Digitala Vetenskapliga Arkivet

System disruptions
We are currently experiencing disruptions on the search portals due to high traffic. We are working to resolve the issue, you may temporarily encounter an error message.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Forensic Analysis of the Nintendo Switch
Halmstad University, School of Information Technology.
Halmstad University, School of Information Technology.
2020 (English)Independent thesis Advanced level (degree of Master (One Year)), 10 credits / 15 HE creditsStudent thesisAlternative title
Forensic Analysis of the Nintendo Switch (English)
Abstract [en]

In this thesis, we did a forensic analysis of a Nintendo Switch gaming console. It is both a portable and a stationary device, which makes it so that it could contain valuable information about the usage of the console at home and elsewhere. Multiple methods of data extraction were used, including using an exploit to obtain storage memory, extracting the contents of the SD card and capturing network traffic. The findings from the analysis of these data sources were compared to the information on the user interface. Any information that could not be found on the user interface was reported. The main findings of memory analysis were a detailed log file of user interactions, JSON files with personal information such as email addresses, and crash logs with information about the state of the console during the crash. The SD card mainly contains screenshots with embedded timestamps, and the network capture does not contain any forensically relevant information. The combination of these different types of information could makethe Nintendo Switch a useful source of evidence during an investigation.

Place, publisher, year, edition, pages
2020.
Keywords [en]
Nintendo Switch, forensic analysis, hardware vulnerability, network capture
National Category
Computer Systems
Identifiers
URN: urn:nbn:se:hh:diva-42451OAI: oai:DiVA.org:hh-42451DiVA, id: diva2:1441718
Subject / course
Digital Forensics
Educational program
Master's Programme in Network Forensics, 60 credits
Supervisors
Examiners
Available from: 2020-06-18 Created: 2020-06-16 Last updated: 2020-06-18Bibliographically approved

Open Access in DiVA

fulltext(1897 kB)3174 downloads
File information
File name FULLTEXT02.pdfFile size 1897 kBChecksum SHA-512
dfc02c1a7e8e1c12a1bed968529d88c2e17b1d0ad8e8f907b2fd808f7bb1268801c510e222464bb04c97ce0b15e8d35926314d9e1257ff5def46626c3dd2320c
Type fulltextMimetype application/pdf

By organisation
School of Information Technology
Computer Systems

Search outside of DiVA

GoogleGoogle Scholar
Total: 3174 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 12918 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf