Charlie Miller (security researcher)
Charlie Miller | |
---|---|
![]() Miller speaking at Truman State University | |
Nationality | American |
Alma mater | Northeast Missouri State, University of Notre Dame |
Known for | Pwn2Own contest winner |
Scientific career | |
Fields | Computer science |
Thesis | New Types of Soliton Solutions in Nonlinear Evolution Equations (2000) |
Doctoral advisor | Mark S. Alber |
Charles Alfred Miller is an American
Education
Miller holds a bachelor's degree in mathematics with a minor in philosophy from the then called Northeast Missouri State, and a Ph.D. in mathematics from the University of Notre Dame in 2000. He lives in Wildwood, Missouri.[1]
Security research
As of 2007[update] Miller was a lead analyst at Independent Security Evaluators, a computer protection consultancy.
Miller participated in research on discovering security vulnerabilities in NFC (Near Field Communication).[9]
Miller, along with Chris Valasek, is known for remotely hacking a 2014 Jeep Cherokee and controlling the braking, steering, and acceleration of the vehicle.[10]
Publications
- iOS Hacker Handbook[11]
- The Mac Hacker's Handbook[12]
- Fuzzing for Software Security Testing and Quality Assurance[13]
- Battery firmware hacking: inside the innards of a smart battery[14]
References
- ^ a b "Wildwood man is renowned for hacking, cybersecurity skills". St. Louis Post-Dispatch. STLtoday.com. June 18, 2012. Retrieved June 18, 2012.
- ^ Menn, Joseph (24 August 2015). "Security researcher who hacked moving Jeep leaves Twitter". Reuters. Archived from the original on 24 September 2015. Retrieved 24 August 2015.
- ^ O'Harrow Jr, Robert (June 2, 2012). "Understanding cyberspace is key to defending against digital attacks". The Washington Post. Retrieved June 18, 2012.
- ^ "We hacked into Apple's iPhone, claim security researchers". The Guardian. 24 July 2007. Retrieved 2021-01-07.
- ^ "MacBook Air first to fall in hacking contest vs Vista and Linux". The Guardian. 28 March 2008. Retrieved 2021-01-07.
- ^ "Gone in 2 minutes: Mac gets hacked first in contest". Macworld. 28 March 2008. Retrieved 2021-01-07.
- ^ Schofield, Jack (18 March 2009). "Pwn2Own 2009: Mac falls in seconds". The Guardian. Retrieved 2021-01-07.
- ^ Lowensohn, Josh. "Apple boots security guru who exposed iPhone exploit". CNET. Retrieved 2021-01-07.
- ^ Greenberg, Andy (2012-07-25). "DARPA-Funded Researcher Can Take Over Android And Nokia Phones By Merely Waving Another Device Near Them". Forbes. Retrieved 2018-05-08.
- ^ Greenberg, Andy (2015-07-21). "Hackers Remotely Kill a Jeep on the Highway—With Me in It". Wired. Retrieved 2018-05-08.
- OCLC 815648715.
- )
- OCLC 568023386.
- ^ Miller, Charlie (2011-07-12). "Battery Firmware Hacking: Inside the innards of a Smart Battery" (PDF). BlackHat.
External links
- Andy Greenberg (2010-04-12). "The Mac Hacker Strikes Again". Forbes.com.
- Nick Barber, Robert McMillan (2008-03-28). "Apple Mac Hacked in Two Minutes at CanSecWest". YouTube.
- Brian Krebs (2008-10-08). "The Internet's Top 10 Most Controversial Figures of 2008". Popular Mechanics. Archived from the original on 2008-10-11. Retrieved 2008-10-16.
- Elinor Mills (2009-08-27). "Researchers who hack the Mac OS". CNET.
- Alan Dang (2009-03-25). "Behind Pwn2Own: Exclusive Interview With Charlie Miller". Tom's Hardware.
- "Charlie Miller". Hackers, Crackers And Thieves. 2019-12-11.