"The day began with Pwn2Own newcomers – a team from Georgia Tech Systems Software & Security Lab (@SSLab_Gatech) consisting of Yong Hwi Jin, Jungwon Lim, and Insu Yun. They were targeting Apple Safari with a macOS kernel escalation of privilege. They chained together six unique bugs starting with a JIT vulnerability and ending with TOCTOU/race condition to escape the sandbox and pop a root shell. They also disabled System Integrity Protection (SIP) on the device to demonstrate that they achieved kernel-level code execution. Their smooth demonstration earned them $70,000 and 7 points towards Master of Pwn."
https://www.thezdi.com/blog/2020/3/19/pwn2own-2020-day-one-results
Demonstration - Pwn2Own 2020 - Day One Results
https://www.thezdi.com/blog/2020/3/19/pwn2own-2020-day-one-results
Demonstration - Pwn2Own 2020 - Day One Results