Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

Analyzing internet voting security

Published: 01 October 2004 Publication History

Abstract

An extensive assessment of a proposed Internet-based voting system.

References

[1]
California Secretary of State Ad Hoc Touchscreen Voting Task Force Report; www.ss.ca.gov/elections/taskforce_report.htm.
[2]
Houle, K.J. and Weaver, G.M. Trends in Denial of Service Attack Technology. Technical Report, CERT Coordination Center (Oct. 2001).
[3]
Jefferson, D.R., Rubin, A.D., Simons, B., and Wagner, D. A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE); www.servesecurityreport.org/.
[4]
Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.S. Analysis of an electronic voting system. IEEE Security and Privacy (2004).
[5]
Moore, D., Paxson, V., Savage, S., Shannon, C., Staniford, S., and Weaver, N. Inside the Slammer worm. IEEE Security and Privacy (2003).
[6]
Moore, D., Voelker, G.M., and Savage, S. Inferring Internet denial-of-service activity. Usenix Security (2001).
[7]
Staniford, S., Paxson, V., and Weaver, N. How to own the Internet in your spare time. Usenix Security (2002).

Cited By

View all
  • (2024)Remote electronic voting: application experience in Russia and abroadJournal of Political Research10.12737/2587-6295-2024-8-1-3-208:1(3-20)Online publication date: 6-Apr-2024
  • (2024)Remote Secure Online Voting System DevelopmentUniversal Access in Human-Computer Interaction10.1007/978-3-031-60881-0_4(51-65)Online publication date: 29-Jun-2024
  • (2022)A Systematic Literature Review and Meta-Analysis on Scalable Blockchain-Based Electronic Voting SystemsSensors10.3390/s2219758522:19(7585)Online publication date: 6-Oct-2022
  • Show More Cited By

Recommendations

Reviews

Edgar R. Weippl

Even though this article on voting security is five years old, the basic requirements have not changed and astonishingly little progress has been made in establishing secure voting systems in real-world elections. Much remains to be done to make decision makers aware of the threats to the security of both Internet voting and electronic voting machines. In addition to the widely known and discussed issues of electronic voting machines, Internet voting has the major (and, in practical terms, unsolvable) issue of running in an uncontrolled environment. Thus, many software vulnerabilities, including viruses, worms, and rootkits, affect the integrity of the voting system. Malware for e-voting systems would also include programs that users willingly install to, for instance, sell their votes. While many threats also exist in the traditional voting process, electronic voting increases the risk because attacks scale much better online. This article summarizes the security evaluation performed on SERVE, an initiative to make voting easier for military personnel deployed overseas and for nonresident US citizens. SERVE is even riskier than the much-criticized voting machines because it is deployed on the voters' PCs; clearly, local malware and rootkits may compromise the integrity of the entire voting process. Vulnerabilities include vote buying and insider attacks. Due to the security analysis, the Pentagon decided not to implement SERVE for the 2004 election. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 47, Issue 10
Voting systems
October 2004
95 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/1022594
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 October 2004
Published in CACM Volume 47, Issue 10

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)161
  • Downloads (Last 6 weeks)12
Reflects downloads up to 20 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Remote electronic voting: application experience in Russia and abroadJournal of Political Research10.12737/2587-6295-2024-8-1-3-208:1(3-20)Online publication date: 6-Apr-2024
  • (2024)Remote Secure Online Voting System DevelopmentUniversal Access in Human-Computer Interaction10.1007/978-3-031-60881-0_4(51-65)Online publication date: 29-Jun-2024
  • (2022)A Systematic Literature Review and Meta-Analysis on Scalable Blockchain-Based Electronic Voting SystemsSensors10.3390/s2219758522:19(7585)Online publication date: 6-Oct-2022
  • (2022)Handwritten Marking Recognition Ballot System Based on Shen Filtering2022 Asia Conference on Algorithms, Computing and Machine Learning (CACML)10.1109/CACML55074.2022.00078(426-430)Online publication date: Mar-2022
  • (2021)Distributed Internet voting architecture: A thin client approach to Internet votingJournal of Information Technology10.1177/0268396220978983(026839622097898)Online publication date: 15-Feb-2021
  • (2021)Applying Human Behaviour Recognition in Cloud Authentication Method—A ReviewProceedings of International Conference on Emerging Technologies and Intelligent Systems10.1007/978-3-030-85990-9_45(565-578)Online publication date: 3-Dec-2021
  • (2020)Qualitative analysis to determine decision-makers’ attitudes towards e-government services in a De-Facto stateJournal of Information, Communication and Ethics in Society10.1108/JICES-05-2019-0052ahead-of-print:ahead-of-printOnline publication date: 14-Feb-2020
  • (2020)The effectiveness of e-corporate governance: an exploratory study of internet voting at shareholders’ annual meetings in FranceCorporate Governance: The International Journal of Business in Society10.1108/CG-04-2019-0116ahead-of-print:ahead-of-printOnline publication date: 1-May-2020
  • (2020)Modelling an E-Voting Domain for the Formal Development of a Software Product Line: When the Implicit Should Be Made ExplicitImplicit and Explicit Semantics Integration in Proof-Based Developments of Discrete Systems10.1007/978-981-15-5054-6_1(3-18)Online publication date: 28-Jul-2020
  • (2019)Is Your Vote Overheard? A New Scalable Side-Channel Attack Against Paper Voting2019 IEEE European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP.2019.00051(621-634)Online publication date: Jun-2019
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media