4/17 (Thu.) 14:00 - 14:30 7F 703

Decoding Pwn2Own: Reflections on Vulnerabilities from a Vendor's Perspective

This presentation will take you into the real-world scenarios of the renowned global cybersecurity competition, Pwn2Own. From the vendor’s perspective, we will dissect how attackers successfully discover and exploit vulnerabilities in our products. We will share the technical details of these vulnerabilities and their root causes, including key oversights in development, design, and testing. In addition, we will discuss ways to enhance the Secure Development Lifecycle (SDL) to systematically prevent similar issues.

During this talk, we will explore several real-world attack cases—such as memory management errors and configuration mishaps—providing an in-depth look at how these attacks were executed and the best practices for remediation. By attending, you will gain insights into Pwn2Own attack scenarios and learn about practical security improvements that can strengthen overall product security. This presentation is particularly suited for developers interested in information security, helping you reevaluate product security measures and turn challenges into opportunities, ultimately building stronger defenses for both enterprises and end users.

Po-Hsing Wu
SPEAKER
Synology Inc.
Product Developer, Security Incident Response Team

TOPIC / TRACK
Product Security Forum

LOCATION
Taipei Nangang Exhibition Center, Hall 2
7F 703

LEVEL
Intermediate Intermediate sessions focus on cybersecurity architecture, tools, and practical applications, ideal for professionals with a basic understanding of cybersecurity.

SESSION TYPE
Breakout Session

LANGUAGE
Chinese

SUBTOPIC
Application Security
Security Development Lifecycle
PSIRT