Assignment
- Week 2 (1/23):
- Week 3 (1/30):
- Week 5 (2/15):
- Weak 6 (2/22):
- Week 7 (2/29):
- View Dr. Roger Jonston's keynote speech "Proving Voltaire Right: Security Blunders Dumber Than Dog Snot" at USENIX Security Symposium 2010.
- At 12:39 point there is a presentation of the vulnerabilties of a voter machine, followed by RFID/GPS Spoofing attacks.
- At 25 point there is a presentation on insider threats followed by temper proofing blunders.
- A Practical Secret Voting Scheme for Large Scale Election, by Atsushi Fujioka, Tatsuaki Okamoto, and Kazuo Ohta. See a list of important evoate related properties discussed. [FOO92] Fujioka, Atsushi, Tatsuaki Okamoto, and Kazui Ohta. “A practical secret voting scheme for large scale elections.” Advances in Cryptology – AUSCRYPT ’92. Springer-Verlag, Berlin, 1993
- Security Analysis of the Diebold AccuVote-TS Voting Machine, by Ariel J. Feldman*, J. Alex Halderman*, and Edward W. Felten, 2007 USENIX Electronic Voting Technology Workshop, August 6, 2007, Boston, MA. http://static.usenix.org/event/evt07/tech/full_papers/feldman/feldman_html/
- Brett Wilson's master reports.
- Week 9 (3/12):
- Week 12 (4/2):