2009 Fourth International Conference on Risks and Security of Internet and Systems (CRiSIS 2009) 2009
DOI: 10.1109/crisis.2009.5411982
|View full text |Cite
|
Sign up to set email alerts
|

Formal analysis of attacks for e-voting system

Abstract: Recently, the use of formal methods to specify and verify properties of electronic voting (e-voting) systems, with particular interest in security, verifiability, and anonymity, is getting much attention. Formal specification and verification of such systems can greatly help to better understand the system requirements by thoroughly specifying and analyzing the underlying assumptions and security specific properties. Unfortunately, even though these systems have been formally verified to satisfy the desired sy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2011
2011
2015
2015

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…Existing works in this area present formal specification and verification of an e-voting system at different level of abstractions. In this area the work closest in sprit to ours can be grouped in two closely related directions: verifying cryptographic protocols (e.g., Kremer and Ryan (2005), Delaune et al (2009), Cansell et al (2007, Sampigethaya and Poovendran (2006) and Backes et al (2008)) and verifying system behavior (e.g., Tiella et al (2006), Weldemariam et al (2009b), Sturton et al (2009) and Weldemariam et al (2010)). Some of these works selectively apply formal modeling techniques where these techniques add rigor to the development or help assessing an e-voting systems.…”
Section: Related Workmentioning
confidence: 98%
“…Existing works in this area present formal specification and verification of an e-voting system at different level of abstractions. In this area the work closest in sprit to ours can be grouped in two closely related directions: verifying cryptographic protocols (e.g., Kremer and Ryan (2005), Delaune et al (2009), Cansell et al (2007, Sampigethaya and Poovendran (2006) and Backes et al (2008)) and verifying system behavior (e.g., Tiella et al (2006), Weldemariam et al (2009b), Sturton et al (2009) and Weldemariam et al (2010)). Some of these works selectively apply formal modeling techniques where these techniques add rigor to the development or help assessing an e-voting systems.…”
Section: Related Workmentioning
confidence: 98%
“…Finally, although not directly related with PbD for the sake of completeness are worth to mention approaches solely focused on either (i) quantitative threat modeling (e.g., in TMAP [19] which quantifies threats related with Commercial Off The Shelf systems -COTS -), (ii) security requirements elicitation methodologies based on risk analysis (e.g., CORAS [14], OCTAVE [20] and ISRAM [21] although they are not embedded into a TMM and -except for ISRAM -do not consider the quantitative aggregation of risks), (iii) rigorous methods for analyzing security specifications (e.g., Weldemariam and Villafiorita [22], [23] where model checking is used to derive security attacks in a e-voting scenario) and, (iv) qualitative methods to elicit security requirements (e.g., DESEREC [24]). …”
Section: Related Workmentioning
confidence: 99%