Climbing Everest: An Inside Look At Voting Systems Used By The State Of Ohio presented at ShmooCon 2008

by Sandy Clark, Eric Cronin, Gaurav Shah, Micah Sherr, Pavol Cerny, Adam Aviv, Matt Blaze (University Of Pennsylvania),

Tags: Security Infrastructure Analysis

Summary : Hanging Chads, Hopping votes, Flipped votes, Tripled votes, Missing memory cards, Machine malfunctions, Software glitches, Undervotes, Overvotes. Reports of voting machine failures flooded the news after the last elections and left most voters wondering "Does my vote really count?" "Can these electronic voting machines be trusted?" "How secure are my state’s voting systems?" We just finished an in depth, source code and hardware analysis of all the voting systems used by the state of Ohio . Come find out what we learned, and draw your own conclusions
Bio - Sandy Clark
Sandy (Mouse) has been taking things apart since the age of two, and still hasn’t learned to put them back together. Luckily, in the University of Pennsylvania’s Distributed Systems Lab, this behavior is actively encouraged. A founding member of Toool-USA, she also enjoys puzzles, toys, Mao and infrastructure hacking. Her research explores human scale security and the unexpected ways that systems interact.
Bio - Matt Blaze
Matt is an associate professor of computer and information sciences and director of the Trusted Network Eavesdropping and Countermeasures project at the University of Pennsylvania. His research interests include secure systems, cryptology and cryptographic protocols, and large-scale systems.
Bio - Eric Cronin
Eric is a Ph.D. candidate in computer and information sciences at the University of Pennsylvania. A longtime member of the hacker community, his research interests include network security, privacy, and distributed systems.
Bio - Gaurav Shah
Gaurav is a Ph.D. candidate in computer and information sciences at the University of Pennsylvania. His research interests include covert channels, network security and distributed systems. His work on Keyboards and Covert Channels won Best Student Paper at Usenix Security Symposium 2006.
Bio - Micah Sherr
Micah is a PhD Candidate in the Department of Computer and Information Science at the University of Pennsylvania. His academic interests include anonymity, e-voting security, and eavesdropping and wiretap systems.
Bio - Pavol Cerny
Pavol is a PhD student at the University of Pennsylvania. His research interests include algorithmic verification of confidentiality and other security properties. He graduated from ENS Paris in 2003.
Bio - Adam Aviv
Adam is a PhD student at the University of Pennsylvania. He received his undergraduate degree from Columbia University.