Building Reliable Voting Machine Software

Total Page:16

File Type:pdf, Size:1020Kb

Building Reliable Voting Machine Software Building Reliable Voting Machine Software Ka-Ping Yee B. A. Sc. (University of Waterloo) 1998 A dissertation submitted to the Graduate Division of the University of California, Berkeley in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science Committee in charge: Professor David Wagner, Co-chair Professor Marti Hearst, Co-chair Professor Henry Brady Professor Joseph Hellerstein Fall 2007 The dissertation of Ka-Ping Yee is approved. Professor David Wagner (Co-chair) Date Professor Marti Hearst (Co-chair) Date Professor Henry Brady Date Professor Joseph Hellerstein Date University of California, Berkeley Fall 2007 Building Reliable Voting Machine Software Copyright © 2007 Ka-Ping Yee Permission is granted to copy, distribute, and/or modify this document under the terms of the GNU Free Documentation License, version 1.2 or any later version published by the Free Software Foundation, with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the appendix entitled GNU Free Documentation License. Abstract Building Reliable Voting Machine Software Ka-Ping Yee Doctor of Philosophy in Computer Science University of California, Berkeley Professor David Wagner, Co-chair Professor Marti Hearst, Co-chair I examine the question of how to design election-related software, with particular attention to the threat of insider attacks, and propose the goal of simplifying the software in electronic voting machines. I apply a technique called prerendering to reduce the security-critical, voting-specific software by a factor of 10 to 100 while supporting similar or better usability and accessibility, compared to today’s voting machines. Smaller and simpler software generally contributes to easier verification and higher confidence. I demonstrate and validate the prerendering approach by presenting Pvote, a vote-entry program that allows a high degree of freedom in the design of the user interface and supports synchronized audio and video, touchscreen input, and input devices for people with disabilities. Despite all its capabilities, Pvote is just 460 lines of Python code; thus, it directly addresses the conflict between flexibility and reliability that underlies much of the current controversy over electronic voting. A security review of Pvote found no bugs in the Pvote code and yielded lessons on the practice of adversarial code review. The analysis and design methods I used, including the prerendering technique, are also applicable to other high-assurance software. Professor David Wagner Professor Marti Hearst 1 This dissertation is dedicated to those who work to run elections everywhere in the world: registrars, officers, pollworkers, clerks, judges, scrutineers, observers, and everyone else involved in the process. You carry out the mechanisms that make democracy work; this research is devoted to helping you make democracy work better. i Preface The democracy upon which our modern society is built ultimately depends on a system that collects and counts votes. For many voters in the United States and other countries, nearly every part of that system relies on computer software in some way. If you had to design that software, how would you do it? This dissertation offers an exploration of that question and a proposed answer: create the simplest possible voting machine software. I use a technique called prerendering to reduce the critical voting-specific software by a factor of 10 to 100 while supporting similar or better accessibility and usability, compared to today’s machines. Central to this dissertation is the story of Pvote, the program I developed to realize this goal. The first reason to simplify software is the threat of an insider attack. The challenge is to prevent not just inadvertent flaws, but flaws intentionally crafted by programmers who stand to gain from subverting their own software. The only way to meet this challenge is to require simpler software. The second reason is that much of the controversy over electronic voting stems from a conflict between flexibility and reliability. Computers offer the promise of broader and more effective access to voting, but computer programs are more complicated and fragile than hand-counted paper ballots. Simplifying the voting machine software mitigates this dilemma. The problem of electronic voting is illustrative of the challenges of building reliable software in general. In particular, I report on insights from the Pvote work about managing the complexity of high-assurance software and about reviewing software for correctness without assuming trust in its author. Both are relevant to the prevention of insider attacks, which are a thorny and long-standing problem in software security. ii This dissertation is intended for several audiences: • Election staff, policymakers, and activists: If you run elections or influence how elections are conducted, I hope to make you aware of the perils of complexity in software (Chapters 1 and 9), and to calibrate your tolerance for complexity in election software by demonstrating how much it can be simplified. I also hope to contribute to your understanding of the tradeoffs among various choices of voting equipment and verification methods (Chapter 3). • Engineers: If you build software, you may be able to achieve greater confidence in it using the analysis, design, and review strategies presented here (Chapters 2, 3, and 8). If you develop voting machines, you can apply the prerendering strategy to create more reliable software (Chapter 4), use ideas from Pvote’s design and implementation (Chapters 5, 6, and 7), or use the Pvote code as a basis for your own software (Appendices A and B). • Researchers: If you investigate software reliability or security, you may be interested in assurance trees (Chapter 2), a way of structuring assurance claims during software design, prerendering (Chapter 4) as a strategy for reducing the trusted code base of a system, or derivation maps (Chapter 9) for understanding sources of vulnerability to insiders and the effects of shifting complexity among components. The Pvote review experience (Chapter 8 and Appendix E) motivates research challenges in the design of programming languages, development environments, and reviewing tools to support adversarial code review. • Designers: If you practice visual design or interaction design, you may be interested to learn how prerendering (Chapter 4), the main software approach presented here, can offer you unprecedented freedom in designing electronic ballots and new opportunities for advancing democracy through the power of design. Preface iii Contributions This is a quick guide to the main contributions of this work and where to find them. 1. A set of correctness properties for voting software derived as an assurance tree (page 24). 2. An assurance chart comparing types of voting systems according to the verification mechanisms available to voters at each step of the voting process (page 56). 3. User interface prerendering, a technique for reducing the complexity of critical software components (page 57). 4. Pvote’s ballot definition file format, a platform-independent format for describing the ballot and the voting user interface in a prerendered user interface voting system (page 121). 5. The software design of Pvote, a vote-entry program with support for a wide range of ballot designs and voters with disabilities (page 127). 6. A set of desirable properties of programming languages to support adversarial code review (page 149). 7. Lessons learned from the Pvote security review, the first open adversarial code review of voting software designed for minimal complexity and high assurance (page 153). 8. Derivation mapping, a method of diagramming the provenance of a security-critical artifact to identify sources of vulnerability to insider attacks (page 161). 9. A security argument for the use of high-level programming languages in high-assurance software (page 173). 10. Proof by construction (the implementation of Pvote) that a fully featured user interface for voting can be implemented in 460 lines of Python (page 217). 11. A security analysis and a set of assurance arguments for Pvote, which are given in a separate document [92]. iv Acknowledgements I have been extremely lucky to have David Wagner and Marti Hearst as my advisors. They supervised and supported this work, and provided me with guidance and insight during my career as a graduate student. They removed obstacles and sought out opportunities for me. Their responsiveness and detailed feedback have been fantastic. I also thank Henry Brady and Joe Hellerstein, who served on my committee and went out of their way to review this dissertation on a short time frame. Steve Bellovin suggested the idea of prerendering, which sparked this work. Candy Lopez of the Contra Costa County Elections Department patiently showed me how real elections are run. Scott Luebking and Noel Runyan helped me understand the accessibility issues surrounding voting. Matt Bishop, Ian Goldberg, Tadayoshi Kohno, Mark Miller, Dan Sandler, and Dan Wallach generously volunteered many, many hours of their time to serve as expert reviewers in the Pvote security review. Joseph Hall has been a wonderful resource on election policy. Debra Bowen and David Wagner created and gave me the rare opportunity to review the source code of a widely used commercial voting system in the California Top-to-Bottom Review. It was a privilege to work with my collaborators on that project: Matt Blaze, Arel Cordero, Sophie Engle, Chris Karlof, Naveen Sastry, Micah Sherr, and Till Stegers. Public attention to electronic voting did not appear overnight; it is the result of a long history of hard work by civic-minded heroes such as David Dill (founder of the Verified Voting Foundation), Avi Rubin (director of ACCURATE), and many others. Their efforts are a big part of what has made research like mine possible. This work was funded by the National Science Foundation, through ACCURATE. v Mark Miller, Jonathan Shapiro, and Marc Stiegler sparked my interest in computer security and have deeply shaped my understanding of it through many years of fruitful collaboration and shared wisdom.
Recommended publications
  • NIST Voting Presentation
    Improving U.S. Voting Systems NIST VOTING Mary Brady Voting Program Manager NIST [email protected] Josh Franklin Lead, NIST Voting Security [email protected] ISPAB 10/25/2017 1 Improving U.S. Voting Systems Topics • VVSG 2.0 Development • VVSG Scope • VVSG Structure • VVSG: Principles and Guidelines • Requirements & Test Assertions • Cybersecurity and Elections 2 Improving U.S. Voting Systems VVSG 2.0 Development EAC Standards Board of TGDC Board Advisors NIST Director Voting Guidelines • Tap into as many experts as possible NIST PWG’s • Get continual feedback Improving U.S. Voting Systems Together…Making It Happen NIST NASED EAC FVAP IEEE Goals Military/Overseas Voters High-level, Election plain language Process principles Common Data Format Legal Requirements Common Accessibility Threads Requirements -> verified code Improving U.S. Voting Systems NIST-EAC Public Working Groups Election Groups • Developed election process models that served as the basis for use cases and the core functions • Pre-Election (103 members) • Election: (107 members) • Post-Election: (96 members) Constituency Groups • Conducted gap analyses and developed draft VVSG 2.0 Principles and Guidelines • U&A (105 members) • Cybersecurity (121 members) • Interoperability (158 members) • Testing (84 members) 5 Improving U.S. Voting Systems Election Models 6 Improving U.S. Voting Systems Reaching Consensus on VVSG Scope Election Election Process Use Case Core WGs Models Scenarios Functions Pre, • TGDC • Standards Election, • EAC/NIST Board • PWG Chairs • Board of and Post Advisors • NASED Improving U.S. Voting Systems A New VVSG Structure EAC NASED EAC VVSG NASED Input Roundtable / TGDC, SB, BoA Subgroup / Futures Group to EAC / NIST Public Adoption NIST Meetings 8 Improving U.S.
    [Show full text]
  • Black Box Voting Ballot Tampering in the 21St Century
    This free internet version is available at www.BlackBoxVoting.org Black Box Voting — © 2004 Bev Harris Rights reserved to Talion Publishing/ Black Box Voting ISBN 1-890916-90-0. You can purchase copies of this book at www.Amazon.com. Black Box Voting Ballot Tampering in the 21st Century By Bev Harris Talion Publishing / Black Box Voting This free internet version is available at www.BlackBoxVoting.org Contents © 2004 by Bev Harris ISBN 1-890916-90-0 Jan. 2004 All rights reserved. No part of this book may be reproduced in any form whatsoever except as provided for by U.S. copyright law. For information on this book and the investigation into the voting machine industry, please go to: www.blackboxvoting.org Black Box Voting 330 SW 43rd St PMB K-547 • Renton, WA • 98055 Fax: 425-228-3965 • [email protected] • Tel. 425-228-7131 This free internet version is available at www.BlackBoxVoting.org Black Box Voting © 2004 Bev Harris • ISBN 1-890916-90-0 Dedication First of all, thank you Lord. I dedicate this work to my husband, Sonny, my rock and my mentor, who tolerated being ignored and bored and galled by this thing every day for a year, and without fail, stood fast with affection and support and encouragement. He must be nuts. And to my father, who fought and took a hit in Germany, who lived through Hitler and saw first-hand what can happen when a country gets suckered out of democracy. And to my sweet mother, whose an- cestors hosted a stop on the Underground Railroad, who gets that disapproving look on her face when people don’t do the right thing.
    [Show full text]
  • Security of Voting Systems Ronald L
    Security of Voting Systems Ronald L. Rivest MIT CSAIL Given at: GWU Computer Science Dept. November 9, 2009 Voting is Easy… ??? "What's one and one and one and one and one and one and one and one and one and one?" "I don't know," said Alice. "I lost count." “She can't do addition," said the Red Queen. There are three kinds of people working on elections: 1. those who can count 2. and those who can’t. ? Outline Voting technology survey What is being used now ? Voting Requirements Security Threats Security Strategies and Principles New voting systems proposals: “Twin” and “Scantegrity II” Voting Tech Survey Public voting Paper ballots Lever machines Punch cards Optical scan DRE (Touch-screen) DRE + VVPAT (paper audit trail) Vote by mail (absentee voting) Internet voting (?) New voting methods (“end-to-end”), involving invisible ink, multiple ballots, scratch-off, cryptography, and other innovations… Public Voting The County Election. Bingham. 1846. Paper Ballots Lincoln ballot, 1860, San Francisco “Australian ballot”, 1893, Iowa city Lever Machines Invented in 1892. Production ceased in 1982. See “Behind the Freedom Curtain” (1957) Punch card voting Invented 1960’s, based on computerized punch card. Now illegal, by HAVA (Help America Vote Act) of 2002. The famous “butterfly ballot” A “dimpled chad” ??? Optical scan (“opscan”) First used in 1962 DRE (“Touchscreen”) Direct Recording by Electronics First used in 1970’s Essentially, a stand-alone computer DRE + VVPAT DRE+Voter-Verified Paper Audit Trail. First used in 2003. Vote By Mail Often used for absentee voting, but some states use it as default.
    [Show full text]
  • Electronic Voting & Counting Technologies
    ELECTION TECHNOLOGY SERIES Electronic Voting & Counting Technologies A Guide to Conducting Feasibility Studies Ben Goldsmith Senior Electoral Advisor Electronic Voting & Counting Technologies Ben Goldsmith Senior Electoral Advisor International Foundation for Electoral Systems Electronic Voting & Counting Technologies A Guide to Conducting Feasibility Studies Ben Goldsmith Senior Electoral Advisor May 2011 Any opinions, findings, conclusions or recommendations expressed in this publication are those of the author(s) and do not necessarily reflect the views of the International Foundation for Electoral Systems. ACKNOWLEDGEMENTS Electronic Voting & Counting Technologies: A Guide to Conducting Feasibility Studies Ben Goldsmith © 2011 by IFES. All rights reserved. International Foundation for Electoral Systems (IFES) 1850 K Street, NW Fifth Floor Washington, D.C. 20006 U.S.A. Notice of rights All rights reserved. No part of this report can be reproduced or transmitted in any form by any means without the prior permission of the publisher. Printed in USA ISBN: 1-931459-64-9 Photo Credits Cover: Ripple Effect Productions Page 36: Ripple Effect Productions Garie Briones Page 51: Lean Pasion Page 1: John Lawrence Page 59: Everton Bahl Grabski Page 9: Francisco Samões Page 70: Júlio Henrique da Silva Lopes Page 17: Ripple Effect Productions Page 75: Oliver Scott-Tomlin Page 25: João Cesário ACKNOWLEDGEMENTS Thanks are due to a number of colleagues and friends who were kind enough to take the time to review and comment on the initial drafts of this guide. Special thanks are due to Susanne Caarls, Peter Erben, Juhani Grossmann, Ole Holtved, Manuel Kripp, Ronan McDermott, Vladimir Pran, Amna Qayyum and Mike Yard, all of whom provided invaluable suggestions for improvements and additional areas which needed to be covered by the guide.
    [Show full text]
  • On the Notion of “Software Independence” in Voting Systems
    On the notion of “software independence” in voting systems Ronald L. Rivest John P. Wack Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cambridge, MA 02139 [email protected] National Institute of Standards and Technology (NIST) Information Technology Laboratory Gaithersburg, MD 20899 [email protected] DRAFT Version July 28, 2006 Abstract. This paper defines and explores the notion of “software in- dependence” in voting systems: A voting system is software-independent if an undetected change or error in its software cannot cause an undetectable change or error in an election outcome. We propose that software independent voting systems should be pre- ferred, and software-dependent voting systems should be avoided. VVPAT and some cryptographically-based voting systems are software-independent. Variations and implications of this definition are explored. This white paper is also for discussion by the Technical Guidelines Devel- opment Committee (TGDC) in its development of the Voluntary Voting System Guidelines (VVSG) of 2007. 1 Introduction The main purpose of this paper is to introduce and carefully define the ter- minology of “software-independent” and “software-dependent” voting systems, and to discuss their properties. This paper is definitional in character; there are no “results” as such. The contribution is to help provide crisp terminology for discussing voting systems and some recommendations for its usage in the VVSG 2007, currently under development by NIST and the TGDC. This paper starts by describing the problem that software-independence ad- dresses: complex and difficult-to-test software in voting systems. It then defines what constitutes a software-independent approach to voting system design.
    [Show full text]
  • VVSG Comments
    Before the U.S. ELECTION ASSISTANCE COMMISSION In the Matter of ) COMMENTS SUBMISSION ) VOLUNTARY VOTING SYSTEM ) Pursuant to 84 FR 6775, Doc. No.: 2019-03453 ) GUIDELINES VERSION 2.0 ) Wednesday, May 29th, 2019 ) DEVELOPMENT ) EAC Offices, Silver Spring, MD PUBLIC COMMENTS SUBMISSION OSET INSTITUTE COMMENTS LED BY GLOBAL DIRECTOR OF TECHNOLOGY EDWARD P. PEREZ REGARDING THE VOLUNTARY VOTING SYSTEM GUIDELINES VERSION 2.0 PRINCIPLES AND GUIDELINES Comment #1 Issue: Principles and Guidelines vs. Functional Requirements Reference: Overall VVSG 2.0 Structure The OSET Institute applauds the U.S. Election Assistance Commission (hereinafter, “EAC”) for making efforts to ensure that the future Voluntary Voting System Guidelines (VVSG) certification program is more flexible and agile than it has been in the past. With increasingly faster advances of technology matched by newly emerging cyber-security threats, it is essential for the VVSG to support regular adaptation and modification. Toward that end, VVSG 2.0's initial distinction between "Principles and Guidelines" versus "Functional Requirements" is well placed and laudable. In order to deliver on the promise of such a distinction, the OSET Institute believes that the following programmatic requirements must be adhered to: • “Principles and Guidelines" reflect policy statements, and any modifications to the Principles and Guidelines should require approval of EAC Commissioners. • Functional Requirements (and VSTL test assertions) do not represent policy statements, and their modification should not require approval of EAC Commissioners. Functional Requirements are simply the technical means to operationalize or implement the achievement of policy goals represented in the Principles and Guidelines. • Functional Requirements must support the policy goals represented in the Principles and Guidelines.
    [Show full text]
  • A Secure, Transparent, Auditable, and Reliable Voting System
    USENIX Journal of Election Technology and Systems (JETS) Volume 1, Number 1 • August 2013 STAR-Vote: A Secure, Transparent, Auditable, and Reliable Voting System Susan Bell, Office of the Travis County Clerk Josh Benaloh, Microsoft Research Michael D. Byrne, Rice University Dana DeBeauvoir, Office of the Travis County Clerk Bryce Eakin, independent researcher Gail Fisher, Office of the Travis County Clerk Philip Kortum, Rice University Neal McBurnett, ElectionAudits Julian Montoya, Office of the Travis County Clerk Michelle Parker, Office of the Travis County Clerk Olivier Pereira, Universite´ catholique de Louvain Philip B. Stark, University of California, Berkeley Dan S. Wallach, Rice University Michael Winn, Office of the Travis County Clerk STAR-Vote is a collaboration between a number of academics and the Travis County (Austin), Texas elections office, which currently uses a DRE voting system and previously used an optical scan voting system. STAR-Vote represents a rare oppor- tunity for a variety of sophisticated technologies, such as end-to-end cryptography and risk limiting audits, to be designed into a new voting system, from scratch, with a variety of real world constraints, such as election-day vote centers that must support thousands of ballot styles and run all day in the event of a power failure. This paper describes the current design of STAR-Vote which is now largely settled and whose development will soon begin. 1. INTRODUCTION A decade ago, DRE voting systems promised to improve many aspects of voting. By having a computer mediating the user’s voting experience, they could ostensibly improve usability through summary screens and a variety of accessibility features including enlarged text, audio output, and specialized input devices.
    [Show full text]
  • Cost of Counting the Vote
    Cost of Counting the Vote The Price of Upgrading Voting Systems in 43 U.S. Counties By Aquene Freechild and Hamdi Soysal, Public Citizen’s Democracy Is For People Campaign May 31, 2018 - Amid serious concerns about whether our elections are secure from hackers and computer error, many state and local governments are looking to replace out-of-date paperless voting systems with paper ballot and electronic scanner systems. Pricing of voting equipment is often opaque, and in many cases, prices are negotiated on a local level. To bring some much-needed clarity to the issue, this report examines how much 43 county governments in 10 states paid for voting equipment. With this information in hand, local election officials and citizens can make the most of limited election equipment dollars. The states are: California, Florida, Iowa, Kentucky, Minnesota, Ohio, Oregon, Pennsylvania, Texas and Virginia. Our key finding: While most precinct ballot scanners cost around $5,000 to $6,000, some counties have been able to negotiate more favorable pricing. However, a few counties paid a much higher than average price for their equipment. Our key conclusion: It’s important that counties band together or engage state authorities where appropriate to negotiate prices and get the best contract terms for voting equipment. Leasing equipment is an option for county officials to address the security threats quickly without committing to buying new systems on a short time frame. Limited Federal Funding In the 2018 federal spending bill passed by Congress in March 2018, lawmakers made $380 million in election security funding available to states for replacing paperless voting systems, implementing post-election audits and securing election databases.
    [Show full text]
  • The New Jersey Voting-Machine Lawsuit and the AVC Advantage DRE Voting Machine
    The New Jersey Voting-machine Lawsuit and the AVC Advantage DRE Voting Machine Andrew W. Appel∗ Maia Ginsburg Harri Hursti Brian W. Kernighan Princeton University Princeton University Princeton University Christopher D. Richards Gang Tan Penny Venetis Princeton University Lehigh University Rutgers School of Law – Newark Abstract As a result of a public-interest lawsuit, by Court order we were able to study, for one month, the hardware and source code of the Sequoia AVC Advantage direct-recording electronic voting machine, which is used throughout New Jersey (and Louisiana), and the Court has permitted us to publicly describe almost everything that we were able to learn. In short, these machines are vulnerable to a wide variety of attacks on the voting process. It would not be in the slightest difficult for a moderately determined group or individual to mount a vote-stealing attack that would be successful and undetectable. 1 Litigation and legislation in New Jersey In October 2004 a group of public-interest plaintiffs, represented by Professor Penny Venetis of the Rutgers Law School, sued the State of New Jersey (in NJ Superior Court) over the State’s use of direct-recording electronic (DRE) voting machines in New Jersey. By 2004, most of New Jersey’s counties had adopted the Sequoia AVC Advantage full-face DRE. Currently 18 out of New Jersey’s 21 counties use this DRE. The plaintiffs argued that the use of DRE voting machines is illegal and unconstitutional: illegal, because they violate New Jersey election laws requiring that all votes be counted accurately and that voting machines be thoroughly tested, accurate, and reliable; and unconstitutional, because they violate the New Jersey constitution’s requirement that all votes count.1 The plaintiffs argued that one cannot trust a paperless DRE machine to count the vote.
    [Show full text]
  • Auditing Technology for Electronic Voting Machines
    CALTECH/MIT VOTING TECHNOLOGY PROJECT A multi-disciplinary, collaborative project of the California Institute of Technology – Pasadena, California 91125 and the Massachusetts Institute of Technology – Cambridge, Massachusetts 02139 AUDITING TECHNOLOGY FOR ELECTRONIC VOTING MACHINES Sharon B. Cohen MIT Key words: DRE, voting machine security, electronic voting, electronic voting machines, auditing technology VTP WORKING PAPER #46 May 2005 Auditing Technology for Electronic Voting Machines by Sharon B. Cohen Submitted to the Department of Electrical Engineering and Computer Science in Partial Fulfillment of the Requirements for the Degrees of Bachelor of Science in Computer Science and Engineering and Master of Engineering in Electrical Engineering and Computer Science at the Massachusetts Institute of Technology May 19, 2005 Copyright 2005 Sharon B. Cohen. All rights reserved. The author hereby grants to M.I.T. permission to reproduce and distribute publicly paper and electronic copies of this thesis and to grant others the right to do so. Author_________________________________________________________________ Department of Electrical Engineering and Computer Science May 19, 2005 Certified by___________________________________________________________ Ted Selker Thesis Supervisor Accepted by____________________________________________________________ Arthur C. Smith Chairman, Department Committee on Graduate Theses Auditing Technology for Electronic Voting Machines by Sharon B. Cohen Submitted to the Department of Electrical Engineering
    [Show full text]
  • Carback, R.T.: Security Innovations In
    APPROVAL SHEET Title of Thesis: Security Innovations in the Punchscan Voting System Name of Candidate: Richard T. Carback III Master of Science, 2008 Thesis and Abstract Approved: Alan T. Sherman Associate Professor Department of Computer Science and Electrical Engineering Date Approved: April 18th, 2008 Curriculum Vitae Name: Richard T. Carback III. Permanent Address: 2819 Manoff Rd, Halethorpe, MD 21227. Degree and date to be conferred: Master of Science, August 2007. Date of Birth: March 27, 1983. Place of Birth: Baltimore, Maryland. Secondary Education: Chesapeake High School, Pasadena, Maryland, 2001. Collegiate institutions attended: University of Maryland Baltimore County, Master of Science, Computer Science, 2008. Bachelor of Science, Computer Science, 2005. Major: Computer Science. Minor: None. Professional publications: • David Chaum, Richard Carback, Jeremy Clark, Aleksander Essex, Stefan Popoveniuc, Ronald L. Rivest, Peter Y.A. Ryan, Emily Shen, and Alan T. Sherman. Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. Submitted to USENIX EVT 2008. • Russell A. Fink, Alan T. Sherman, and Richard Carback. TPM Meets DRE: Reducing the Trust Base for Electronic Voting using Trusted Platform Modules. Submitted to USENIX EVT 2008. • David Chaum, Aleksander Essex, Richard Carback, Jeremy Clark, Stefan Popoveniuc, Alan T. Sherman, and Poorvi Vora. Scantegrity: End-to- end voter verifiable optical-scan voting. Accepted for publication in IEEE Security and Privacy, volume May/June, 2008. • Stefan Popoveniuc, Jeremy Clark, Richard Carback, and Aleksander Essex. Securing optical-scan voting. Presented at Dagstuhl. To be published in Towards Trustworthy Election Systems in the Lecture Notes in Computer Science series by Spinger-Verlag, date unknown.
    [Show full text]
  • The Help America Vote Act and Election Administration: Overview and Selected Issues for the 2016 Election
    The Help America Vote Act and Election Administration: Overview and Selected Issues for the 2016 Election Arthur L. Burris, Coordinator Section Research Manager Eric A. Fischer Senior Specialist in Science and Technology October 18, 2016 Congressional Research Service 7-5700 www.crs.gov RS20898 The Help America Vote Act and Election Administration: Overview for 2016 Summary The deadlocked November 2000 presidential election focused national attention on previously obscure details of election administration. Congress responded with the Help America Vote Act of 2002 (HAVA; P.L. 107-252). HAVA created the Election Assistance Commission (EAC), established a set of election administration requirements, and provided federal funding, but it did not supplant state and local control over election administration. Several issues have arisen or persisted in the years since HAVA was enacted. Some observers have criticized the EAC for being obtrusive, slow, ineffectual, or even unnecessary. Others believe that the agency is an important resource for improving the election administration. The EAC lacked a quorum of commissioners between 2011 and 2015. HAVA requires computerized state voter registration systems, and its voting-system requirements promote the use of electronic voting systems. However, those systems, especially the kinds that record votes directly into a computer’s memory (DREs), raise concerns about security and reliability. In response, many states have enacted requirements for paper ballot records that can be verified by the voter and used in recounts. All states now use paper-based optical scan systems for at least some voters, and most use them in at least some polling places. DRE systems are also used in most states, in many cases to meet HAVA accessibility requirements, but in several states to serve as the primary voting system in at least some jurisdictions.
    [Show full text]