Technical Articles
Technical notes and news from Corellium and the community.
![Mobile Vulnerabilities Exposed: Data at Rest](https://www.corellium.com/hubfs/Screen%20Shot%202024-05-09%20at%201.04.31%20PM.png)
Steven Smiley & Brian Robison •
May 09, 2024
Mobile Vulnerabilities Exposed: Data at Rest
Learn about exposing mobile app vulnerabilities in data at rest. Watch our expert webinar or read the recap and case study.
![Mobile Vulnerabilities Exposed: Data in Transit](https://www.corellium.com/hubfs/Screen%20Shot%202024-04-30%20at%202.26.38%20PM.png)
Steven Smiley & Brian Robison •
Apr 30, 2024
Mobile Vulnerabilities Exposed: Data in Transit
Learn how to capture network traffic and protect data in transit. Watch our expert webinar or read the recap and case study.
![Deep Dive into Experimenting with Messaging App Vulnerabilities](https://www.corellium.com/hubfs/iStock-1365668283.jpg)
Corellium •
Apr 26, 2024
Deep Dive into Experimenting with Messaging App Vulnerabilities
Marco Chomut of TFP0 Labs dives deep into mobile app testing for messaging app vulnerabilities in our latest webinar. Watch today.
![Introducing MicroSnapshots - Leveraging copy-on-write memory](https://www.corellium.com/hubfs/blog%20thumbnails/MicroSnapshots%20Blog%20Thumbnail.png)
Chris Williams •
Feb 29, 2024
Introducing MicroSnapshots - Leveraging copy-on-write memory
Join Corellium for a demo showcasing our MicroSnapshots feature, designed for rapid restoration of a virtual machine's state, ideal for snapshot fuzzing.
![Defeating debug protections with Corellium](https://www.corellium.com/hubfs/email/CORE_email_phone_breakdown.png)
Tyler Sams •
Feb 16, 2024
Defeating debug protections with Corellium
Make iOS app debugging easier with a new technique that expedites analysis and bypasses slowdown attempts. Say goodbye to frustrations.
![Corellium with AI](https://www.corellium.com/hubfs/iStock-1456739978.jpg)
David Manouchehri •
Feb 09, 2024
Corellium with AI
Automate Complex Tasks by Giving GPT-4 Control over Corellium’s API.
![Corellium CoreSight Tracing Demo](https://www.corellium.com/hubfs/CoreSight%20Tracing.png)
Chris Williams •
Feb 05, 2024
Corellium CoreSight Tracing Demo
Join Corellium for a CoreSight Tracing demo. Explore capabilities that provide insightful analysis on program flow/coverage, system calls, and more for user space processes.
![Understanding Terraform and Corellium: A Perfect Match for Virtual Device Management](https://www.corellium.com/hubfs/Understanding%20Terraform%20and%20Corellium-1.png)
Dan Thagard •
Dec 20, 2023
Understanding Terraform and Corellium: A Perfect Match for Virtual Device Management
Discover how combining Corellium with the power and flexibility of Terraform can streamline virtual device management for development and testing teams.
![Using Corellium Kernel Hooks to Disable Exploit Mitigations](https://www.corellium.com/hubfs/zone_require_panic.png)
Chris Williams •
Nov 06, 2023
Using Corellium Kernel Hooks to Disable Exploit Mitigations
In this technical article, we'll take a look at a vulnerability in XNU, the kernel used by iOS and macOS, and explore how Corellium kernel hooks can help to disable exploit mitigations.
![Exploring UNIX pipes for iOS kernel exploit primitives](https://www.corellium.com/hubfs/Exploring%20UNIX%20image%203.png)
Chris Williams •
Nov 06, 2023
Exploring UNIX pipes for iOS kernel exploit primitives
Explore the use of UNIX pipes for iOS kernel exploit primitives in this insightful technical article. Learn how Corellium's magic can be used to practice and develop exploits without relying on vulnerabilities.
![iOS Reverse Engineering Tactics and Techniques in Practice](https://www.corellium.com/hubfs/Corellium%20iOS%20Reverse%20Engineering.jpg)
Corellium •
Nov 01, 2023
iOS Reverse Engineering Tactics and Techniques in Practice
Dive into iOS reverse engineering tools and techniques with experts from Corellium. Discover techniques, live demonstrations, and insights for mobile app security.
![Mobile Malware and Threat Research Without Limits](https://www.corellium.com/hubfs/Corellium%20Platform.jpg)
Brian Robison •
Oct 30, 2023
Mobile Malware and Threat Research Without Limits
In this article, we look at several types of mobile malware — of increasing sophistication — and discuss opportunities for research and analysis using virtual devices.
Subscribe to Stay Connected
Keep up to date with emails for the latest product news and technical articles.