Advertisement

E-Voting as a Teaching Tool

  • Matt Bishop
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 237)

Abstract

Electronic voting systems are widely used in elections. This paper describes using an e-voting system as the basis for a project in an undergraduate computer security class. The goal of the project was to teach the students how to use the Flaw Hypothesis Methodology to perform a penetration study.

Keywords

computer security information assurance electronic voting flaw hypothesis methodology penetration study 

References

  1. 1.
    Linde, R.: Operating systems penetration. In: 1978 National Computer Conference, AFIPS Conference Proceedings. Volume 44. (1975) 361–368Google Scholar
  2. 2.
    Saltman, R.G.: Accuracy, integrity, and security in computerized vote-tallying. NBS Special Publication 500-158, Institute for Computer Sciences and Technology, National Bureau of Standards (now NIST), Gaithersburg, MD (August 1988)CrossRefGoogle Scholar
  3. 3.
    Brennan Center Task Force on Voting System Security: The machinery of democracy: Protecting elections in an electronic world. Technical report, Brennan Center, 161 Avenue of the Americas, 12th Floor, New York, NY 10013 (August 2006)Google Scholar
  4. 4.
    Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.S.: Analysis of an electronic voting system. In: Proceedings of the 2004 IEEE Symposium on Security and Privacy. (May 2004) 27–40 Appeared previously as Johns Hopkins University Information Security Institute Technical Report TR-2003-19, July 23, 2003.Google Scholar
  5. 5.
    Compuware Corporation: Direct recording electronic (DRE) technical security assessment report (November 2003) http://www.sos.state.oh.us/sos/hava/compuware112103_OnlinePDF.pdf.
  6. 6.
    Science Applications International Corporation: Risk assessment report: Diebold AccuVote-TS voting system and processes (September 2003) http://www.dbm.maryland.gov/SBE.
  7. 7.
    RABA Innovative Solution Cell: Trusted agent report: Diebold AccuVote-TS voting system (January 2004)Google Scholar
  8. 8.
    United States Computer Emergency Readiness Team: Diebold GEMS central tabulator vote database vote modification. Cyber Security Bulletin SB04-252 (September 2004) http://www.us-cert.gov/cas/bulletins/SB04-252.html.
  9. 9.
    Hursti, H.: Diebold TSx evaluation and security alert (May 2006) http://www.blackboxvoting.org/BBVtsxstudy_OnlinePDF.pdf.
  10. 10.
    Feldman, A., Halderman, J.A., Feiten, E.: Security analysis of the Diebold AccuVote-TS voting machine. Technical report, Princeton University (September 2006)Google Scholar

Copyright information

© International Federation for Information Processing 2007

Authors and Affiliations

  • Matt Bishop
    • 1
  1. 1.Department of Computer ScienceUniversity of CaliforniaDavisUSA

Personalised recommendations