Abstract
Electronic voting systems are widely used in elections. This paper describes using an e-voting system as the basis for a project in an undergraduate computer security class. The goal of the project was to teach the students how to use the Flaw Hypothesis Methodology to perform a penetration study.
Please use the following format when citing this chapter: Bishop, M., 2007, in IFIP International Federation for Information Processing, Volume 237, Fifth World Conference on Information Security Education, eds. Futcher, L. Dodge. R., (Boston: Springer), pp. 17–24.
Chapter PDF
Similar content being viewed by others
Keywords
References
Linde, R.: Operating systems penetration. In: 1978 National Computer Conference, AFIPS Conference Proceedings. Volume 44. (1975) 361–368
Saltman, R.G.: Accuracy, integrity, and security in computerized vote-tallying. NBS Special Publication 500-158, Institute for Computer Sciences and Technology, National Bureau of Standards (now NIST), Gaithersburg, MD (August 1988)
Brennan Center Task Force on Voting System Security: The machinery of democracy: Protecting elections in an electronic world. Technical report, Brennan Center, 161 Avenue of the Americas, 12th Floor, New York, NY 10013 (August 2006)
Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.S.: Analysis of an electronic voting system. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy. (May 2004) 27–40 Appeared previously as Johns Hopkins University Information Security Institute Technical Report TR-2003-19, July 23, 2003.
Compuware Corporation: Direct recording electronic (DRE) technical security assessment report (November 2003) http://www.sos.state.oh.us/sos/hava/compuware112103_OnlinePDF.pdf.
Science Applications International Corporation: Risk assessment report: Diebold AccuVote-TS voting system and processes (September 2003) http://www.dbm.maryland.gov/SBE.
RABA Innovative Solution Cell: Trusted agent report: Diebold AccuVote-TS voting system (January 2004)
United States Computer Emergency Readiness Team: Diebold GEMS central tabulator vote database vote modification. Cyber Security Bulletin SB04-252 (September 2004) http://www.us-cert.gov/cas/bulletins/SB04-252.html.
Hursti, H.: Diebold TSx evaluation and security alert (May 2006) http://www.blackboxvoting.org/BBVtsxstudy_OnlinePDF.pdf.
Feldman, A., Halderman, J.A., Feiten, E.: Security analysis of the Diebold AccuVote-TS voting machine. Technical report, Princeton University (September 2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2007 International Federation for Information Processing
About this paper
Cite this paper
Bishop, M. (2007). E-Voting as a Teaching Tool. In: Futcher, L., Dodge, R. (eds) Fifth World Conference on Information Security Education. WISE 2007. IFIP Advances in Information and Communication Technology, vol 237. Springer, New York, NY. https://doi.org/10.1007/978-0-387-73269-5_3
Download citation
DOI: https://doi.org/10.1007/978-0-387-73269-5_3
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-73268-8
Online ISBN: 978-0-387-73269-5
eBook Packages: Computer ScienceComputer Science (R0)