Voting System Design Pitfalls: Vulnerability Analysis And Exploitation Of A Model Platform
Abstract
Homomorphic encryption may be seen as a substantial potential boon to voting systems. If properly used, it allows provably anonymous elections to take place. However, when poorly constructed, using weak cryptographic primitives results in highly vulnerable systems that are prone to attacks. This paper details one attack done against a model of an election system as part of a security competition, where a hardware Trojan has weakened its security. We designed a proof of concept exploit and implemented it on an FPGA, demonstrating weaknesses in the system regardless of the existence of this Trojan.
Publication Date
11-22-2016
Publication Title
Proceedings of the 34th IEEE International Conference on Computer Design, ICCD 2016
Number of Pages
149-152
Document Type
Article; Proceedings Paper
Personal Identifier
scopus
DOI Link
https://doi.org/10.1109/ICCD.2016.7753273
Copyright Status
Unknown
Socpus ID
85006791344 (Scopus)
Source API URL
https://api.elsevier.com/content/abstract/scopus_id/85006791344
STARS Citation
Ly, Kelvin; Arias, Orlando; Wurm, Jacob; Hoang, Khoa; and Shamsi, Kaveh, "Voting System Design Pitfalls: Vulnerability Analysis And Exploitation Of A Model Platform" (2016). Scopus Export 2015-2019. 4262.
https://stars.library.ucf.edu/scopus2015/4262