Technical Articles
Technical notes and news from Corellium and the community.
Steven Smiley •
Jan 05, 2023
Intro to iOS mobile reverse engineering
A look at the tools, applications and analysis used to reverse engineer iOS applications
Steven Smiley •
Nov 30, 2022
Decoding SSL Pinning: An In-Depth Analysis with Corellium
What is SSL certificate pinning and how is it implemented for iOS and Android?
Steven Smiley •
Oct 26, 2022
Exploiting Android local storage with Corellium
How to examine, detect and exploit sensitive information being stored by an Android application
Steven Smiley •
Oct 20, 2022
Exploiting iOS local storage with Corellium
How to examine, detect and exploit sensitive information being stored by an iOS application
Alex Hude •
Oct 12, 2022
Behind the scenes: Using Corellium to build Corellium models
An example of how we used our Corellium platform to debug one of our virtual iPhone models
Steven Smiley •
Oct 07, 2022
Apple signing with Corellium
Fixing Apple Signing Problems with Corellium iOS Virtual Machines
Chris Williams •
Aug 19, 2022
Mapping iOS persistence attack surface using Corellium
Learn how to create a map of a device’s attack surface to discover vulnerabilities that can be used for maintaining a foothold after reboot.
Chris Williams •
Jun 07, 2022
Using the Safari Web Inspector with Corellium
How to Get Started Debugging JavaScript on your Corellium Device
Anthony Ricco •
May 14, 2022
Where does mobile app security testing fit into the latest NIST SSDF and CISA Zero Trust publications?
It’s hard to find useful, well contributed to information on mobile security testing and best practices. Recent cybersecurity publications from U.S. gov agencies often confuse the search. Here’s one interpretation of how they’re interrelated.
Amanda Gorton •
Apr 05, 2021
Armv9 and Corellium: Why we chose Arm vs X86- Corellium
Exploring the features that have us most excited with the release of the Armv9 Architecture
Amanda Gorton •
Jan 20, 2021
How we ported Linux to the M1
A brief overview of our approach to porting Linux to the Apple Mac Mini M1 and a tutorial for installing our Ubuntu POC
Amanda Gorton •
Dec 21, 2020
Mobile physical memory security
While developing our mobile hardware models, we've run into a large array of schemes aimed at improving physical memory security.
Subscribe to Stay Connected
Keep up to date with emails for the latest product news and technical articles.