Charlie Miller (security researcher)
Charles Miller | |
---|---|
Charlie Miller | |
Nationality | United States |
Fields | Computer Science |
Alma mater | Northeast Missouri State, University of Notre Dame |
Thesis | New Types of Soliton Solutions in Nonlinear Evolution Equations (2000) |
Doctoral advisor | Mark S. Alber |
Known for | Pwn2Own contest winner |
Charles Alfred Miller is a computer security researcher with Uber.[1][2][3] Prior to his current employment, he spent five years working for the National Security Agency.[4] Miller holds a Bachelors in Mathematics with a minor in Philosophy from Northeast Missouri State (now Truman State University), and a Ph.D. in Mathematics from the University of Notre Dame in 2000. He currently lives in Wildwood, Missouri.[2]
Miller has publicly demonstrated many security exploits of Apple products. In 2008, he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver, Canada for being the first to find a critical bug in the MacBook Air. The following year, he won $5,000 for cracking Safari. In 2009, he also demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011, he found a security hole in the iPhone and iPad, whereby an application can contact a remote computer to download new unapproved software that can execute any command that could steal personal data or otherwise using iOS applications functions for malicious purposes. As a proof of concept, Miller created an application called Instastock that was approved by Apple's App Store. He then informed Apple about the security hole, who then promptly expelled him from the App Store.[5]
Miller participated in research on discovering security vulnerabilities in NFC (Near Field Communication).[6]
He has also published three books,[7] one entitled The Mac Hacker's Handbook.[8]
References
- ↑ "Charlie Miller joins Uber Advanced Technology Center". Twitter. August 28, 2015.
- 1 2 "Wildwood man is renowned for hacking, cybersecurity skills". St. Louis Post-Dispatch. STLtoday.com. June 18, 2012. Retrieved June 18, 2012.
- ↑ Menn, Joseph. "Security researcher who hacked moving Jeep leaves Twitter". Reuters. Retrieved 24 August 2015.
- ↑ O'Harrow Jr, Robert (June 2, 2012). "Understanding cyberspace is key to defending against digital attacks". The Washington Post. The Washington Post Company. Retrieved June 18, 2012.
- ↑ "Charlie Miller Circumvents Code Signing For iOS Apps".
- ↑ "DARPA-Funded Researcher Can Take Over Android And Nokia Phones By Merely Waving Another Device Near Them".
- ↑ "Books by Charlie Miller".
- ↑ "The Mac Hacker's Handbook".
External links
- Andy Greenberg (2010-04-12). "The Mac Hacker Strikes Again". Forbes.com.
- Nick Barber, Robert McMillan (2008-03-28). "Apple Mac Hacked in Two Minutes at CanSecWest".
- "CanSecWest Conference Homepage".
- Brian Krebs (2008-10-08). "The Internet's Top 10 Most Controversial Figures of 2008". Popular Mechanics.
- Elinor Mills (2009-08-27). "Researchers who hack the Mac OS". CNET.
- Alan Dang (2009-03-25). "Behind Pwn2Own: Exclusive Interview With Charlie Miller". Tom's Hardware.
- Andy Greenberg (2015-07-21). "Hackers Remotely Kill a Jeep on the Highway—With Me in It". Wired.