Webinars & Events
Join us at online and in-person events around the world.
Webinar •
On Demand
Using Corellium Virtual Hardware to Develop Software Before and After Silicon
Watch the latest Change What’s Possible episode featuring Bill Neifert and Jason Yamada to learn how to unlock the power of Corellium’s virtual hardware to accelerate software development before and after silicon.
Webinar •
On Demand
The Future of Mobile Security: Introducing All New Corellium Product Lines
Watch the latest Change What’s Possible episode featuring Brian Robison to learn about our newest and most advanced product lines: Corellium Viper™, Corellium Falcon™, Corellium Solo™, and Corellium MATRIX™.
Webinar •
On Demand
Revolutionize Mobile Pentesting with Corellium MATRIX™
Watch the latest Change What’s Possible episode to dive into our latest groundbreaking technology and see first-hand how Corellium MATRIX™ automates and accelerates mobile app security testing.
Webinar •
On Demand
Building Next-Gen Automotive Software: Mastering Mixed Criticality Workloads and Software Test Environments
Join Bill Neifert and Markus Helmling to discover groundbreaking developments in automotive software and how to leverage cloud-based virtual devices to enhance your development methodologies.
Watch as Bill and Markus demonstrate mixed-criticality workloads and learn how Vector's SIL Kit and CANoe facilitate the construction of real-world scenarios within a virtual environment.
Webinar •
On Demand
Arm Tech Talk: Accelerating Software Development for Automotive Solutions
Join Corellium and Arm on for our Tech Talk, “Accelerating Software Development for Next-Generation Arm-based Automotive Solutions.” This session will explore how Corellium’s virtualization technology is transforming the landscape of automotive software development.
Webinar •
On Demand
Introducing Corellium’s Automated Mobile App Security Testing
Watch the latest Change What’s Possible webinar, “Introducing Corellium’s Automated Mobile App Security Testing,” hosted by Corellium’s Brian Robison and Steven Smiley. Learn about the future of security with Corellium’s latest innovation, automated Mobile App Security Testing (MAST), now integrated into our Virtual Hardware platform. Watch now on demand to see MAST in action.
Webinar •
On Demand
Experimenting with Messaging App Vulnerabilities
Join us for our webinar, “Experimenting with Messaging App Vulnerabilities,” hosted by Brian Robison and guest speaker, Marco Chomut of tfp0.
Last year we released Corellium Café, our first intentionally vulnerable app. Now we’ve added Corellium GlitchChat, an intentionally vulnerable messaging app for iOS, to the mix. Many current threats target mobile messaging apps, exploiting vulnerabilities in those apps using 0-click methods to steal data or compromise the device. GlitchChat was designed to provide researchers with a safe environment to experiment with 0-click exploits using features provided by Corellium.
Watch this webinar to learn how you can use Corellium GlitchChat in your security research work.
Webinar •
On Demand
Automate Complex Tasks by Giving GPT-4 Control over Corellium’s API
Join Corellium Chief Evangelist, Brian Robison, and guest speaker David Manouchehri from ai.moda, for our first webinar of 2024. In this webinar, we had a little fun by giving GPT-4 control over Corellium’s OpenAPI endpoint to automate complex tasks using plain English! We walked through how to use Corellium’s API with Python, and then used OpenAI’s GPT-4 to instruct Corellium's OpenAPI endpoint to control a Corellium virtual phone. Finally, we showed how to automate this as a daily task using Google Cloud Run.
Webinar •
On Demand
Accelerating IoT Device Software Development with Corellium
Discover how Arm device virtualization can accelerate your software development lifecycles in our recent webinar hosted by Bill Neifert, SVP of Partnerships at Corellium, and special guest Eric Sondhi, Director of Marketing at Arm. In our recent discussion, Bill and Eric delved into IoT software development flows and how a scalable, cloud-based methodology sped up DevOps tasks and significantly reduced costs compared to running device farms. Discover how integrations with cloud services such as GitHub Actions and AWS GreenGrass improved how IoT software was developed.
Webinar •
On Demand
Intro to Custom Device Modeling with Corellium
Developers can use the Corellium CHARM Developer Kit to create custom virtual device models for the Corellium platform.
Webinar •
On Demand
Hunting for Vulnerabilities in iOS Apps
Join Chief Evangelist Brian Robison, Corellium Researcher Steven Smiley, and guest speaker Robert Ferri as they go deeper into reverse engineering tactics and techniques with iOS mobile applications. Learn some of the tools of the trade in decompiling and static code analysis to hunt for vulnerabilities. Additional live demonstrations included using common tools like Burp Suite, Frida and Objection to prove that the vulnerabilities actually exist.
Webinar •
On Demand
Deep Dive into Reverse Engineering on Android
Join Brian Robison (Chief Evangelist) and Steven Smiley (Corellium Researcher) as they discuss reverse engineering tactics on Android mobile applications. Together, they demonstrated how to find vulnerabilities through decompiling and static code analysis. They also tested common tools of the trade — including Burp Suite, Frida, and Objection — to prove that vulnerabilities exist in data at rest and data in motion.
Webinar •
On Demand
Mobile Vulnerabilities Exposed: Getting Our Hands Dirty Part 2
Learn how to use the Corellium Café mobile app to uncover mobile app vulnerabilities in Corellium’s virtualized environment. Watch our webinar.
Webinar •
On Demand
Mobile Malware & Threat Research Without Limits
In this webinar, we showed how Corellium’s virtualization platform removes the limitations of using physical devices to perform dynamic analysis on mobile malware, and makes it much safer and more efficient than ever before. We played with live ransomware, spyware, and other types of information-stealers. Then, we examined their effects on devices, while gathering indicators of compromise that we can use to defend our environment. We saw live command and control (C2) communication, as well as malware that destroys user data.
Webinar •
On Demand
Mobile Vulnerabilities Exposed: Getting Our Hands Dirty
In our final episode on mobile application penetration testing, Corellium Researcher Steven Smiley and Chief Evangelist Brian Robison put together many of the tactics from the previous 4 webinars, using mobile app pen testing techniques from earlier episodes in a new mobile app – Corellium Cafe.
Webinar •
On Demand
Mobile Vulnerabilities Exposed: Reverse Engineering
In this installment of our Change What’s Possible webinar series, our host, VP of Product Marketing, Brian Robison, and guest speaker Corellium Researcher, Steven Smiley, discuss the most effective ways to find system vulnerabilities on iOS and Android devices through mobile app reverse engineering and static binary analysis.
Webinar •
On Demand
Mobile Vulnerabilities Exposed: Data in Transit
In the third installment of our Change What’s Possible webinar series, "Mobile Vulnerabilities Exposed: Data inTransit," VP of Product Marketing, Brian Robison, discussed how to capture network traffic and analyze data in transit.
Webinar •
On Demand
Mobile Vulnerabilities Exposed: Data at Rest
In the second installment of our Change What’s Possible webinar series, "Mobile Vulnerabilities Exposed: Data at Rest," our host, VP of Product Marketing, Brian Robison, and Corellium Researcher, Steven Smiley, will discuss where mobile app data is stored on iOS and Android devices, how easily it can be exploited, and the tools you need to avoid these risks.
Webinar •
On Demand
Corellium 101: Mobile AppSec Testing with Arm Virtualization
In Corellium's webinar series Change What's Possible Episode 1, VP of Product Marketing, Brian Robison will discuss the current limitations to mobile security testing and how Corellium addresses them. The discussion includes live demos of how the Corellium Virtual Hardware platform handles malware research, app pen testing, and OS vulnerability research.
Subscribe to Stay Connected
Stay up to date with the latest news and announcements.