The Corellium Resource Library
The latest articles and news on mobile app security testing, IoT and research from Corellium and community contributors.

Steven Smiley •
Nov 30, 2022
Understanding SSL Certificate Pinning: Boost Mobile Security with Corellium
What is SSL certificate pinning and how is it implemented for iOS and Android?

Amanda Gorton •
Nov 21, 2022
How we vet our customers
Corellium: How we vet our customers

Corellium •
Nov 17, 2022
Faster mobile app pentesting with Corellium
How a pentesting team at an Australian telecom saved time and money

Corellium •
Nov 17, 2022
Large US telco pentests 3x faster
A leading U.S. telecommunications provider conquered their mobile security testing challenges with the help of Corellium.

Steven Smiley •
Oct 26, 2022
Exploiting Android local storage with Corellium
How to examine, detect and exploit sensitive information being stored by an Android application

Steven Smiley •
Oct 20, 2022
Exploiting iOS local storage with Corellium
How to examine, detect and exploit sensitive information being stored by an iOS application

Alex Hude •
Oct 12, 2022
Behind the scenes: Using Corellium to build Corellium models
An example of how we used our Corellium platform to debug one of our virtual iPhone models

Steven Smiley •
Oct 07, 2022
Apple signing with Corellium
Fixing Apple Signing Problems with Corellium iOS Virtual Machines

Amanda Gorton •
Oct 05, 2022
Corellium partners with Arm to accelerate IoT development and testing
We are very excited to announce our new partnership and joint technology collaboration with Arm

Chris Williams •
Aug 19, 2022
Mapping iOS persistence attack surface using Corellium
Learn how to create a map of a device’s attack surface to discover vulnerabilities that can be used for maintaining a foothold after reboot.

Chris Williams •
Jun 07, 2022
Using the Safari Web Inspector with Corellium
How to Get Started Debugging JavaScript on your Corellium Device

Anthony Ricco •
May 14, 2022
Where does mobile app security testing fit into the latest NIST SSDF and CISA Zero Trust publications?
It’s hard to find useful, well contributed to information on mobile security testing and best practices. Recent cybersecurity publications from U.S. gov agencies often confuse the search. Here’s one interpretation of how they’re interrelated.
Subscribe to Stay Connected
Keep up to date with emails for the latest product news and technical articles.