29–30 nov. 2025
ITEEM, 14 Rue de Ticléni, 59650 Villeneuve-d'Ascq
Fuseau horaire Europe/Paris

Forensique numérique

Non programmé
20m
ITEEM, 14 Rue de Ticléni, 59650 Villeneuve-d'Ascq

ITEEM, 14 Rue de Ticléni, 59650 Villeneuve-d'Ascq

Orateur

Antoine Houssais (ENS)

Description

Aimed at frontline forensic investigators operating under tight time and budget constraints, this article presents a practical, affordable procedure to extract data from mobile phones whose storage is protected and often encrypted by hardware-bound keys. The approach combines targeted software analysis with a non-destructive hardware interposition that intercepts and modifies exchanges between the device controller and memory. Modified data are reinjected and their effect observed at boot. To bridge the gap between laboratory invasive techniques and operational needs, the paper focuses on repeatable workflows that preserve evidential hygiene. It demonstrates an embedded multimedia card man-in-the-middle interposer enabling controlled read–modify–reinject cycles on a BlackBerry device using PGP. The procedure locates password-derivation artefacts and enables recovery of credentials useful for decryption. The article concludes with recommendations to preserve the chain of custody and ensure the method is repeatable in real operational settings.

Auteurs principaux

Documents de présentation

Aucun document.