Charlie Miller (security researcher)

This is an old revision of this page, as edited by AlexanderKlink (talk | contribs) at 14:07, 28 January 2012 (photo). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

Charles Miller is a computer security researcher with the consulting firm Accuvant LABS[1].

Charles Miller
File:Charlie Miller Infiltrate 2012
Charlie Miller at Infiltrate 2012
NationalityUnited States
Known forPwn2Own contest winner
Scientific career
FieldsComputer Science

Prior to his current employment, he spent five years working for the National Security Agency. Miller demonstrated his hacks publicly on products manufactured by Apple. In 2008 he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver Canada for being the first to find a critical bug in the ultrathin MacBook Air. The next year, he won $5,000 for cracking Safari. In 2009 he also demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011 he found a security hole in an iPhone's or iPad's security, whereby an application can contact a remote computer to download new unapproved software that can execute any command that could steal personal data or otherwise using iOS applications functions for malicious purposes. As a proof of concept, Miller created an application called Instastock that got approved by Apple's App Store. He then informed Apple about the security hole, who then promptly expelled him from the App Store.[1]

Miller holds a Ph.D. in mathematics from the University of Notre Dame.

References

  1. ^ "Charlie Miller Circumvents Code Signing For iOS Apps".

Template:Persondata