Chapter
Improvements in Vendor Participation at Pwn2Own Over the Years
The Pwn2Own contest has seen better vendor participation over the years, leading to improvements in security measures like sandbox and rendering engines in browsers. An example of an interesting Pwn2Own exploit is the IE exploit that forced the browser to open the on-screen keyboard and execute commands on the operating system.
Clips
The vendors who were reluctant to be part of Pwn2Own initially have now started valuing the conference and sponsoring it.
22:54 - 29:05 (06:11)
Summary
The vendors who were reluctant to be part of Pwn2Own initially have now started valuing the conference and sponsoring it. Research community involvement & data analysis has helped vendors significantly improve their product's security.