Technical Articles
Technical notes and news from Corellium and the community.
![Deep Dive into Reverse Engineering on Android](https://www.corellium.com/hubfs/iStock-1409498426%20%281%29.jpg)
Brian Robison •
Sep 14, 2023
Deep Dive into Reverse Engineering on Android
Learn the tools and tactics needed to optimize your approach to Android reverse engineering. Watch our expert webinar or read the recap and case study.
![Brute Forcing PINs with Frida: Mobile Penetration Testing](https://www.corellium.com/hubfs/iStock-1473148021.jpg)
Rob Ferri •
Sep 07, 2023
Brute Forcing PINs with Frida: Mobile Penetration Testing
Walk through mobile penetration testing on a 2FA application that resulted in the creation of a Frida script to brute force hardcoded values.
![Taking Off with Golang: An Introduction to the Corellium API Bindings for Go](https://www.corellium.com/hubfs/Untitled_Artwork.png)
David Manouchehri •
Aug 28, 2023
Taking Off with Golang: An Introduction to the Corellium API Bindings for Go
We simulated changing the accelerometer of an iPhone using Corellium API bindings for Golang, an example of simulating the real world with Corellium and Golang for iOS.
![Building What's Next: The Future of R&D for Mobile, IoT, and Beyond](https://www.corellium.com/hubfs/iStock-1390456645%20%281%29.jpg)
Anthony Ricco •
Aug 23, 2023
Building What's Next: The Future of R&D for Mobile, IoT, and Beyond
The mobile and IoT attack surface is expanding but today’s software R&D and testing tools can’t keep pace. Device virtualization, however, is redefining the future.
![Next-Gen Devices Require Next-Gen R&D: Reinventing IoT Device Development](https://www.corellium.com/hubfs/Corellium-Welcome_Email_Nurture_Header_Email_3_v1.png)
Anthony Ricco •
Aug 22, 2023
Next-Gen Devices Require Next-Gen R&D: Reinventing IoT Device Development
IoT device development, where time-to-market and security concerns lie in opposition, needs reinventing. Learn why virtualization from Corellium is the solution for next-gen R&D.
![Finding Hooks in Android Applications: Tools for Security Research](https://www.corellium.com/hubfs/Corellium%20Frida%20Hooks.jpg)
Steven Smiley •
Aug 11, 2023
Finding Hooks in Android Applications: Tools for Security Research
Understand how hooking is used by bad actors, how hooking relates to mobile security research, and how you can use tools like Frida for security research.
![Testing Third-Party iOS Apps: Why Independent Investigative Research Is Crucial](https://www.corellium.com/hubfs/Corellium%20Testing%20iOS%20Apps.jpg)
Steven Smiley •
Aug 02, 2023
Testing Third-Party iOS Apps: Why Independent Investigative Research Is Crucial
Forward-looking security researchers are using virtualization for iOS app testing, getting ahead of criminals and identifying vulnerabilities before they cause harm.
![Boolean-Based iOS Jailbreak Detection Bypass with Frida- Corellium](https://www.corellium.com/hubfs/Corellium%20Jailbreak%20Bypass.jpg)
Steven Smiley •
Jul 26, 2023
Boolean-Based iOS Jailbreak Detection Bypass with Frida- Corellium
See how to set up Corellium's virtualized device environment, examining DVIA-2 classes, and implementing changes to bypass iOS jailbreak detection.
![Investigating iOS Phishing Using Virtualization Technology](https://www.corellium.com/hubfs/iStock-1271067395%20%281%29.jpg)
Brian Robison •
Jun 27, 2023
Investigating iOS Phishing Using Virtualization Technology
By taking advantage of virtualization technology, security engineers can actively engage with iPhone phishing scams directly from a virtual iOS device. Here’s how.
![Unveiling the World of Mobile Malware and Threat Research: Tools, Tactics, and Procedures](https://www.corellium.com/hubfs/iStock-484638160.jpg)
Brian Robison •
Jun 09, 2023
Unveiling the World of Mobile Malware and Threat Research: Tools, Tactics, and Procedures
Mobile malware detection is challenging, but with the right combination of tools, tactics, and procedures, threat researchers can conduct mobile malware testing.
![Mobile App Reverse Engineering: Tools, Tactics, and Procedures Unveiled](https://www.corellium.com/hubfs/iStock-1180208306.jpg)
Brian Robison •
Jun 08, 2023
Mobile App Reverse Engineering: Tools, Tactics, and Procedures Unveiled
Learn about the tools, tactics, and procedures employed in reverse engineering iOS and Android apps, including an overview of the process and responsible practices.
![iOS Database Storage with Corellium](https://www.corellium.com/hubfs/theme-2023/images/Corellium_MobileAppDevOps_v1.png)
Steven Smiley •
May 26, 2023
iOS Database Storage with Corellium
When conducting a mobile app security assessment, testing iOS database storage is critical. Learn how to test iOS app data storage in the DVIA-2 application.
Subscribe to Stay Connected
Keep up to date with emails for the latest product news and technical articles.