REcon
June 3 - 5

REcon

REcon is a computer security conference held annually in Montreal, Canada. It offers a single track of presentations over the span of three days with a focus on reverse engineering and advanced exploitation techniques.
BSides Buffalo
June 3, 2023

BSides Buffalo

BSides Buffalo is an Information Technology Security Conference taking place at Canisius College. Come explore our Virtual Hardware Platform on June 3rd!
Hunting for Vulnerabilities in iOS Apps
Virtual | June 21, 2023 | 10am EST

Hunting for Vulnerabilities in iOS Apps

Join Chief Evangelist Brian Robison, Corellium Researcher Steven Smiley, and guest speaker Robert Ferri as they go deeper into reverse engineering tactics and techniques with iOS mobile applications. Learn some of the tools of the trade in decompiling and static code analysis to hunt for vulnerabilities. Additional live demonstrations will include using common tools like Burp Suite, Frida and Objection to prove that the vulnerabilities actually exist.
Black Hat 2023
August 9 - 10, 2023

Black Hat 2023

Join us at Black Hat to discover the latest trends shaping cybersecurity and network with industry experts. Meet us at the Mandalay Bay Convention Center in Las Vegas to explore our Virtual Hardware Platform!
Corellium 101: Mobile AppSec Testing with Arm Virtualization
On Demand

Corellium 101: Mobile AppSec Testing with Arm Virtualization

In Corellium's webinar series Change What's Possible Episode 1, VP of Product Marketing, Brian Robison will discuss the current limitations to mobile security testing and how Corellium addresses them. The discussion includes live demos of how the Corellium Virtual Hardware platform handles malware research, app pen testing, and OS vulnerability research.
Mobile Vulnerabilities Exposed: Data at Rest
On Demand

Mobile Vulnerabilities Exposed: Data at Rest

In the second installment of our Change What’s Possible webinar series, "Mobile Vulnerabilities Exposed: Data at Rest," our host, VP of Product Marketing, Brian Robison, and Corellium Researcher, Steven Smiley, will discuss where mobile app data is stored on iOS and Android devices, how easily it can be exploited, and the tools you need to avoid these risks.
Mobile Vulnerabilities Exposed: Data in Transit
On Demand

Mobile Vulnerabilities Exposed: Data in Transit

In the third installment of our Change What’s Possible webinar series, "Mobile Vulnerabilities Exposed: Data inTransit," VP of Product Marketing, Brian Robison, discussed how to capture network traffic and analyze data in transit.
Mobile App Pen-Testing Training
Virtual

Mobile App Pen-Testing Training

This highly interactive and engaging course is designed to give an overview of how to use the Corellium platform to perform mobile app penetration testing on virtual iOS and Android devices.
iOS Vulnerability Research Training
Virtual

iOS Vulnerability Research Training

This course provides an overview of using the Corellium Virtual Hardware platform with Apple iOS virtual devices. Get first-hand experience with common tactics and techniques for discovering vulnerabilities and investigating exploits.
Corellium Quickstart - FREE!
Monthly | 10am - 12pm EST

Corellium Quickstart - FREE!

Corellium Quickstart is a live, monthly webinar with an open question and answer format. Learn how to use our virtual hardware platform for mobile vulnerability research and app penetration testing. Click "register" to see dates offered.
Mobile Vulnerabilities Exposed: Reverse Engineering
On Demand

Mobile Vulnerabilities Exposed: Reverse Engineering

In this installment of our Change What’s Possible webinar series, our host, VP of Product Marketing, Brian Robison, and guest speaker Corellium Researcher, Steven Smiley, discuss the most effective ways to find system vulnerabilities on iOS and Android devices through mobile app reverse engineering and static binary analysis.
Mobile Vulnerabilities Exposed: Getting Our Hands Dirty
On Demand

Mobile Vulnerabilities Exposed: Getting Our Hands Dirty

In our final episode on mobile application penetration testing, Corellium Researcher Steven Smiley and Chief Evangelist Brian Robison put together many of the tactics from the previous 4 webinars, using mobile app pen testing techniques from earlier episodes in a new mobile app – Corellium Cafe.
Mobile Vulnerabilities Exposed: Getting Our Hands Dirty Part 2
On Demand

Mobile Vulnerabilities Exposed: Getting Our Hands Dirty Part 2

In Part 1 of “Mobile Vulnerabilities Exposed: Getting Our Hands Dirty”, we explored the new Corellium Café mobile app on Android. In Part 2, Steven Smiley (Corellium Researcher) and Brian Robison (Chief Evangelist) explored the iOS version of Corellium Café, looking for vulnerabilities in this version of the app. We used the techniques and tactics that were introduced in our app pen testing series to find vulnerabilities in data at rest and data in motion, and use reverse engineering to give us some hints.
Mobile Malware & Threat Research Without Limits
On Demand

Mobile Malware & Threat Research Without Limits

In this webinar, we showed how Corellium’s virtualization platform removes the limitations of using physical devices to perform dynamic analysis on mobile malware, and makes it much safer and more efficient than ever before. We played with live ransomware, spyware, and other types of information-stealers. Then, we examined their effects on devices, while gathering indicators of compromise that we can use to defend our environment. We saw live command and control (C2) communication, as well as malware that destroys user data.
Deep Dive into Reverse Engineering on Android
On Demand

Deep Dive into Reverse Engineering on Android

In our latest webinar, Brian Robison (Chief Evangelist) and Steven Smiley (Corellium Researcher) discussed reverse engineering tactics on Android mobile applications. Together, they demonstrated how to find vulnerabilities through decompiling and static code analysis. They also tested common tools of the trade — including Burp Suite, Frida, and Objection — to prove that vulnerabilities exist in data at rest and data in motion.