Charlie Miller [Speaker-Timeline] [Speaker-Links]

Tell us about missing data
Title Conference Tags
Applied Self-Driving Car Security blackhatUSA2018-2018 - Las Vegas, USA
Key Note - Car hacking Paranoia-2017 - oslo,norway
Remote Exploitation of an Unaltered Passenger Vehicle SyScan360-2015 - beijing,china
Remote Exploitation of an Unaltered Passenger Vehicle Defcon-2015 - Las vegas,usa
Why Do We Suck at Infosec? AppSecCalifornia-2015 - California,USA
A Survey of Remote Automotive Attack Surfaces defcon-2014 - las vegas,usa
Failures of the infosec community - an in-depth insight ITWeb-2014 - Johannesburg,South Africa
Hacking cars via the CAN bus ITWeb-2014 - Johannesburg,South Africa
Car Hacking for Poories Syscan-2014 - Merchant Court,Singapore Attack
Mobile Threats Hype vs. Reality hacktivity-2013 - Budapest,Hungary Mobile Security
Mobile Threats Hype vs. Reality Live Feed from the Security Theater hacktivity-2013 - Budapest,Hungary
Mobile Threats – Hype vs Reality HackerHalted-2013 - Atlanta,USA
Adventures in Automotive Networks and Control Units DEFCON-2013 - Las Vegas,Nevada
Attacking NFC Paranoia-2012 - Oslo,Norway Security
Don't Stand So Close to Me: An Analysis of the NFC Attack Surface HITBSecConf Malaysia-2012 - KL, Malaysia
Exploring the NFC attack surface Sector-2012 - Toronto,Canada Security
Dont Stand So Close To Me: An Analysis of the NFC Attack Surface DEF CON-20 - Las Vegas, USA Security
Don't stand so close to me: an analysis of the NFC attack surface BlackHat USA-2012 - Las Vegas, USA Attack NFC
Space Pope on Android SummerCon-2012 - Brooklyn, USA Analysis Google Bouncer
Banned in the USA ITWeb Security Summit-2012 - Johannesburg, South Africa Security
Battery firware hacking HackerHalted-2011 - Atlanta,USA
Battery Firmware Hacking Defcon19-2011 - Las Vegas,USA
Battery Firmware Hacking BlackhatUSA-2011 - Las Vegas,USA
PANEL: Owning Your Phone at Every Layer BlackhatUSA-2011 - Las Vegas,USA
A Brief History Of Attacks Against Ios And Android BlueHat-2010 - Redmond, USA Deep Knowledge
Kim Jong-Il And Me: How To Build A Cyber Army To Defeat The U.S. DEF CON-18 - Las Vegas, USA Security
Crash Analysis Using Bitblaze Blackhat USA-2010 - Las Vegas, USA Security Analysis
Kim Jong-Il And Me: How To Build A Cyber Army To Attack The U.S. CCDCOE-2010 - Estonia Security Exploitation Risk Media Law Enforcement Application Security Cyberwar
Babysitting An Army Of Monkeys: An Analysis Of Fuzzing 4 Products With 5 Lines Of Python CanSecWest-2010 - Vancouver, Canada
Iphone Sms Hacking With A Touch About Payloads BlueHat-2009 - Redmond, USA Security
Iphone Hacking: Fuzzing And Payloads ekoparty-2009 - Buenos Aires, Argentina Security
Injecting Sms Messages Into Smart Phones For Security Analysis 3rd USENIX Workshop on Offensive Technologies -2009 - Montreal, Canada Security Analysis
Post Exploitation Bliss: Loading Meterpreter On A Factory Iphone Blackhat USA-2009 - Las Vegas, USA Security Exploitation
Fuzzing The Phone In Your Phone Blackhat USA-2009 - Las Vegas, USA Security Fuzzing
Hacking Iphone – Fuzzing And Payload SyScan-2009 - Taipei, Taiwan Security Fuzzing
Hacking Iphone - Fuzzing And Payload SyScan-2009 - Singapore Security Fuzzing
Fun And Games With Mac Os X And Iphone Payloads Blackhat Europe-2009 - Barcelona, Spain Security
Hacking Macs for Fun and Profit CanSecWest-2009 - Vancouver,Canada
Pulling A John Connor: Defeating Android ShmooCon-2009 - Washington DC, USA Android Security
Ipwning The Iphone HITBSecConf Malaysia-2008 - Kuala Lampur, Malaysia Security Fuzzing Access Exploitation
Iron Chef: Fuzzing Challenge Blackhat USA-2008 - Las Vegas, USA Security Fuzzing
Engineering Heap Overflow Exploits With Javascript 2nd USENIX Workshop on Offensive Technologies-2008 - San Jose, USA Security
Adventures in Disclosure: A Look at the Legal Exploit Sales Market AUScert-2008 - Gold Coast, Australia
Fuzz by Number CanSecWest-2008 - Vancouver,Canada
Virtual Worlds - Real Exploits ShmooCon-2008 - Washington DC, USA Security Wireless
How Smart Is Intelligent Fuzzing- Or -How Stupid Is Dumb Fuzzing? DEF CON-15 - Las Vegas, USA Security
Hacking Leopard: Tools And Techniques For Attacking The Newest Mac Os X Blackhat USA-2007 - Las Vegas, USA Security Development
Hacking Leopard: Tools and Techniques for Attacking the Newest Mac OS X BlackHatDC-2007 - Washington,USA