Th e accr edited securit y level of this system is: TOP SECRET //HC S/SI-GAMMAJTALENT KEYHOLE //NOFOR N/ORCON/PROPI N * TOP SECRET //SI//NOFORN (U) TCB Jamboree TOP SECRET //SI//NOFORN From Wiki info-NF Jump to: navigation , search (S//NF) The TCB J amboree is a conference hosted on an annual basis by the Tr usted Compu ting Base (TCB) Program within CIA 's Emerg ing Techn ologies Bra nch within IOC. TCB Jamboree brin gs together CIA analysts and all of the vaii ous contractors performin g reseai·ch for the CIA TCB program. In pa st yeai·s CIA has also invi ted NSA to paiticipate throu gh the NSA TCB Pro gram (the counterpart to the CIA program) . (U//FOUO) The first Jamboree was held in 2006 . Attendance is open only to US per sonnel. Note: (2/6/12) As of this morning, clearances were verified for all re gistered attendees from NSA that we know of. - - Content s • I TCB Jamboree 2012 • 2._C!l)Invitation • i(ID. Registration o 3 .1 (ID. Clearance Passing • ~(U //FOUO) 2012 TCB Jamboree Presenters Deadlines • 5 (U//FOUO) 2012 TCB Jamboree Agenda o 5.1 (ID. TuesdaY-,Febrnar:y...1., 2012 • 5 .1.1 (U) Schedule • 5 .1.2 (U) Abstracts • • • • • • • • 5.1.2.9 (S//NF) Strawhorse: Attacking the MacOS and iOS Software Develo12ment Kit • o 5.2 ill) WednesdaY-,Februa1:y_B_ , 2012 • 5 .2 .1 (U) Schedule • 5 .2 .2 (U) Abstracts • • • • • • o 5.3 • • • • (ill Thm sdaY-,Februai:y-2., 2012 • 5 .3 .1 (U) Schedule • 5 .3 .2 (U) Abstracts • • • • 6 Past Jamboree s • 7 Related [edit] TCB Jamboree 2012 (S//NF) The Infonnation Operation s Center 's Enginee1ing Deve lopment Group (EDG ) will hold its seventh annual Trusted Computing Base (TCB) Jamboree from Februai·y 7- 9, 2012. Visit the TCB Pro grain WIKI.C IA page at: htt12s :// [edit] (U) Invitation (S//NF) The Infonnati on Operation s Center 's Engineerin g Development Group (EDG ) wou ld like to announce the seventh Trusted Computing Jamboree. The Jainboree is organized and spon sored by the Secmity Portfolio of EDG 's Emer ging Techn ologie s Branch (ETB). As in past yeai·s, the Jainboree will be an informal and interacti ve conference with an emphasis on pre sentation s that provide imp01tant inf01mation to developer s trying to circumvent or exploit new securit y capabilities. (U) The Jainboree will be held Tue sday-Thm sday, February 7-9 , 2012 at the Lockheed Mai·tinTuesday and Wednesday will run from 9am to 5pm, Thursday will run from 9am to 12pm. (S//NF) The TCB Program continues to explore architectures that will have a significant impact on future Information Operations. Technologies such as the Trusted Platform Module (TPM) pose both threats and opportunities for the Intelligence Community. (S//NF) The main purpose of the Jamboree will be to discuss how the results of the Security Portfolio research can be applied today. Rather than an overview of all the activities within the Program, we will present notable results that will provide developers insight into how to meet the threats of the TCG architectures and embedded architectures and how they can exploit new avenues of attack. [edit] (U) Registration (U) Pre-registration for this event is required; registration closes on February 1, 2012. (C) Please send an email (CWE Note or ICEmail) to hat includes your full name, SSN, and contact number. [edit] (U) Clearance Passing [edit] (U) Thursday, February 9, 2012 [edit] (U) Schedule Time 09:0009:15 09:159:45 9:4510:15 10:1510:30 10:3011:00 11:0011:30 11:3011:50 Presenter(s) Talk Title (U) Welcome, EDG/ETB Trusted Computing Base Program (U) Break (U//FOUO) Grumman Xetron [edit] (U) Abstracts [edit] [edit] (U//FOUO) Northrop (U) Advanced Debugging and RE Techniques on Embedded Platforms (U) Jamboree Wrap-Up [edit] (U) Advanced Debugging and RE Techniques on Embedded Platforms (U//FOUO) Presenter: Northrop Grumman Xetron (S//NF) Embedded platforms present many additional challenges to reverse engineering. Therefore, it is often advantageous to employ dynamic analysis in the form of hardware or software debuggers to speed up the process of reverse engineering and developing implants. Manufacturers often leave hardware debugging features such as JTAG enabled on their products. We will explore methods that NG Xetron uses to locate these hardware debugging features and how these features are utilized for reverse engineering. (S//NF) Software based debugging facilities can also be very useful in performing initial reverse engineering and allowing the development team to scale rapidly without much additional equipment. We will look at common software debuggers that are used during development of embedded platforms including VxWorks shell, GDB and others. To facilitate rapid use of dynamic debugging and analysis capabilities on a wide range of embedded platforms, NG Xetron has developed a GDB server capability that can be added to existing firmware. This GDB server is very portable and reduces the dependence on the hardware and firmware of each platform of interest. (U) These techniques have been applied to a wide range of target systems, and have proven to greatly reduce the amount of time spent either in static analysis or in working to create a custom one-off dynamic analysis technique on each system. [edit] [edit] Past Jamborees TCB Jamboree 2011 Abstracts TCB Jamboree 2010 Abstracts TCB Jamboree 2009 TCB Jamboree 2008 TCB Jamboree 2007 TCB Jamboree 2006 [edit] Related TOP SECRET//SI//NOFORN Derived From: SI Classification Guide, 02-01, Dated: 20060711 and NSA/CSSM 1-52, Dated: 20070108