Monday, August 10, 2009

New Video: Computer Scientists Demo Voting Machine Vulnerability

Computer scientists demonstrated that criminals could hack an electronic voting machine and steal votes using a malicious programming approach that had not been invented when the voting machine was designed. The team of scientists from University of California, San Diego, the University of Michigan, and Princeton University employed “return-oriented programming” to force a Sequoia AVC Advantage electronic voting machine to turn against itself and steal votes. Read the academic paper and learn about the computer scientists at https://cseweb.ucsd.edu/groups/security/avc/





the same video is also available via YouTube:

Voting security video interview with Hovav Shacham





Above is a four minute video on voting machine security from Hovav Shacham, a UC San Diego computer science professor. Shacham and colleagues presented this work on Monday August 10, 2009 at the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE 2009), the premier academic forum for voting security research.

The same video is also up on YouTube:

Images: Computer Scientists Take Over Electronic Voting Machine with New Programming Technique









Above are the three images from the pape“Can DREs Provide Everlasting Security? The Case of Return-Oriented Programming and the AVC Advantage” by Stephen Checkoway,University of California, San Diego; Ariel J. Feldman, Princeton University; Brian Kantor, University of California, San Diego; J. Alex Halderman, University of Michigan; Edward W. Felten, Princeton University; Hovav Shacham, University of California, San Diego.

The computer scientists presented this work on August 10, 2009 at the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE 2009), the premier academic forum for voting security research.