Technical Articles
The latest technical articles and news on mobile app security testing, IoT and research from Corellium and community contributors.

David Manouchehri •
Aug 28, 2023
Taking Off with Golang: An Introduction to the Corellium API Bindings for Go
Corellium simulated changing the accelerometer of an iPhone using Corellium API bindings for Golang, an example of simulating the real world with Corellium and Golang for iOS.

Anthony Ricco •
Aug 23, 2023
Building What's Next: The Future of R&D for Mobile, IoT, and Beyond
The mobile and IoT attack surface is expanding but today’s software R&D and testing tools can’t keep pace. Device virtualization, however, is redefining the future.

Anthony Ricco •
Aug 22, 2023
Next-Gen Devices Require Next-Gen R&D: Reinventing IoT Device Development
IoT device development, where time-to-market and security concerns lie in opposition, needs reinventing. Learn why virtualization from Corellium is the solution for next-gen R&D.

Steven Smiley •
Aug 11, 2023
Finding Hooks in Android Applications: Tools for Security Research
Understand how hooking is used by bad actors, how hooking relates to mobile security research, and how you can use tools like Frida for security research.

Brian Robison •
Aug 02, 2023
Testing Third-Party iOS Apps: Why Independent Investigative Research Is Crucial
Testing third-party iOS apps helps you identify unknown vulnerabilities. Learn more about how Corellium can help revolutionize your AppSec testing.

Steven Smiley •
Jul 26, 2023
Boolean-Based iOS Jailbreak Detection Bypass with Frida- Corellium
See how to set up Corellium's virtualized device environment, examining DVIA-2 classes, and implementing changes to bypass iOS jailbreak detection.

Brian Robison •
Jun 27, 2023
Investigating iOS Phishing Using Virtualization Technology
By taking advantage of virtualization technology, security engineers can actively engage with iPhone phishing scams directly from a virtual iOS device. Here’s how.

Brian Robison •
Jun 09, 2023
Mastering Mobile Malware Detection: Essential Tools, Tactics, and Research Procedures
Discover how Corellium’s advanced mobile malware detection tools enable threat researchers to streamline testing, analyze threats & strengthen mobile security.

Brian Robison •
Jun 08, 2023
Mobile App Reverse Engineering: Tools, Tactics, and Procedures Unveiled
Learn about the tools, tactics, and procedures employed in reverse engineering iOS and Android apps, including an overview of the process and responsible practices.

Steven Smiley •
May 26, 2023
iOS Database Storage with Corellium
When conducting a mobile app security assessment, testing iOS database storage is critical. Learn how to test iOS app data storage in the DVIA-2 application.

David Manouchehri •
May 05, 2023
Routing Real SMS Messages from Twilio to Corellium via Cloudflare Workers
Learn how to use Corellium, Cloudflare workers, and Twilio to build an SMS handling system for mobile security purposes. Code samples and screenshots are included.

David Manouchehri •
May 03, 2023
Leveraging Corellium and Cloudflare Workers for iOS Virtual Device Management
The need for quality iOS emulators continues to rise. Learn how to use Corellium with Cloudflare workers to make iOS virtual device management simple and scalable.
Subscribe to Stay Connected
Keep up to date with emails for the latest product news and technical articles.