Charlie Miller (security researcher)

Last updated
Charlie Miller
CharlieMillerHolmanSpeaker2015-20.jpg
Miller speaking at Truman State University
NationalityUnited States
Alma mater Northeast Missouri State, University of Notre Dame
Known for Pwn2Own contest winner
Scientific career
Fields Computer science
Thesis New Types of Soliton Solutions in Nonlinear Evolution Equations (2000)
Doctoral advisor Mark S. Alber

Charles Alfred Miller is an American computer security researcher with Cruise Automation. [1] [2] Prior to his current employment, he spent five years working for the National Security Agency and has worked for Uber. [3]

Contents

Education

Miller holds a bachelor's degree in mathematics with a minor in philosophy from the then called Northeast Missouri State, and a Ph.D. in mathematics from the University of Notre Dame in 2000. He lives in Wildwood, Missouri. [1]

Security research

As of 2007 Miller was a lead analyst at Independent Security Evaluators, a computer protection consultancy. [4] He has publicly demonstrated many security exploits of Apple products. In 2008, he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver, British Columbia, Canada for being the first to find a critical bug in the MacBook Air. [5] [6] In 2009, he won $5,000 for cracking Apple's Safari browser. [7] Also in 2009, he and Collin Mulliner demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011, he found a security hole in the iPhone and iPad, whereby an application can contact a remote computer to download new unapproved software that can execute any command that could steal personal data or otherwise using iOS applications functions for malicious purposes. As a proof of concept, Miller created an application called Instastock that was approved by Apple's App Store. He then informed Apple about the security hole, who promptly expelled him from the App Store. [8]

Miller participated in research on discovering security vulnerabilities in NFC (Near Field Communication). [9]

Miller, along with Chris Valasek, is known for remotely hacking a 2014 Jeep Cherokee and controlling the braking, steering, and acceleration of the vehicle. [10]

Publications

Related Research Articles

<span class="mw-page-title-main">Firmware</span> Low-level computer software

In computing, firmware is a specific class of computer software that provides the low-level control for a device's specific hardware. Firmware, such as the BIOS of a personal computer, may contain basic functions of a device, and may provide hardware abstraction services to higher-level software such as operating systems. For less complex devices, firmware may act as the device's complete operating system, performing all control, monitoring and data manipulation functions. Typical examples of devices containing firmware are embedded systems, home and personal-use appliances, computers, and computer peripherals.

<span class="mw-page-title-main">Hackintosh</span> Non-Apple computer running macOS

A Hackintosh is a computer that runs Apple's Macintosh operating system macOS on computer hardware not authorized for the purpose by Apple. This can also include running Macintosh software on hardware it is not originally authorized for. "Hackintoshing" began as a result of Apple's 2005 transition to Intel processors, away from PowerPC. Since 2005, Mac computers use the same x86-64 computer architecture as many other desktop PCs, laptops, and servers, meaning that in principle, the code making up macOS systems and software can be run on alternative platforms with minimal compatibility issues. Benefits cited for "Hackintoshing" can include cost, ease of repair and piecemeal upgrade, and freedom to use customized choices of components that are not available in the branded Apple products. macOS can also be run on several non-Apple virtualization platforms, although such systems are not usually described as Hackintoshes. Hackintosh laptops are sometimes referred to as "Hackbooks".

iPhone 3G 2008 Apple smartphone

The iPhone 3G is a smartphone that was designed and marketed by Apple Inc.; it is the second generation of iPhone, successor to the original iPhone, and was introduced on June 9, 2008, at the WWDC 2008 at the Moscone Center in San Francisco, United States.

iOS is a mobile operating system developed by Apple Inc. It was first released as iPhone OS in June 2007. iPhone OS was renamed iOS following the release of the iPad, starting with iOS 4. With iOS 13, Apple began offering a separate operating system, iPadOS, for the iPad. iOS is also the foundation of the newer audioOS and tvOS, and shares some of its code with macOS. New iOS versions are released every year alongside new iPhone models. From its launch in 2007 until 2010, this occurred in June or July, since then, new major versions are released in September or October.

<span class="mw-page-title-main">AirPods</span> Wireless earbuds by Apple

AirPods are wireless Bluetooth earbuds designed by Apple Inc. They were first announced on September 7, 2016, alongside the iPhone 7. Within two years, they became Apple's most popular accessory. The most recent model, AirPods, are a replacement to the 1st and 2nd generation models, although the 2nd generation is still sold on Apple's website. These models are Apple's entry-level wireless headphones, sold alongside the AirPods Pro and AirPods Max.

On Apple devices running iOS and iOS-based operating systems, jailbreaking is the use of a privilege escalation exploit to remove software restrictions imposed by the manufacturer. Typically it is done through a series of kernel patches. A jailbroken device permits root access within the operating system and provides the right to install software unavailable through the App Store. Different devices and versions are exploited with a variety of tools. Apple views jailbreaking as a violation of the end-user license agreement and strongly cautions device owners not to try to achieve root access through the exploitation of vulnerabilities.

Pwn2Own is a computer hacking contest held annually at the CanSecWest security conference. First held in April 2007 in Vancouver, the contest is now held twice a year, most recently in April 2021. Contestants are challenged to exploit widely used software and mobile devices with previously unknown vulnerabilities. Winners of the contest receive the device that they exploited and a cash prize. The Pwn2Own contest serves to demonstrate the vulnerability of devices and software in widespread use while also providing a checkpoint on the progress made in security since the previous year.

<span class="mw-page-title-main">Jay Freeman</span> American computer scientist

Jay Ryan Freeman is an American businessman and software engineer. He is known for creating the Cydia software application and related software for jailbroken iOS—a modified version of Apple's iOS that allows for the installation and customization of software outside of the regulation imposed by the App Store system.

<span class="mw-page-title-main">JailbreakMe</span> Series of iOS jailbreaks

JailbreakMe was a series of jailbreaks for Apple's iOS mobile operating system that took advantage of flaws in the Safari browser on the device, providing an immediate one-step jailbreak, unlike more common jailbreaks, such as Blackra1n and redsn0w, that require plugging the device into a computer and running the jailbreaking software from the desktop. JailbreakMe included Cydia, a package management interface that serves as an alternative to the App Store.

<span class="mw-page-title-main">Hacking of consumer electronics</span>

The hacking of consumer electronics is an increasingly common practice which users perform in order to customize and modify their devices beyond what is typically possible. This activity has a long history, dating from the days of early computer, programming, and electronics hobbyists.

<span class="mw-page-title-main">Touch ID</span> Electronic fingerprint recognition feature by Apple

Touch ID is an electronic fingerprint recognition feature designed and released by Apple Inc. that allows users to unlock devices, make purchases in the various Apple digital media stores, and authenticate Apple Pay online or in apps. It can also be used to lock and unlock password-protected notes on iPhone and iPad. Touch ID was first introduced in iPhones with 2013's iPhone 5S, In 2015, Apple introduced a faster second-generation Touch ID in the iPhone 6S; a year later in 2016, it made its laptop debut in the MacBook Pro integrated on the right side of the Touch Bar. Touch ID has been used on all iPads since the iPad Air 2 was introduced in 2014. In MacBooks, each user account can have up to three fingerprints, and a total of five fingerprints across the system. Fingerprint information is stored locally in a secure enclave on the Apple A7 and later chips, not in the cloud, a design choice intended to secure fingerprint information from users or malicious attackers.

Project Zero is a team of security analysts employed by Google tasked with finding zero-day vulnerabilities. It was announced on 15 July 2014.

IPSW, iPhone Software, is a file format used to install iOS, iPadOS, tvOS, HomePod, and most recently, macOS firmware for devices equipped with Apple silicon. All Apple devices share the same IPSW file format for iOS firmware and their derivatives, allowing users to flash their devices through Finder or iTunes on macOS or Windows, respectively. Users can flash Apple silicon Macs through Apple Configurator 2.</ref:true></ref>

<span class="mw-page-title-main">Hardware backdoor</span> Hardware or firmware of computer chips

Hardware backdoors are backdoors in hardware, such as code inside hardware or firmware of computer chips. The backdoors may be directly implemented as hardware Trojans in the integrated circuit.

Chris Valasek is a computer security researcher with Cruise Automation, a self-driving car startup owned by GM, and best known for his work in automotive security research. Prior to his current employment, he worked for IOActive, Coverity, Accuvant, and IBM. Valasek holds a Bachelors in Computer Science from University of Pittsburgh. He currently lives in Pittsburgh, Pennsylvania.

Ian Beer is a British computer security expert and white hat hacker, currently residing in Switzerland and working for Google as part of its Project Zero. He has been lauded by some as one of the best iOS hackers. Beer was the first security expert to publish his findings under the "Project Zero" name in the spring of 2014; at this time, the project was not yet revealed and crediting the newly discovered vulnerabilities to it led to some speculation.

<span class="mw-page-title-main">Apple T2</span> System on a chip (SoC) designed by Apple Inc.

The Apple T2 security chip is a system on a chip "SoC" tasked with providing security and controller features to Apple's Intel based Macintosh computers. It is a 64-bit ARMv8 chip and runs bridgeOS. T2 has its own RAM and is essentially a computer of its own, running in parallel to and responding to requests by the main computer that the user interacts with.

IOActive is an independent computer security services firm active in several areas. They are known for reporting high severity security vulnerabilities in a variety of products. IOActive has offices in Seattle, London, Dubai and Madrid. IOActive has done researches on smart cities and the transportation and technology that connects them, and has worked with Global 500 companies in multiple industries.

Kr00k is a security vulnerability that allows some WPA2 encrypted WiFi traffic to be decrypted. The vulnerability was originally discovered by security company ESET in 2019 and assigned CVE-2019-15126 on August 17, 2019. ESET estimates that this vulnerability affects over a billion devices.

<span class="mw-page-title-main">AirTag</span> Apple tracking device for finding lost items

AirTag is a tracking device developed by Apple. AirTag is designed to act as a key finder, which helps people find personal objects. To locate lost items, AirTags use Apple's crowdsourced Find My network, estimated in early 2021 to consist of approximately one billion devices worldwide that detect and anonymously report emitted Bluetooth signals. AirTags are compatible with any iPhone, iPad, or iPod Touch device capable of running iOS/iPadOS 14.5 or later. Using the built-in U1 chip on iPhone 11 or later, users can more precisely locate items using UWB (ultra-wideband) technology. AirTag was announced on April 20, 2021, made available for pre-order on April 23, and released on April 30.

References

  1. 1 2 "Wildwood man is renowned for hacking, cybersecurity skills". St. Louis Post-Dispatch . STLtoday.com. June 18, 2012. Retrieved June 18, 2012.
  2. Menn, Joseph. "Security researcher who hacked moving Jeep leaves Twitter". Reuters. Archived from the original on 24 September 2015. Retrieved 24 August 2015.
  3. O'Harrow Jr, Robert (June 2, 2012). "Understanding cyberspace is key to defending against digital attacks". The Washington Post . Retrieved June 18, 2012.
  4. "We hacked into Apple's iPhone, claim security researchers". The Guardian. 24 July 2007. Retrieved 2021-01-07.
  5. "MacBook Air first to fall in hacking contest vs Vista and Linux". The Guardian. 28 March 2008. Retrieved 2021-01-07.
  6. "Gone in 2 minutes: Mac gets hacked first in contest". Macworld. 28 March 2008. Retrieved 2021-01-07.
  7. Schofield, Jack (18 March 2009). "Pwn2Own 2009: Mac falls in seconds". The Guardian. Retrieved 2021-01-07.
  8. Lowensohn, Josh. "Apple boots security guru who exposed iPhone exploit". CNET. Retrieved 2021-01-07.
  9. Greenberg, Andy (2012-07-25). "DARPA-Funded Researcher Can Take Over Android And Nokia Phones By Merely Waving Another Device Near Them". Forbes. Retrieved 2018-05-08.
  10. Greenberg, Andy (2015-07-21). "Hackers Remotely Kill a Jeep on the Highway—With Me in It". Wired . Retrieved 2018-05-08.
  11. Miller, Charlie. (2012). IOS Hacker's Handbook. Blazakis, Dion., DaiZovi, Dino., Esser, Stefan., Iozzo, Vincenzo., Weinmann, Ralf-Philip. New York: Wiley. ISBN   978-1-118-24075-5. OCLC   815648715.
  12. Miller, Charles, 1951- (2009). The Mac hacker's handbook. Dai Zovi, Dino. Indianapolis, IN: Wiley. ISBN   978-0-470-48147-9. OCLC   320957610.{{cite book}}: CS1 maint: multiple names: authors list (link)
  13. Takanen, Ari. (2008). Fuzzing for software security testing and quality assurance. Demott, Jared D., Miller, Charles, 1951-. Boston: Artech House. ISBN   978-1-59693-215-9. OCLC   568023386.
  14. Miller, Charlie (2011-07-12). "Battery Firmware Hacking: Inside the innards of a Smart Battery" (PDF). BlackHat.