Technical Articles
The latest technical articles and news on mobile app security testing, IoT and research from Corellium and community contributors.

Brian Robison •
Oct 30, 2023
Mobile Malware and Threat Research Without Limits
In this article, we look at several types of mobile malware — of increasing sophistication — and discuss opportunities for research and analysis using virtual devices.

Brian Robison •
Sep 14, 2023
Deep Dive into Reverse Engineering on Android
Learn the tools and tactics needed to optimize your approach to Android reverse engineering. Watch our expert webinar or read the recap and case study.

Rob Ferri •
Sep 07, 2023
Brute Forcing PINs with Frida: Mobile Penetration Testing
Walk through mobile penetration testing on a 2FA application that resulted in the creation of a Frida script to brute force hardcoded values.

David Manouchehri •
Aug 28, 2023
Taking Off with Golang: An Introduction to the Corellium API Bindings for Go
Corellium simulated changing the accelerometer of an iPhone using Corellium API bindings for Golang, an example of simulating the real world with Corellium and Golang for iOS.

Anthony Ricco •
Aug 23, 2023
Building What's Next: The Future of R&D for Mobile, IoT, and Beyond
The mobile and IoT attack surface is expanding but today’s software R&D and testing tools can’t keep pace. Device virtualization, however, is redefining the future.

Anthony Ricco •
Aug 22, 2023
Next-Gen Devices Require Next-Gen R&D: Reinventing IoT Device Development
IoT device development, where time-to-market and security concerns lie in opposition, needs reinventing. Learn why virtualization from Corellium is the solution for next-gen R&D.

Steven Smiley •
Aug 11, 2023
Finding Hooks in Android Applications: Tools for Security Research
Understand how hooking is used by bad actors, how hooking relates to mobile security research, and how you can use tools like Frida for security research.

Brian Robison •
Aug 02, 2023
Testing Third-Party iOS Apps: Why Independent Investigative Research Is Crucial
Testing third-party iOS apps helps you identify unknown vulnerabilities. Learn more about how Corellium can help revolutionize your AppSec testing.

Steven Smiley •
Jul 26, 2023
Boolean-Based iOS Jailbreak Detection Bypass with Frida- Corellium
See how to set up Corellium's virtualized device environment, examining DVIA-2 classes, and implementing changes to bypass iOS jailbreak detection.

Brian Robison •
Jun 27, 2023
Investigating iOS Phishing Using Virtualization Technology
By taking advantage of virtualization technology, security engineers can actively engage with iPhone phishing scams directly from a virtual iOS device. Here’s how.

Brian Robison •
Jun 09, 2023
Mastering Mobile Malware Detection: Essential Tools, Tactics, and Research Procedures
Discover how Corellium’s advanced mobile malware detection tools enable threat researchers to streamline testing, analyze threats & strengthen mobile security.

Brian Robison •
Jun 08, 2023
Mobile App Reverse Engineering: Tools, Tactics, and Procedures Unveiled
Learn about the tools, tactics, and procedures employed in reverse engineering iOS and Android apps, including an overview of the process and responsible practices.
Subscribe to Stay Connected
Keep up to date with emails for the latest product news and technical articles.