
Physical memory security vs. virtual memory security While developing our mobile hardware models, we've run into a large array of schemes aimed at improving physical memory security. The sheer ingenuity displayed by the engineers in coming up with...
Technical Writeup
Subscribe to stay connected
Stay up to date with the latest news and announcements.