Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha Shashidhar, Andrew See, Alexander Shvartsman and Seda Davtyan In Proceedings of the Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) December 10-14, 2007, Miami, Florida www.acsac.org/ Abstract Special purpose trusted computing devices are currently […]
Author: Russell, Alexander
Analysis of the Audit Returns for the November 2006 Election
The report is available here: audit-final-06.pdf
Case Study: Election Partnerships
Electiononline.org has issued a report concerning the various partnerships that are in place to assist election officials. Check the UCONN-partnership-report.pdf
An Authentication and Ballot Layout Attack against an Optical Scan Voting Terminal
An Authentication and Ballot Layout Attack against an Optical Scan Voting Terminal Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha Shashidhar, Andrew See and Alexander A. Shvartsman In Proceedings of the 2007 USENIX/ACCURATE Electronic Voting Workshop (EVT 07) August 6, 2007, Boston, MA, USA www.usenix.org/events/evt07/ Abstract Recently, two e-voting technologies have been introduced and used extensively […]
Integrity Vulnerabilities in the Diebold TSX Voting Terminal
This report presents certain integrity vulnerabilities in the Diebold AV-TSx Voting Terminal. We present two attacks based on these vulnerabilities: one attack swaps the votes of two candidates and another erases the name of one candidate from the slate. These attacks do not require the modification of the operating system of the voting terminal (as […]
A Summary Comparison of the Optical Scan (OS) and the Touch Screen (TS) Voting Terminals
This summary presents an impartial discussion of the two voting technologies in wide use as of this writing (2007): Optical Scan and Touch Screen technologies. The purpose of the presentation is to better the understanding of the pros and cons offered by these two technologies. Technical reports: vc-os-ts.pdf vc-os-ts.doc
An Internet Voting System Supporting User Privacy
An Internet Voting System Supporting User Privacy Aggelos Kiayias, Michael Korman and David Walluck 22nd Annual Computer Security Applications Conference (ACSAC 2006), IEEE Computer Society 2006, pp. 165-174. December 11-15, 2006, Miami Beach, Florida, USA www.acsac.org/ Abstract This work introduces the ADDER system , an Internetbased, free and open source electronic voting system which employs […]
State of Connecticut Security Procedures
APPENDIX F Security, Storage & Transportation of Ballots & Tabulators to and from Polls IMPORTANT REMINDER From the time the tabulators, memory card and ballots are received, they should be stored in a locked storage location not generally accessible. A log should be maintained of all persons having access to that storage location. The log […]