Aranha et al., 2019 - Google Patents
The return of software vulnerabilities in the Brazilian voting machineAranha et al., 2019
View PDF- Document ID
- 17944675438615370935
- Author
- Aranha D
- Barbosa P
- Cardoso T
- Araújo C
- Matias P
- Publication year
- Publication venue
- Computers & Security
External Links
Snippet
This paper presents a detailed and up-to-date security analysis of the voting software used in Brazilian elections based on results obtained by the authors in a recent hacking challenge organized by the national electoral authority. During the event, multiple serious …
- 238000000034 method 0 abstract description 38
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Aranha et al. | The return of software vulnerabilities in the Brazilian voting machine | |
Springall et al. | Security analysis of the Estonian internet voting system | |
Kohno et al. | Analysis of an electronic voting system | |
van Oorschot | Computer Security and the Internet | |
Balzarotti et al. | An experience in testing the security of real-world electronic voting systems | |
Aranha et al. | Software vulnerabilities in the Brazilian voting machine | |
Calandrino et al. | Source code review of the Diebold voting system | |
US10255171B2 (en) | Test methodology for detection of unwanted cryptographic key destruction | |
Aranha et al. | Crowdsourced integrity verification of election results: An experience from Brazilian elections | |
Fink et al. | TPM meets DRE: Reducing the trust base for electronic voting using trusted platform modules | |
Blanchard et al. | An analysis of the security and privacy issues of the Neovote online voting system | |
Pegorini et al. | Security and threats in the Brazilian e-voting system: a documentary case study based on public security tests | |
Sutopo et al. | On the Auditability of the Estonian IVXV System: And an Attack on Individual Verifiability | |
Essex et al. | Eperio: Mitigating technical complexity in cryptographic election verification | |
Almeida et al. | Impact of Decentralization on Electronic Voting Systems: A Systematic Literature Survey | |
Heinl et al. | AntiPatterns regarding the application of cryptographic primitives by the example of ransomware | |
Davtyan et al. | Integrity of electronic voting systems: fallacious use of cryptography | |
WO2006040757A1 (en) | A system and method for authenticating and validating the linkage between input files and output files in a computational process | |
Sastry | Verifying security properties in electronic voting machines | |
Bojanova et al. | Information exposure (IEX): A new class in the bugs framework (BF) | |
Beri et al. | Dynamic software component authentication for autonomous systems using slack space | |
Suriadi et al. | Modeling and verification of privacy enhancing protocols | |
Warutumo | A Web based tool for securing digital evidence | |
Chau | Systematic Evaluations Of Security Mechanism Deployments | |
Lang | A new portable digital forensics curriculum |