Attacking the Washington, D.C. internet voting system

58Citations
Citations of this article
110Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In 2010, Washington, D.C. developed an Internet voting pilot project that was intended to allow overseas absentee voters to cast their ballots using a website. Prior to deploying the system in the general election, the District held a unique public trial: a mock election during which anyone was invited to test the system or attempt to compromise its security. This paper describes our experience participating in this trial. Within 48 hours of the system going live, we had gained near-complete control of the election server. We successfully changed every vote and revealed almost every secret ballot. Election officials did not detect our intrusion for nearly two business days-and might have remained unaware for far longer had we not deliberately left a prominent clue. This case study-the first (to our knowledge) to analyze the security of a government Internet voting system from the perspective of an attacker in a realistic pre-election deployment-attempts to illuminate the practical challenges of securing online voting as practiced today by a growing number of jurisdictions. © 2012 Springer-Verlag.

Cite

CITATION STYLE

APA

Wolchok, S., Wustrow, E., Isabel, D., & Halderman, J. A. (2012). Attacking the Washington, D.C. internet voting system. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7397 LNCS, pp. 114–128). https://doi.org/10.1007/978-3-642-32946-3_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free