WEBINAR

Hunting for Vulnerabilities in iOS Apps

Change What's Possible Webinar Series

On Demand

Change What's Possible
Webinar Series

Virtual Event: “Hunting for Vulnerabilities in iOS Apps”

Join Chief Evangelist Brian Robison, Corellium Researcher Steven Smiley, and guest speaker Robert Ferri as they go deeper into reverse engineering tactics and techniques with iOS mobile applications. Learn some of the tools of the trade in decompiling and static code analysis to hunt for vulnerabilities. Additional live demonstrations included using common tools like Burp Suite, Frida and Objection to prove that the vulnerabilities actually exist.

Date: Available On Demand

Change What's Possible is our ongoing series of events designed for mobile security professionals. During each session, members of the Corellium team will discuss how virtual devices can advance mobile cybersecurity research and testing.

Speakers

Researcher, Steven Smiley

Steven has over ten years of mobile penetration testing and mobile appsec experience. He earned a degree in computer security and investigations from Fleming College and holds two SANS certifications for mobile security and mobile forensics (GMOB & GASF). Before joining the Corellium team, Steven worked as an independent consultant for various companies and pen testing projects.

 

Chief Evangelist, Brian Robison

Brian has over 25 years of cybersecurity experience, is an accomplished product executive, and is a sought-after speaker at industry events, including RSA, Black Hat, and ISC2 Think Tank. He is currently the VP of Product Marketing & Chief Evangelist at Corellium.

 

Mobile Cybersecurity Professional, Robert Ferri 

Robert is a cybersecurity professional with extensive expertise as a penetration tester specializing in web and mobile applications. He’s worked with various organizations across multiple sectors including several Fortune 500 companies. Having a deep understanding of web and mobile architecture allows him to perform detailed systems analysis and ultimately prevent threats from entering sensitive digital environments.

Watch: Hunting for Vulnerabilities in iOS Apps