SCOPE – The contractor shall combine the leading-edge cybersecurity research available on the topics of embedded hardware exploitation with the disciplined, established science of digital forensics. The explicit outcome of this contract is to tame the cybersecurity research into measured, repeatable, consistent digital forensics processes that can be trained and followed in a digital forensics’ laboratory. Established exploitation, reverse engineering and digital forensic techniques shall be used to accomplish these tasks including software and firmware analysis, hardware reverse engineering, integrated circuit identification and research, removal of integrated circuit packages and components, deconstruction of printed circuit boards and integrated circuit packages for the express purpose of identifying consistent, repeatable exploitation techniques against a given device. The following contract seeks, through phased tasks specified in Section 4, to:
- Validate existing cybersecurity research on the topic of accessing cryptographic wallets through advanced exploitation techniques.
- Employ additional digital forensic and cybersecurity exploitation techniques to identify new methods to compromise the cryptographic wallets.
- Identify manufactures, models, and device versions the techniques can be successfully accomplished on.
- Document the process, the hardware, and the skillset sufficient to reproduce the capability in an advanced digital forensic laboratory.
- Create training on process and hands-on technique to reproduce the results. Tangential Goals:
- Develop a body of research and expertise on this topic within the IRS-CI through a trusted third-party contractor.
- Identify new acquisition techniques against new device models and previously untested devices.”
“TASK ORDER OBJECTIVES – The Contractor shall produce Work Products/Deliverables that conform to, and integrate with, existing IRS standards and guidelines. The Contractor shall conform to all IRS Security and Disclosure policies. The Contractor shall provide support and services in the following general areas.
Task 1 Orientation Briefing
Task 2 CryptoWallet Exploitation and Training Development
Task 2.1 Single Exploit, Single Device Topic
Task 2.2 Multiple Exploits, Multiple Device Topics
Task 3 Advanced Exploratory Digital Forensic Research on Exploiting Emerging Devices
Task 4 Transition Support & Plan”
PERIOD OF PERFORMANCE – The period of performance for the anticipated task order will be two years (base plus one 12-month option year) to include a 6-month extension period if needed. The anticipated Period of Performance for the base period will be September 30,2021 through September 29, 2022 with the option year as follows: 16 Option Year 1: 09/30/2022-09/29/2023 If requirement is awarded prior to 09/30/2021, Digital Forensics has a critical need to start the contract as soon as possible. RAMP UP PERIOD Work under this PWS may require a ramp-up period at the initial contract award date prior to the contract period of performance for the Contractor to recruit and hire personnel specifically for this PWS. If needed, the ramp-up period specifics shall be identified in the Contractor’s proposal.”
XFactor Members access the complete set of documents here.
To register for a free XFactor trial, read more here.