Mobile Vulnerabilities Exposed: Change What's Possible in Mobile App Security Testing
Apr 04, 2023

Mobile Vulnerabilities Exposed: Change What's Possible in Mobile App Security Testing

Physical devices are tedious to manage and device emulation is insufficient. Learn a better way to conduct mobile app security testing with Arm virtualization.
Creating a Safe Browsing, Serverless API to scan iOS apps with Corellium & Frida on AWS Lambda
Mar 10, 2023

Creating a Safe Browsing, Serverless API to scan iOS apps with Corellium & Frida on AWS Lambda

Learn how to create a serverless Safe Browsing API that actually works for iOS apps to scan for security issues using Corellium, Python, and Frida on AWS Lambda.
Intro to iOS mobile reverse engineering
Jan 05, 2023

Intro to iOS mobile reverse engineering

Learn how to reverse engineer an app: tools, applications, and analysis for dissecting iOS applications effectively.
Understanding SSL Certificate Pinning: Boost Mobile Security with Corellium
Nov 30, 2022

Understanding SSL Certificate Pinning: Boost Mobile Security with Corellium

What is SSL certificate pinning and how is it implemented for iOS and Android?
Exploiting Android local storage with Corellium
Oct 26, 2022

Exploiting Android local storage with Corellium

How to examine, detect and exploit sensitive information being stored by an Android application
Exploiting iOS local storage with Corellium
Oct 20, 2022

Exploiting iOS local storage with Corellium

How to examine, detect and exploit sensitive information being stored by an iOS application
Behind the scenes: Using Corellium to build Corellium models
Oct 12, 2022

Behind the scenes: Using Corellium to build Corellium models

An example of how we used our Corellium platform to debug one of our virtual iPhone models
Apple signing with Corellium
Oct 07, 2022

Apple signing with Corellium

Fixing Apple Signing Problems with Corellium iOS Virtual Machines
Mapping iOS persistence attack surface using Corellium
Aug 19, 2022

Mapping iOS persistence attack surface using Corellium

Learn how to create a map of a device’s attack surface to discover vulnerabilities that can be used for maintaining a foothold after reboot.
Where does mobile app security testing fit into the latest NIST SSDF and CISA Zero Trust publications?
May 14, 2022

Where does mobile app security testing fit into the latest NIST SSDF and CISA Zero Trust publications?

It’s hard to find useful, well contributed to information on mobile security testing and best practices. Recent cybersecurity publications from U.S. gov agencies often confuse the search. Here’s one interpretation of how they’re interrelated.
Why Corellium Chose Arm Over x86: The Power of Armv9 Virtualization
Apr 05, 2021

Why Corellium Chose Arm Over x86: The Power of Armv9 Virtualization

Exploring the features that have us most excited with the release of the Armv9 Architecture.
How we ported Linux to the M1
Jan 20, 2021

How we ported Linux to the M1

A brief overview of our approach to porting Linux to the Apple Mac Mini M1 and a tutorial for installing our Ubuntu POC