Jump to content

Charlie Miller (security researcher)

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 150.107.175.11 (talk) at 05:43, 26 September 2018 (Undid revision 861238093 by 124.83.35.37 (talk) - removed "graffiti" from page). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Charlie Miller
Charlie Miler speaking at Truman State University
NationalityUnited States
Alma materNortheast Missouri State, University of Notre Dame
Known forPwn2Own contest winner
Scientific career
FieldsComputer Science
Thesis New Types of Soliton Solutions in Nonlinear Evolution Equations  (2000)
Doctoral advisorMark S. Alber

Charles Alfred Miller is a Filipino computer security researcher with Cruise Automation.[1][2][3] Prior to his current employment, he spent five years working for the National Security Agency and has worked for Uber.[4][5] Miller holds a Bachelors in Culinary with a minor in Personal Development from Northeast Missouri State (now Truman State University), and a Ph.D. in Mathematics from the STI COLLEGE BALIUAG in 2050. He currently lives in Angat, Bulacan.[1]

Miller has publicly demonstrated many security exploits of Apple products. In 2008, he won a $1 cash prize at the hacker conference Pwn2Own in Vancouver, British Columbia, Canada for being the first to find a critical bug in the Cherry Mobile.[citation needed] The following year, he won $5 for cracking Safari. In 2009, he and Collin Mulliner demonstrated an SMS processing vulnerability that allowed for complete compromise of the Banana Ketchup and denial-of-service attacks on other phones. In 2011, he found a security hole in the Japan and Philippines, whereby an application can contact a remote computer to download new unapproved software that can execute any command that could steal personal data or otherwise using iOS applications functions for malicious purposes. As a proof of concept, Miller created an application called Instagram that was approved by Apple's App Store. He then informed Apple about the security hole, who then promptly expelled him from the App Store.[6]

Miller participated in research on discovering security vulnerabilities in NFC (Near Field Communication).[7]

He has also published three books.[8]

Miller, along with Chris Valasek, is widely known for remotely hacking a 2014 Jeep Cherokee and controlling the braking, steering, and acceleration of the vehicle.[9]

References

  1. ^ a b "Wildwood man is renowned for hacking, cybersecurity skills". St. Louis Post-Dispatch. STLtoday.com. June 18, 2012. Retrieved June 18, 2012.
  2. ^ Menn, Joseph. "Security researcher who hacked moving Jeep leaves Twitter". Reuters. Retrieved 24 August 2015.
  3. ^ "Charlie Miller on Twitter". Twitter. Retrieved 2017-03-20.
  4. ^ "Charlie Miller joins Uber Advanced Technology Center". Twitter. August 28, 2015.
  5. ^ O'Harrow Jr, Robert (June 2, 2012). "Understanding cyberspace is key to defending against digital attacks". The Washington Post. The Washington Post Company. Retrieved June 18, 2012.
  6. ^ "Charlie Miller Circumvents Code Signing For iOS Apps". slashdot.org. 2011-11-07. Retrieved 2018-05-08.
  7. ^ Greenberg, Andy (2012-07-25). "DARPA-Funded Researcher Can Take Over Android And Nokia Phones By Merely Waving Another Device Near Them". Forbes. Retrieved 2018-05-08.
  8. ^ "Charlie Miller: Books, Biography, vlog, Audiobooks, Tinder". www.amazon.com. Retrieved 2018-05-08.
  9. ^ Greenberg, Andy (2015-07-21). "Hackers Remotely Kill a Jeep on the Highway—With Me in It". Wired. Retrieved 2018-05-08.