{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,30]],"date-time":"2025-07-30T11:47:02Z","timestamp":1753876022595,"version":"3.41.2"},"reference-count":68,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T00:00:00Z","timestamp":1686182400000},"content-version":"vor","delay-in-days":158,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["#2127309"],"award-info":[{"award-number":["#2127309"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100005651","name":"Computing Research Association","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100005651","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,1,5]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Voter registration is an essential part of almost any election process, and its security is a critical component of election security. Yet, despite notable compromises of voter registration systems, relatively little academic work has been devoted to securing voter registration systems, compared to research on other aspects of election security. In this paper, we present a systematic treatment of voter registration system security. We propose the first rigorous definitional framework for voter registration systems, describing the entities and core functionalities inherent in most voter registration systems, the jurisdictional policies that constrain specific implementations, and key security properties. Our definitions are configurable based on jurisdiction-specific parameters and policies. We provide a template for the structured presentation of detailed jurisdictional policy information, via a series of tables, and illustrate its application with detailed case studies of the voter registration systems of three US states and Panama. Throughout our research, with the aim of realism and practical applicability, we consulted current and former US election officials, civil society, and nonprofits in the elections space. We conclude with a list of critical questions regarding voter registration security.<\/jats:p>","DOI":"10.1093\/cybsec\/tyad008","type":"journal-article","created":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T07:29:48Z","timestamp":1686209388000},"source":"Crossref","is-referenced-by-count":1,"title":["A systematization of voter registration security"],"prefix":"10.1093","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5917-5188","authenticated-orcid":false,"given":"Jack","family":"Cable","sequence":"first","affiliation":[{"name":"Stanford University, Department of Computer Science , Stanford, CA 94305 , USA"}]},{"given":"Andr\u00e9s","family":"F\u00e1brega","sequence":"additional","affiliation":[{"name":"Cornell University, Department of Computer Science , Ithaca, NY 14853 , USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1884-9585","authenticated-orcid":false,"given":"Sunoo","family":"Park","sequence":"additional","affiliation":[{"name":"Columbia University, Department of Computer Science , 491 Computer Science Building, 500 West 120th Street, New York, NY 10027 , USA"}]},{"given":"Michael A","family":"Specter","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science , Cambridge, MA 02142 , USA"}]}],"member":"286","published-online":{"date-parts":[[2023,6,8]]},"reference":[{"year":"2017","author":"Statement by Secretary Jeh Johnson on the Designation of Election Infrastructure as a Critical Infrastructure Subsector","key":"2023060816324590200_bib1"},{"year":"2019","author":"Russian Active Measures Campaigns and Interference in the 2016\u00a0US Election","key":"2023060816324590200_bib2"},{"article-title":"The Philippines election hack is \u201cfreaking huge\u201d","year":"2016","author":"Temperton","key":"2023060816324590200_bib3"},{"article-title":"IT firm C-Planet fined \u20ac 65,000 over massive voter data breach","year":"2022","author":"Martin","key":"2023060816324590200_bib4"},{"year":"2014","key":"2023060816324590200_bib5","article-title":"Software glitch discloses Wokingham edited electoral register"},{"year":"2014","key":"2023060816324590200_bib6","article-title":"Three Welsh councils\u2019 electoral roll data breaches probed"},{"article-title":"Iran Probed State Election Websites Since September, U.S. Says","year":"2020","author":"Volz","key":"2023060816324590200_bib7"},{"key":"2023060816324590200_bib8","first-page":"305","article-title":"In search of an understandable consensus algorithm","volume-title":"2014 USENIX Annual Technical Conference (Usenix ATC 14)","author":"Ongaro","year":"2014"},{"key":"2023060816324590200_bib9","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/2659897","article-title":"Certificate transparency","volume":"57","author":"Laurie","year":"2014","journal-title":"Commun ACM"},{"article-title":"Bitcoin: a peer-to-peer electronic cash system","year":"2008","author":"Nakamoto","key":"2023060816324590200_bib10"},{"year":"1993","author":"National Voter Registration Act of 1993","key":"2023060816324590200_bib11"},{"article-title":"Securing the vote: protecting american democracy","year":"2018","author":"National Academies of Sciences, Engineering, and Medicine","key":"2023060816324590200_bib12"},{"article-title":"Statewide databases of registered voters: study of accuracy, privacy, usability, security, and reliability issues commissioned by the U.S. Public Policy Committee of the Association for Computing Machinery","year":"2006","author":"Association for Computing Machinery","key":"2023060816324590200_bib13"},{"article-title":"Recommended security controls for voter registration systems","year":"2019","author":"Casey","key":"2023060816324590200_bib14"},{"author":"ACE Electoral Knowledge Network","key":"2023060816324590200_bib15","article-title":"Voter registration"},{"key":"2023060816324590200_bib16","doi-asserted-by":"crossref","DOI":"10.2139\/ssrn.1647227","article-title":"Making the list: database matching and verification processes for voter registration","author":"Levitt","year":"2006"},{"volume-title":"Voter Registration Modernization: Policy Summary","year":"2009","author":"Weiser","key":"2023060816324590200_bib17"},{"volume-title":"Expanding Democracy: Voter Registration Around the World","year":"2009","author":"Rosenberg","key":"2023060816324590200_bib18"},{"article-title":"Voter registration in a digital age","year":"2010","author":"Ponoroff","key":"2023060816324590200_bib19"},{"article-title":"Voter registration in a digital age: 2015 update","year":"2015","author":"Maluk","key":"2023060816324590200_bib20"},{"article-title":"Voluntary guidance on implementation of statewide voter registration lists","year":"2005","author":"Election Assistance Commission","key":"2023060816324590200_bib21"},{"article-title":"Statewide voter registration systems","year":"2017","author":"Election Assistance Commission","key":"2023060816324590200_bib22"},{"article-title":"State voter registration databases: immediate actions and future improvements","year":"2008","author":"National Research Council of the National Academies of Sciences, Engineering, and Medicine","key":"2023060816324590200_bib23"},{"article-title":"Voter registration database security","year":"2020","author":"Center for Election Innovation and Research","key":"2023060816324590200_bib24"},{"article-title":"A handbook for elections infrastructure security","year":"2018","author":"Center for Internet Security","key":"2023060816324590200_bib25"},{"article-title":"The state and local election cybersecurity playbook","year":"2018","author":"Belfer Center for Science and International Affairs at Harvard Kennedy School","key":"2023060816324590200_bib26"},{"key":"2023060816324590200_bib27","doi-asserted-by":"crossref","DOI":"10.31752\/idea.2019.23","article-title":"Cybersecurity in elections: models of interagency collaboration","author":"van\u00a0der\u00a0Staak","year":"2019"},{"key":"2023060816324590200_bib28","article-title":"TRIP: trustless coercion-resistant in-person voter registration","author":"Merino","year":"2022","journal-title":"CoRR"},{"key":"2023060816324590200_bib29","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1515\/spp-2021-0016","article-title":"Bayesian analysis of state voter registration database integrity","volume":"13","author":"Cao","year":"2022","journal-title":"Statistics, Politics and Policy"},{"author":"Electronic Registration Information Center","key":"2023060816324590200_bib30"},{"author":"VoteShield","key":"2023060816324590200_bib31"},{"key":"2023060816324590200_bib32","first-page":"335","article-title":"Helios: web-based open-audit voting","volume-title":"Proceedings of the 17th USENIX Security Symposium","author":"Adida","year":"2008"},{"key":"2023060816324590200_bib33","first-page":"3759","article-title":"On the notion of \u201csoftware independence\u201d in voting systems","volume":"366","author":"Rivest","year":"2008","journal-title":"Philos Trans Royal Soc"},{"key":"2023060816324590200_bib34","article-title":"STAR-Vote: a secure, transparent, auditable, and reliable voting System","volume-title":"2013 Electronic Voting Technology Workshop\/Workshop on Trustworthy Elections (EVT\/WOTE 13)","author":"Bell","year":"2013"},{"key":"2023060816324590200_bib35","article-title":"End-to-end verifiability","author":"Benaloh","year":"2015","journal-title":"CoRR"},{"key":"2023060816324590200_bib36","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1109\/MSP.2012.56","article-title":"A gentle introduction to risk-limiting audits","volume":"10","author":"Lindeman","year":"2012","journal-title":"IEEE Secur Priv"},{"key":"2023060816324590200_bib37","article-title":"SOBA: secrecy-preserving observable ballot-level audit","volume-title":"2011 Electronic Voting Technology Workshop \/ Workshop on Trustworthy Elections, EVT\/WOTE \u201911","author":"Benaloh","year":"2011"},{"key":"2023060816324590200_bib38","article-title":"BRAVO: Ballot-polling risk-limiting audits to verify outcomes","volume-title":"2012 Electronic Voting Technology Workshop \/ Workshop on Trustworthy Elections, EVT\/WOTE \u201912","author":"Lindeman","year":"2012"},{"key":"2023060816324590200_bib39","first-page":"543","article-title":"Why Internet voting is dangerous","volume":"4","author":"Simons","year":"2020","journal-title":"Georgetown Law Technol Rev"},{"key":"2023060816324590200_bib40","doi-asserted-by":"crossref","DOI":"10.1093\/cybsec\/tyaa025","article-title":"Going from bad to worse: from Internet voting to blockchain voting","volume":"7","author":"Park","year":"2021","journal-title":"J Cybersecur"},{"article-title":"From voter registration to mail-in ballots, how do countries around the world run their elections?","year":"2020","author":"Schumacher","key":"2023060816324590200_bib41"},{"article-title":"Pollbook","year":"2022","author":"Merriam-Webster Dictionary","key":"2023060816324590200_bib42"},{"article-title":"Electronic poll books","year":"2019","author":"National Conference of State Legislatures","key":"2023060816324590200_bib43"},{"article-title":"Automatic voter registration","year":"2022","author":"National Conference of State Legislatures","key":"2023060816324590200_bib44"},{"key":"2023060816324590200_bib45","first-page":"243","volume-title":"Broken ballots","author":"Jones","year":"2012"},{"year":"2002","author":"The Help America Vote Act of 2002","key":"2023060816324590200_bib46"},{"article-title":"Access to and use of voter registration lists","year":"2019","author":"National Conference of State Legislatures","key":"2023060816324590200_bib47"},{"author":"North Carolina State Board of Elections","key":"2023060816324590200_bib48","article-title":"Voter registration data"},{"author":"Maine Department of the Secretary of State","key":"2023060816324590200_bib49","article-title":"Voter registration data, election data and online forms"},{"article-title":"Commercial Voter Files and the Study of U.S. Politics","year":"2018","author":"Igielnik","key":"2023060816324590200_bib50"},{"article-title":"Purges: a growing threat to the right to vote","year":"2018","author":"Brater","key":"2023060816324590200_bib51"},{"key":"2023060816324590200_bib52","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1017\/S000305541900087X","article-title":"One person, one vote: estimating the prevalence of double voting in u.s. presidential elections","volume":"114","author":"Goel","year":"2020","journal-title":"Am Polit Sci Rev"},{"article-title":"Election day registration: a study of voter fraud allegations and findings on voter roll security","year":"2007","author":"Minnite","key":"2023060816324590200_bib53"},{"article-title":"Voter registration list maintenance","year":"2021","author":"National Conference of State Legislatures","key":"2023060816324590200_bib54"},{"article-title":"Same day voter registration","year":"2021","author":"National Conference of State Legislatures","key":"2023060816324590200_bib55"},{"year":"2022","author":"C\u00f3digo Electoral de Panam\u00e1","key":"2023060816324590200_bib56"},{"author":"GOV.UK","key":"2023060816324590200_bib57","article-title":"Register to vote"},{"article-title":"Electoral Law: a joint final report","year":"2020","author":"Law Commission of England and Wales","key":"2023060816324590200_bib58"},{"article-title":"Listes \u00e9lectorales : nouvelle inscription","year":"2022","author":"Service-Public. fr","key":"2023060816324590200_bib59"},{"article-title":"Instruction relative \u00e0 la tenue des listes \u00e9lectorales compl\u00e9mentaires","year":"2018","author":"Le ministre de l\u2019int\u00e9rieur","key":"2023060816324590200_bib60"},{"author":"52 USC 20701: retention and preservation of records and papers by officers of elections; deposit with custodian; penalty for violation","key":"2023060816324590200_bib61"},{"article-title":"Department of Defense trusted computer system evaluation criteria","year":"1986","author":"Latham","key":"2023060816324590200_bib62"},{"year":"2021","author":"Colorado Revised Statutes 2021 Title 1","key":"2023060816324590200_bib63"},{"article-title":"Election Rules [8 CCR 1505-1]","year":"2021","author":"Colorado Department of State","key":"2023060816324590200_bib64"},{"article-title":"Statewide voter registration system requirements","year":"2006","author":"Colorado Department of State","key":"2023060816324590200_bib65"},{"year":"2022","author":"About the WEC","key":"2023060816324590200_bib66"},{"year":"2018","author":"Procedimiento Gesti\u00f3n para la Seguridad Inform\u00e1tica","key":"2023060816324590200_bib67"},{"year":"2021","author":"Procedimiento General Gesti\u00f3n de Infraestructura","key":"2023060816324590200_bib68"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/9\/1\/tyad008\/50540756\/tyad008.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/9\/1\/tyad008\/50540756\/tyad008.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,8]],"date-time":"2023-06-08T16:33:00Z","timestamp":1686241980000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyad008\/7192204"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,1]]},"references-count":68,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,1,5]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyad008","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"type":"print","value":"2057-2085"},{"type":"electronic","value":"2057-2093"}],"subject":[],"published-other":{"date-parts":[[2023,1,1]]},"published":{"date-parts":[[2023,1,1]]},"article-number":"tyad008"}}