Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007) 2007
DOI: 10.1109/acsac.2007.16
|View full text |Cite
|
Sign up to set email alerts
|

Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Scan E-Voting

Abstract: Special purpose trusted computing devices are currently being deployed to offer many services for which the general purpose computing paradigm is unsuitable. The nature of the services offered by many of these devices demand high security and reliability, as well as low cost and low power consumption. Electronic Voting machines is a canonical example of this phenomenon. With electronic voting machines currently being used in much of the United States and several other countries, there is a strong need for thor… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
12
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(12 citation statements)
references
References 5 publications
0
12
0
Order By: Relevance
“…An incomplete list of the designs and applications include digital rights management [18,19], access control enforcement [20][21][22], inference control [12], privacy protection [23][24][25], remote attestation services [26][27][28], secure auction [29], e-voting [30], online gaming [31], grid computing [32], and integrity measurement [33]. While these studies demonstrate that TC technology can be used for many good purposes, it is not clear whether these benefits will outweigh the concerns that the users are not trusted from the root.…”
Section: Related Workmentioning
confidence: 99%
“…An incomplete list of the designs and applications include digital rights management [18,19], access control enforcement [20][21][22], inference control [12], privacy protection [23][24][25], remote attestation services [26][27][28], secure auction [29], e-voting [30], online gaming [31], grid computing [32], and integrity measurement [33]. While these studies demonstrate that TC technology can be used for many good purposes, it is not clear whether these benefits will outweigh the concerns that the users are not trusted from the root.…”
Section: Related Workmentioning
confidence: 99%
“…The current implementations were shown (cf. [2], [11], [17], [16]) to lack cryptographic integrity and authenticity, rendering the media vulnerable to attacks. Such attacks were demonstrated for both ES&S M100 OS in [2] and for the AV-OS in [17], [11], [16].…”
Section: Security Vulnerabilities In Elections Using Os Electionmentioning
confidence: 99%
“…[2], [11], [17], [16]) to lack cryptographic integrity and authenticity, rendering the media vulnerable to attacks. Such attacks were demonstrated for both ES&S M100 OS in [2] and for the AV-OS in [17], [11], [16]. Attacks can occur prior to the election and target the media or the EMSS system and correspond to the adversarial strategies A Pre EMSS , A Pre Media .…”
Section: Security Vulnerabilities In Elections Using Os Electionmentioning
confidence: 99%
See 2 more Smart Citations