Charlie Miller

  • "One of the most technically proficient hackers on Earth"- Foreign Policy
  • Renowned Automotive and iPhone Hacker
  • Former "White Hat" Hacker, National Security Agency (NSA)
  • Four-Time Pwn2Own Champion

Recognized globally for his ability to identify vulnerabilities in consumer products, Dr. Charlie Miller is "one of the most technically proficient hackers on Earth", according to Foreign Policy.com. 
 
A Principal Autonomous Vehicle Security Architect at Cruise Automation and the former head of the autonomous vehicle security division at Didi Chuxing, Dr. Miller has made waves within the field of automotive security for his work alongside research partner, Chris Valasek.

Dr. Miller previously helped secure Uber’s self-driving car fleet.  Before that he served on Twitter’s computer security team after five years as a computer hacker for the National Security Agency. The 4-time winner of the “Super Bowl” of computer hacking, the annual Pwn2Own competition, Dr. Miller has publicly demonstrated many security exploits, specifically of Apple products and is the first person to remotely hack the iPhone, as well as the Android smartphone (on the day it was released).
 
He is the co-author of three books, including iOS Hacker’' Handbook, and has been featured in a range of media outlets, including NBC, ABC, CNN, NPR, CNBC, The New York Times, USA Today and Forbes.

 

Add to my speaker list
Charlie Miller headshot
Hackers Remotely Kill a Jeep on the Highway—With Me in It - Get Sharable Link
Hackers Remotely Kill a Jeep on the Highway—With Me in It
(>)
Now
Playing
Charlie Miller - What You Can Do To a Car With a Hack
(>)
Now
Playing
Remote Exploitation of an Unaltered Passenger Vehicle | Def Con 23 [46:21]
(>)
Now
Playing
Explore Charlie Miller's Talks
Expand all >

The Hacker News Show

There is a constant flood of infosec related news stories showering us on a daily basis. These include things like new vulnerability announcements, new breaches, new hacking techniques. It is easy to panic and fall into a trap of inaction due to information overload on this topic. In come a couple o ...

There is a constant flood of infosec related news stories showering us on a daily basis. These include things like new vulnerability announcements, new breaches, new hacking techniques. It is easy to panic and fall into a trap of inaction due to information overload on this topic. In come a couple of the world’s best computer hackers to distill this fire hose into the most important topics and what you need to know. They will dispel the magic of the latest vulnerability and tell you what you need to know, since they have a history of being the subject of these types of stories. They will explain the latest breaches and how it actually happened, so that you can learn from it and make sure it doesn’t happen to you. Don’t rely on the pundits, instead hear from experts who aren’t trying to get you to click on their articles so that you can make sense of the current and ever changing information security landscape.

Internet of Things vs. The Security of Things

The headlines talk about your light bulbs and toothbrushes getting hacked. What the heck is going on, this is not the future we were promised. Luckily, you can hear from a couple of experts who have hacked everything from computers, to phones, to laptop batteries, and even a car once. Incorporating ...

The headlines talk about your light bulbs and toothbrushes getting hacked. What the heck is going on, this is not the future we were promised. Luckily, you can hear from a couple of experts who have hacked everything from computers, to phones, to laptop batteries, and even a car once. Incorporating stories from their research, they’ll talk about what makes IoT devices so different from normal computers and why they are uniquely vulnerable. However, it is not all doom and gloom. They will also describe why we shouldn’t necessarily be too scared about IoT security and why we can safely keep iterating and advancing technology moving forward without fear of a cyber apocalypse.

Automotive Security: A Hacker's Eye View

Both for better and worse, automotive security is headline news and garnering tremendous widespread attention from media, consumers, manufactures, and hackers alike. The security of today's vehicles involves many moving parts, but while manufactures take a majority of the blame, multiple parties con ...

Both for better and worse, automotive security is headline news and garnering tremendous widespread attention from media, consumers, manufactures, and hackers alike. The security of today's vehicles involves many moving parts, but while manufactures take a majority of the blame, multiple parties contribute to the security debt in today's vehicle ecosystem. This keynote takes a deep dive into automotive security, current attacks, and vulnerabilities.  It also looks toward the future and onset of autonomous vehicles.  Your audience expect to hear candid calls to action and highly distinctive insight into vehicle security from this famed hacker's perspective

Bugs Ruin Everything

In this talk, Miller will briefly discuss some popular forms of finding vulnerabilities and why it is so difficult to find these flaws. He will also walk through examples of some of his favorite bugs, including some of which he's discovered over the years, and discuss in these cases why they were pa ...

In this talk, Miller will briefly discuss some popular forms of finding vulnerabilities and why it is so difficult to find these flaws. He will also walk through examples of some of his favorite bugs, including some of which he's discovered over the years, and discuss in these cases why they were particularly difficult to find, why common techniques may have failed on them, or why they were especially impactful.

Learn more about Charlie Miller
Follow   Twitter 
Books by Charlie Miller
(+)
Tweets by Charlie Miller
(+)
Programming Ideas
(+)
Articles
(+)
Biography

Dr. Charlie Miller reveals just how vulnerable your computer systems are, while making a passionate plea for consumers and companies to treat cybersecurity as a top priority.

A former National Security Agency hacker, 4-time winner of Pwn2Own, the “Super Bowl” of computer hacking, and the first to hack both iPhone and Android phones, Dr. Miller gained national attention after he and research partner Chris Valasek hacked a 2014 Jeep Cherokee and took control of the vehicle from more than 10 miles away.

A Principal Autonomous Vehicle Security Architect at Cruise Automation and the former head of the autonomous vehicle security division at Didi Chuxing, Dr. Miller focuses on society’s increasing connectivity and the opportunities it creates for harmful intrusions. 

On stage, he takes audiences on detailed, behind-the-scenes journeys to illustrate how hackers exploit vulnerabilities and why corporations and governments should address cybersecurity before assets—or lives—are put at risk. By providing practical suggestions to improve security and deter dangerous online adversaries, Dr. Miller’s candid and enlightening presentations help audiences recognize the gravity of this 21st century issue and walk away with solutions for prevention.