Charlie Miller (security researcher)

From Wikipedia, the free encyclopedia
Jump to: navigation, search
For other people named Charles Miller, see Charles Miller (disambiguation).
Charles Miller
Charlie Miller Infiltrate 2012.jpg
Charlie Miller at Infiltrate 2012
Nationality United States
Fields Computer Science
Alma mater Northeast Missouri State, University of Notre Dame
Known for Pwn2Own contest winner

Charles Miller is a computer security researcher with Twitter.[1] Prior to his current employment, he spent five years working for the National Security Agency.[2] Miller holds a Bachelors in Mathematics with a minor in Philosophy from Northeast Missouri State (now Truman State University), and a Ph.D. in Mathematics from the University of Notre Dame. He currently lives in St. Louis, Missouri.[1]

Miller has publicly demonstrated many security exploits of Apple products. In 2008 he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver Canada for being the first to find a critical bug in the MacBook Air.[citation needed] The following year, he won $5,000 for cracking Safari. In 2009, he also demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011 he found a security hole in the iPhone and iPad, whereby an application can contact a remote computer to download new unapproved software that can execute any command that could steal personal data or otherwise using iOS applications functions for malicious purposes. As a proof of concept, Miller created an application called Instastock that was approved by Apple's App Store. He then informed Apple about the security hole, who then promptly expelled him from the App Store.[3]

Miller participated in research on discovering security vulnerabilities in NFC (Near Field Communication).[citation needed]

References[edit]

  1. ^ a b "Wildwood man is renowned for hacking, cybersecurity skills". St. Louis Post-Dispatch (STLtoday.com). June 18, 2012. Retrieved June 18, 2012. 
  2. ^ O'Harrow Jr, Robert (June 2, 2012). "Understanding cyberspace is key to defending against digital attacks". The Washington Post (The Washington Post Company). Retrieved June 18, 2012. 
  3. ^ "Charlie Miller Circumvents Code Signing For iOS Apps". 

External links[edit]