Studies

Compass Security supervises students writing a scientific paper on an aspect of IT security as part of their bachelor or master’s degree. We help students to link theory with practice, either on a subject of their own choosing or one of the current questions facing the security industry.

Papers written in cooperation with Compass Security:

ThemaVerfasserJahr
Emil on SteroidsSven Defatsch, Patrick Steinhäusl2018
Hacking-Lab 2.0Janick Engeler, Yanick Gubler2018
RFID WebauthentifizierungAndreas Eder, Pascal Kistler2017
Man-in-the-Browser DetectionMatthias Gabriel, Philip Schmid2017
Malware HuntingOliver Nietlispach, Roman Ehrbar2017
Fish Tank Suite - Proxy Redirection with Fake C&CSilvan Adrian, Fabian Binna2016
Forensic Triage KitMathias Vetsch, Luca Tännler2016
SAML2 Burp PluginRoland Bischofberger, Emanuel Duss2015
XSLT Processing Security and Server Request ForgeriesRoland Bischofberger, Emanuel Duss2014
Forensik virtueller MaschineChristian Wagner2014
Crypto-based security mechanisms in Windows and .NETAlexandre Herzog2013
Smart Energy SecurityCyrill Brunschwiler2013
Sicherheitskonzept für Webservices der Berner FachhochschuleSimon Gerber2012
NFC-SnifferFabian Vogt2012
Web Applikation Security am Beispiel eines Know-How Management SystemFelix Preussner2009

Compass Security Blog

New SMBGhost Vulnerability Affects Modern Windows Systems

A new vulnerability (CVE-2020-0796) affecting SMBv3 has been discovered. The community has started to name this vulnerability SMBGhost because everyone knows this vulnerability is present but no... mehr

Domain-Join Computers the Proper Way

When you add a new computer, it must first join the domain. If you use its future main user to do it, they'll become the owner and be able to hijack the computer to become a local administrator in... mehr

ZUM BLOG

CALENDAR

Cyber Risks - Früherkennung leicht gemacht

Das SwissBoardForum lädt ein zum Spezialevent «Cyber Risks». Ivan Bütler zeigt in seinem Live Hacking, welchen Risiken unsere Infrastruktur gegenüber... Read more

Beer-Talk in Zürich: Bluetooth Low Energy: Protocol, Security & Attacks

Immer mehr Geräte und Gadgets können über Bluetooth Low Energy (BLE) miteinander kommunizieren. Haben Sie sich schon gefragt, was dieses BLE überhaupt... Read more

Security Training: Secure Mobile Apps

In the 2-day course (in German) from Mai 12/13, 2020, you will learn about the most important security problems of mobile apps. Read more

ALL DATES

NEWS

Vulnerability in Abacus

Ville Koch identified a Cross-Site Scripting vulnerability in Abacus. Read more

Rein kommen wir meistens

In einem Interview in der Wirtschaftszeitung «Finanz und Wirtschaft» spricht Walter Sprenger über die Motivationsgründe und Methoden der Hacker. Read more

KMU im Visier von Cyberkriminellen

In der Sendung «Fokus KMU» erzählt ein Betroffener über die Auswirkungen der Cyber Attacke auf sein Unternehmen. Cyrill Brunschwiler von Compass... Read more

ARCHIVES