{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:11:24Z","timestamp":1743117084509,"version":"3.40.3"},"publisher-location":"Cham","reference-count":55,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031818875"},{"type":"electronic","value":"9783031818882"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81888-2_2","type":"book-chapter","created":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T12:50:04Z","timestamp":1740747004000},"page":"23-39","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["On the\u00a0Security of\u00a0Electronic Voting Systems"],"prefix":"10.1007","author":[{"given":"Jason","family":"Green","sequence":"first","affiliation":[]},{"given":"Abdolhossein","family":"Sarrafzadeh","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Patooghy","sequence":"additional","affiliation":[]},{"given":"Mahdi","family":"Hesar","sequence":"additional","affiliation":[]},{"given":"Mohd","family":"Anwar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,28]]},"reference":[{"issue":"3","key":"2_CR1","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1089\/elj.2019.0619","volume":"193","author":"A Appel","year":"2020","unstructured":"Appel, A., DeMillo, R., Stark, P.: Ballot-marking devices cannot ensure the will of the voters. Election Law J. Rules Polit. Policy 193(3), 432\u2013450 (2020)","journal-title":"Election Law J. Rules Polit. Policy"},{"issue":"4","key":"2_CR2","first-page":"979","volume":"49","author":"K Breedon","year":"2019","unstructured":"Breedon, K., Bryant, A.: Counting the votes: electronic voting irregularities, election integrity and public corruption. Univ. Memphis Law Rev. 49(4), 979\u20131017 (2019)","journal-title":"Univ. Memphis Law Rev."},{"unstructured":"Brumback, K.: Cyber agency: voting software vulnerable in some states. AP News, 31 May 2022","key":"2_CR3"},{"unstructured":"Burt, T.: Statement from Tom Burt, President and CEO of Election Systems & Software at the Hearing on 2020 Election Security \u2013 Perspectives from Voting System Vendors and Experts, The Committee on House Administration, U.S. House of Representatives, Washington, DC, 9 January 2020. www.essvote.com\/media-resources\/hearing-election-security-ess-statement","key":"2_CR4"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/j.future.2020.04.031","volume":"110","author":"J Carrillo-Mondejar","year":"2020","unstructured":"Carrillo-Mondejar, J.: Characterizing Linux-based malware: Findings and recent trends. Futur. Gener. Comput. Syst. 110, 267\u2013281 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"key":"2_CR6","series-title":"The International Library of Ethics, Law and Technology","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29053-5","volume-title":"The Ethics of Cybersecurity","year":"2020","unstructured":"Christen, M., Gordijn, B., Loi, M. (eds.): The Ethics of Cybersecurity. TILELT, vol. 21. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-29053-5"},{"unstructured":"Cybersecurity and Infrastructure Security Agency, Vulnerabilities affecting Dominion Voting Systems ImageCast\u00a0X, ICS Advisory, Alert Code: ICSA-22-154-01, Washington, DC, 3 June 2022. (www.cisa.gov\/news-events\/ics-advisories\/icsa-22-154-01","key":"2_CR7"},{"unstructured":"Danon and Proofpoint Threat Insight Team, 2020 election threats: An overview of our research. Proofpoint Blog, 30 October 2020. www.proofpoint.com\/us\/blog\/threat-insight\/2020-election-threats-overview-our-research","key":"2_CR8"},{"unstructured":"Dominion Voting Systems, Democracy Suite EMS Results Tally and Reporting User Guide, Version 5.11-CO:7, Denver, Colorado (2019). https:\/\/web-storage1.pilled.net\/pdc1\/old\/proofs\/63c500e7-aafb-0979-6aa2-784e19ed8f9b\/UG-RTR-UserGuide-5-11-CO.pdf","key":"2_CR9"},{"unstructured":"Dominion Voting Systems, Democracy Suite Use Procedures, Version: 5.10-CA:11, Denver, Colorado (2020). https:\/\/votingsystems.cdn.sos.ca.gov\/vendors\/dominion\/ds510-use-proc-jan.pdf","key":"2_CR10"},{"unstructured":"Dominion Voting Systems, 2.02 \u2013 Democracy Suite System Overview, Version: 5.13-CO:8, Denver, Colorado (2021). www.coloradosos.gov\/pubs\/elections\/VotingSystems\/DVS-DemocracySuite513\/documentation\/2-02-SystemOverview5-13.pdf","key":"2_CR11"},{"unstructured":"Dominion Voting Systems, Democracy Suite ImageCast\u00a0X User Guide, Version: 5.13-CO:11, Denver, Colorado (2021). www.coloradosos.gov\/pubs\/elections\/VotingSystems\/DVS-DemocracySuite513\/documentation\/UG-ICX-UserGuide-5-13.pdf","key":"2_CR12"},{"unstructured":"Dominion Voting Systems, Setting the record straight: Facts about Dominion, Denver, Colorado (2024). https:\/\/www.dominionvoting.com\/setting-the-record-straight","key":"2_CR13"},{"unstructured":"Election Systems & Software, High-Throughput Scanner and Tabulator DS450, Omaha, Nebraska (2024). https:\/\/www.essvote.com\/products\/ds450","key":"2_CR14"},{"unstructured":"Election Systems & Software, Universal Voting System ExpressVote, Omaha, Nebraska (2024). https:\/\/www.essvote.com\/products\/expressvote","key":"2_CR15"},{"unstructured":"EndofLife.date, Samsung Mobile \u2013 End of life updates, 27 July 2024. https:\/\/endoflife.date\/samsung-mobile","key":"2_CR16"},{"doi-asserted-by":"crossref","unstructured":"Ferreira da Silva, R., Casanova, H., Orgerie, A., Tanaka, R., Deelman, E., Suter, F.: Characterizing, modeling and accurately simulating power and energy consumption of I\/O-intensive scientific workflows. J. Comput. Sci. 44, 101157 (2020)","key":"2_CR17","DOI":"10.1016\/j.jocs.2020.101157"},{"unstructured":"Fisher, T.: DBAN 2.3.0 (Darik\u2019s Boot and Nuke) \u2013 A full review of DBAN, a free data destruction software tool, Lifewire, New York, New York, 1 December 2022. https:\/\/www.lifewire.com\/dban-dariks-boot-and-nuke-review-2619130","key":"2_CR18"},{"key":"2_CR19","doi-asserted-by":"publisher","first-page":"102563","DOI":"10.1016\/j.micpro.2019.102863","volume":"71","author":"A Fournaris","year":"2019","unstructured":"Fournaris, A., Pyrgas, L., Kitsos, P.: An efficient multi-parameter approach for FPGA hardware Trojan detection. Microprocess. Microsyst. 71, 102563 (2019)","journal-title":"Microprocess. Microsyst."},{"unstructured":"Granger, K.: EAC certifies ES &S Windows-10-based operating systems. Election Systems & Software Blog, Omaha, Nebraska, 24 September 2019. https:\/\/www.essvote.com\/blog\/our-technology\/ess-windows-10-based-operating-systems-certified-by-eac","key":"2_CR20"},{"unstructured":"IBM X-Force Exchange, Intel NUC BIOS firmware privilege escalation CVE-2022-36370, X-Force Vulnerability Report, Cambridge, Massachusetts, 22 November 2022. https:\/\/exchange.xforce.ibmcloud.com\/vulnerabilities\/239655","key":"2_CR21"},{"unstructured":"Joven, R., Kiat, N.: The spies who loved you: infected USB drives to steal secrets. Threat Intelligence Blog, Mandiant, Reston, Virginia, 11 July 2023. https:\/\/www.mandiant.com\/resources\/blog\/infected-usb-steal-secrets","key":"2_CR22"},{"issue":"1","key":"2_CR23","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1145\/885651.781048","volume":"31","author":"T Li","year":"2003","unstructured":"Li, T., John, L.: Run-time modeling and estimation of operating system power consumption. ACM SIGMETRICS Perform. Eval. Rev. 31(1), 160\u2013171 (2003)","journal-title":"ACM SIGMETRICS Perform. Eval. Rev."},{"unstructured":"Lu, K.: Deep analysis of CVE-2016-3820 \u2013 Remote code execution vulnerability in Android Mediaserver. Fortinet Blog, Fortinet, Sunnyvale, California, 17 August 2016","key":"2_CR24"},{"unstructured":"Mechler, B.: Voting System Examination of Election Systems & Software EVS 6.1.1.0, 20 September 2020. https:\/\/www.sos.state.tx.us\/elections\/forms\/sysexam\/brian-mechler-ESS-exam-report-EVS6110-aug.pdf","key":"2_CR25"},{"unstructured":"Monahan, K., McFadden, C., Martinez, D.: Online and vulnerable: experts find nearly three dozen U.S. voting systems connected to Internet. NBC News, 10 January 2020","key":"2_CR26"},{"unstructured":"Morris, D.: Swing states voting machines were left connected to the Internet, report says. Fortune, 18 August 2019","key":"2_CR27"},{"doi-asserted-by":"crossref","unstructured":"Muller, J., Mladenov, V., Somorovsky, J. Schwenk, J.: Exploiting network printers. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 213\u2013230 (2017)","key":"2_CR28","DOI":"10.1109\/SP.2017.47"},{"unstructured":"National Institute for Standards and Technology, CVE-2019-6332 detail, National Vulnerability Database, Gaithersburg, Maryland, 9 January 2020. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-6332","key":"2_CR29"},{"unstructured":"National Institute for Standards and Technology, CVE-2021-20877 detail, National Vulnerability Database, Gaithersburg, Maryland, 14 February 2021. https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-20877","key":"2_CR30"},{"unstructured":"Nohl, K., Lell, J.: BadUSB \u2013 On accessories that turn evil, presented at Black Hat USA (2014)","key":"2_CR31"},{"unstructured":"Norden, L., Famighetti, C.: America\u2019s Voting Machines at Risk, Brennan Center for Justice, New York University School of Law, New York, New York (2015). https:\/\/www.brennancenter.org\/sites\/default\/files\/publications\/Americas_Voting_Machines_At_Risk.pdf","key":"2_CR32"},{"unstructured":"North Carolina State Board of Elections, State board unanimously certifies new voting system, Press Release, Raleigh, North Carolina, 6 July 2023. https:\/\/www.ncsbe.gov\/news\/press-releases\/2023\/07\/06\/state-board-unanimously-certifies-new-voting-system","key":"2_CR33"},{"unstructured":"Porup, J.: Want to hack a voting machine? Hack the voting machine vendor first, CSO Online Security Blog, IDG Communications, Needham, Massachusetts, 30 March 2018. https:\/\/www.csoonline.com\/article\/565020\/want-to-hack-a-voting-machine-hack-the-voting-machine-vendor-first.html","key":"2_CR34"},{"unstructured":"Pro V &V, Test Report for EAC VVSG 1.0 Certification Testing Election Systems & Software (ES &S) Voting System (EVS) 6.5.0.0, Document Number: TR-01-01-ESS-2023-05-01, Huntsville, Alabama. https:\/\/www.eac.gov\/sites\/default\/files\/2024-07\/ESS","key":"2_CR35"},{"unstructured":"Redfox Cyber Security, Exploiting Android WebView vulnerabilities. Redfox Cyber Security Blog, Dover, Delawars, 22 December 2022. https:\/\/redfoxsec.com\/blog\/exploiting-android-webview-vulnerabilities","key":"2_CR36"},{"doi-asserted-by":"crossref","unstructured":"Salem, H., Topham, N.: Detecting denial-of-service hardware Trojans in DRAM-based memory systems. In: Proceedings of the Twenty-Eighth IEEE International Conference on Electronics, Circuits and Systems (2021)","key":"2_CR37","DOI":"10.1109\/ICECS53924.2021.9665634"},{"doi-asserted-by":"crossref","unstructured":"Sarihi, A., Jamieson, P., Patooghy, A., Badawy, A.: Multi-criteria hardware Trojan detection: a reinforcement learning approach (2023). arXiv: 2304.13232v1","key":"2_CR38","DOI":"10.1145\/3670474.3685959"},{"unstructured":"Secure77, Voting System 1.0 \u2013 Remote code execution (unauthenticated), Exploit Database, OffSec, New York, New York, 7 May 2021. https:\/\/www.exploit-db.com\/exploits\/49846","key":"2_CR39"},{"unstructured":"Sganga, N.: U.S. finds no evidence flaws in Dominion voting machines were ever exploited. CBS News, 3 June 2022","key":"2_CR40"},{"unstructured":"Sudlow, J.: Moonbounce: The dark side of UEFI firmware, IBM X-Force Exchange, Cambridge, Massachusetts, 21 January 2022. https:\/\/exchange.xforce.ibmcloud.com\/collection\/MoonBounce-the-dark-side-of-UEFI-firmware-1737264e9b084a6e99a35b2148076a11","key":"2_CR41"},{"key":"2_CR42","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s13389-016-0132-7","volume":"7","author":"P Swierczynski","year":"2017","unstructured":"Swierczynski, P., Fyrbiak, M., Koppe, P., Moradi, A., Paar, C.: Interdiction in practice - hardware Trojan against a high-security USB flash drive. J. Cryptogr. Eng. 7, 199\u2013211 (2017)","journal-title":"J. Cryptogr. Eng."},{"doi-asserted-by":"crossref","unstructured":"Tian, J., Scaife, N., Kumar, D., Bailey, M., Bates, A., Butler, K.: SoK: \u201cPlug & Pray\u201d today \u2013 Understanding USB insecurity in versions 1 through C. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 1032\u20131047 (2018)","key":"2_CR43","DOI":"10.1109\/SP.2018.00037"},{"unstructured":"U.S. District Court (Northern District of Georgia, Atlanta Division), Curling et al. v. Raffensperger et al., Civil Action no. 1:17-CV-2989-AT, Atlanta, Georgia, 21 May 2019","key":"2_CR44"},{"unstructured":"U.S. Election Assistance Commission, ES &S EVS 6.3.0.0 Certificate Conformance, Washington, DC. https:\/\/www.eac.gov\/sites\/default\/files\/voting_system\/files\/ESS","key":"2_CR45"},{"unstructured":"U.S. Election Assistance Commission, Considerations for Implementing Voting Systems with COTS Products, Washington, DC (2023). https:\/\/www.eac.gov\/sites\/default\/files\/eac_assets\/1\/28\/Considerations_for_Implementing_Voting_Systems_with_COTS_Products.pdf","key":"2_CR46"},{"unstructured":"U.S. Election Assistance Commission, System Certification Process, Washington, DC, 10 October 2023. https:\/\/www.eac.gov\/voting-equipment\/system-certification-process","key":"2_CR47"},{"unstructured":"U.S. Election Assistance Commission, Democracy Suite 5.5, Washington, DC, 2 January 2024. https:\/\/www.eac.gov\/voting-equipment\/democracy-suite-55","key":"2_CR48"},{"unstructured":"U.S. Election Assistance Commission, Democracy Suite 5.5-A (Modification), Washington, DC, 2 January 2024. https:\/\/www.eac.gov\/voting-equipment\/democracy-suite-55-modification","key":"2_CR49"},{"unstructured":"U.S. Election Assistance Commission, EVS 6.3.0.0, Washington, DC, 2 January 2024. www.eac.gov\/voting-equipment\/evs-6300","key":"2_CR50"},{"unstructured":"Verified Voting, Election Systems & Software DS850, DC450 and DS950, Philadelphia, Pennsylvania (2023). https:\/\/verifiedvoting.org\/election-system\/ess-ds850-ds450","key":"2_CR51"},{"unstructured":"Virgilitto, D.: How to hack Android devices using the Stagefright vulnerability (updated 2021), Resource Center, InfoSec Institite, Chicago, Illinois, 10 January 2021. https:\/\/resources.infosecinstitute.com\/topics\/hacking\/hack-android-devices-using-stagefright-vulnerability","key":"2_CR52"},{"key":"2_CR53","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/s42979-022-01020-4","volume":"3","author":"V Wylde","year":"2022","unstructured":"Wylde, V., et al.: Cybersecurity, data privacy and blockchain: a review. SN Comput. Sci. 3, 127 (2022)","journal-title":"SN Comput. Sci."},{"doi-asserted-by":"crossref","unstructured":"Yin, J., et al.: Finding SMM privilege-escalation vulnerabilities in UEFI firmware with protocol-centric static analysis. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 1623\u20131637 (2022)","key":"2_CR54","DOI":"10.1109\/SP46214.2022.9833723"},{"unstructured":"Zetter, K.: Election commission orders top voting machine vendor to correct misleading claims. Politico, 13 August 2020","key":"2_CR55"}],"container-title":["IFIP Advances in Information and Communication Technology","Critical Infrastructure Protection XVIII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81888-2_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T12:50:18Z","timestamp":1740747018000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81888-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031818875","9783031818882"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81888-2_2","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"28 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Critical Infrastructure Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Arlington, VA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 March 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 March 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccip2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ifip1110.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}