Exposing Vulnerabilities on Android Mobile Apps
The eighth installment of our video series “Change What's Possible” features Corellium’s Chief Evangelist Brian Robison discussing reverse engineering tactics on Android mobile applications. Watch the video to see how they find vulnerabilities through decompiling and static code analysis. In the video, they also also test common tools of the trade — including Burp Suite, Frida, and Objection — to prove that vulnerabilities exist in data at rest and data in motion.
Speakers
Chief Evangelist, Brian Robison
Brian has over 25 years of cybersecurity experience, is an accomplished product executive, and is a sought-after speaker at industry events, including RSA, Black Hat, and ISC2 Think Tank. He is currently the VP of Product Marketing & Chief Evangelist at Corellium.
Researcher, Steven Smiley
Steven has over 10 years of mobile penetration testing and mobile AppSec experience. He earned a degree in computer security and investigations from Fleming College and holds two SANS certifications for mobile security and mobile forensics (GMOB & GASF). Before joining the Corellium team, Steven worked as an independent consultant for various companies and pentesting projects.