Abstract
The State of Ohio commissioned the EVEREST study in late summer of 2007. The study participants were charged with an analysis of the usability, stability, and security of all voting systems used in Ohio elections. This paper details the approach and results of the security analysis of the Premier and Hart systems within the EVEREST effort. As in previous studies, we found the election systems to be critically flawed in ways that are practically and easily exploitable. Such exploits could effect election results, prevent legitimate votes from being cast, or simply cast doubt on the legitimacy of the election itself. In this effort we identified new areas of concern including novel exploitable failures of software and election data integrity protection and the discovery of dangerous hidden software features. We begin by describing in depth our systematic methodology for identifying and validating vulnerabilities appropriate for the current complex political climate, and detail and illustrate broad classes of vulnerabilities uncovered using this approach. We conclude by considering the impact of this study both in terms of the tangible vulnerabilities discovered and as a model for performing future analyses.
Original language | English (US) |
---|---|
State | Published - 2008 |
Event | 2008 USENIX/ACCURATE Electronic Voting Technology Workshop, EVT 2008, co-located with the 17th USENIX Security Symposium - San Jose, United States Duration: Jul 28 2008 → Jul 29 2008 |
Conference
Conference | 2008 USENIX/ACCURATE Electronic Voting Technology Workshop, EVT 2008, co-located with the 17th USENIX Security Symposium |
---|---|
Country/Territory | United States |
City | San Jose |
Period | 7/28/08 → 7/29/08 |
All Science Journal Classification (ASJC) codes
- Computer Science Applications
- Human-Computer Interaction
- Electrical and Electronic Engineering
- Public Administration