{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:09Z","timestamp":1750307889077,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,20]],"date-time":"2008-07-20T00:00:00Z","timestamp":1216512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,20]]},"DOI":"10.1145\/1390630.1390660","type":"proceedings-article","created":{"date-parts":[[2008,7,22]],"date-time":"2008-07-22T13:46:39Z","timestamp":1216734399000},"page":"237-248","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Are your votes\n            <i>really<\/i>\n            counted?"],"prefix":"10.1145","author":[{"given":"Davide","family":"Balzarotti","sequence":"first","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Greg","family":"Banks","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Marco","family":"Cova","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Viktoria","family":"Felmetsger","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Richard","family":"Kemmerer","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"William","family":"Robertson","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Fredrik","family":"Valeur","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]},{"given":"Giovanni","family":"Vigna","sequence":"additional","affiliation":[{"name":"University of California, Santa Barbara, Santa Barbara, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2008,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"A. Appel. How I bought used voting machines on the Internet. http:\/\/www.cs.princeton.edu\/~appel\/avc\/ February 2007.  A. Appel. How I bought used voting machines on the Internet. http:\/\/www.cs.princeton.edu\/~appel\/avc\/ February 2007."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1226736.1226754"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of the Network and Distributed System Security Symposium","author":"Bethencourt J.","year":"2007","unstructured":"J. Bethencourt , D. Boneh , and B. Waters . Cryptographic Methods for Storing Ballots on a Voting Machine . In Proc. of the Network and Distributed System Security Symposium , 2007 . J. Bethencourt, D. Boneh, and B. Waters. Cryptographic Methods for Storing Ballots on a Voting Machine. In Proc. of the Network and Distributed System Security Symposium, 2007."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323111.1323113"},{"key":"e_1_3_2_1_6_1","unstructured":"E. Felten. \"Hotel Minibar\" Keys Open Diebold Voting Machines. http:\/\/www.freedom-to-tinker.com\/?p=1064.  E. Felten. \"Hotel Minibar\" Keys Open Diebold Voting Machines. http:\/\/www.freedom-to-tinker.com\/?p=1064."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315278"},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of the USENIX\/ACCURATE Electronic Voting Technology Workshop","author":"Gonggrijp R.","year":"2007","unstructured":"R. Gonggrijp and W. Hengeveld . Studying the Nedap\/Groenendaal ES3B Voting Computer: A Computer Security Perspective . In Proc. of the USENIX\/ACCURATE Electronic Voting Technology Workshop , 2007 . R. Gonggrijp and W. Hengeveld. Studying the Nedap\/Groenendaal ES3B Voting Computer: A Computer Security Perspective. In Proc. of the USENIX\/ACCURATE Electronic Voting Technology Workshop, 2007."},{"key":"e_1_3_2_1_9_1","volume-title":"Black Box Voting: Ballot Tampering in the 21st Century","author":"Harris B.","year":"2003","unstructured":"B. Harris . Black Box Voting: Ballot Tampering in the 21st Century . Elon House\/Plan Nine , 2003 . B. Harris. Black Box Voting: Ballot Tampering in the 21st Century. Elon House\/Plan Nine, 2003."},{"key":"e_1_3_2_1_10_1","unstructured":"B. Harris. Inside a U.S. Vote Counting Program. http:\/\/www.scoop.co.nz\/stories\/HL0307\/S00065.htm July 2003.  B. Harris. Inside a U.S. Vote Counting Program. http:\/\/www.scoop.co.nz\/stories\/HL0307\/S00065.htm July 2003."},{"key":"e_1_3_2_1_11_1","volume-title":"Black Box Voting Project","author":"Hursti H.","year":"2005","unstructured":"H. Hursti . Critical Security Issues with Diebold Optical Scan Design. Technical report , Black Box Voting Project , July 2005 . H. Hursti. Critical Security Issues with Diebold Optical Scan Design. Technical report, Black Box Voting Project, July 2005."},{"key":"e_1_3_2_1_12_1","volume-title":"IEEE","author":"Institute of Electrical and Electronics Engineers.","year":"1990","unstructured":"Institute of Electrical and Electronics Engineers. IEEE Std 1149.1-1990 IEEE Standard Test Access Port and Boundary-Scan Architecture . IEEE , 1990 . Institute of Electrical and Electronics Engineers. IEEE Std 1149.1-1990 IEEE Standard Test Access Port and Boundary-Scan Architecture. IEEE, 1990."},{"key":"e_1_3_2_1_13_1","volume-title":"US Department of Defense","author":"Jefferson D.","year":"2004","unstructured":"D. Jefferson , A. Rubin , B. Simons , and D. Wagner . A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE). Technical report , US Department of Defense , 2004 . D. Jefferson, A. Rubin, B. Simons, and D. Wagner. A Security Analysis of the Secure Electronic Registration and Voting Experiment (SERVE). Technical report, US Department of Defense, 2004."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1022594.1022624"},{"key":"e_1_3_2_1_15_1","first-page":"33","volume-title":"Proc. of the USENIX Security Symposium","author":"Karlof C.","year":"2005","unstructured":"C. Karlof , N. Sastry , and D. Wagner . Cryptographic Voting Protocols: A Systems Perspective . In Proc. of the USENIX Security Symposium , pages 33 -- 50 , 2005 . C. Karlof, N. Sastry, and D. Wagner. Cryptographic Voting Protocols: A Systems Perspective. In Proc. of the USENIX Security Symposium, pages 33--50, 2005."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.16"},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of the USENIX\/ACCURATE Electronic Voting Technology Workshop","author":"Shvartsman A.","year":"2007","unstructured":"A. Kiayias, L. Michel, A. Russell, N. Shashidhar, A. See, and A. Shvartsman . An Authentication and Ballot Layout Attack against an Optical Scan Voting Terminal . In Proc. of the USENIX\/ACCURATE Electronic Voting Technology Workshop , 2007 . A. Kiayias, L. Michel, A. Russell, N. Shashidhar, A. See, and A. Shvartsman. An Authentication and Ballot Layout Attack against an Optical Scan Voting Terminal. In Proc. of the USENIX\/ACCURATE Electronic Voting Technology Workshop, 2007."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301313"},{"key":"e_1_3_2_1_19_1","volume-title":"December","author":"McDaniel P.","year":"2007","unstructured":"P. McDaniel , M. Blaze , and G. Vigna . EVEREST: Evaluation and Validation of Election--Related Equipment, Standards and Testing. Ohio Secretary of State's EVEREST Project Report , December 2007 . P. McDaniel, M. Blaze, and G. Vigna. EVEREST: Evaluation and Validation of Election--Related Equipment, Standards and Testing. Ohio Secretary of State's EVEREST Project Report, December 2007."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.39"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315277"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of the USENIX\/ACCURATE Electronic Voting Technology Workshop","author":"Proebstel E.","year":"2007","unstructured":"E. Proebstel , S. Riddle , F. Hsu , J. Cummins , F. Oakley , T. Stanionis , and M. Bishop . An Analysis of the Hart Intercivic DAU eSlate . In Proc. of the USENIX\/ACCURATE Electronic Voting Technology Workshop , 2007 . E. Proebstel, S. Riddle, F. Hsu, J. Cummins, F. Oakley, T. Stanionis, and M. Bishop. An Analysis of the Hart Intercivic DAU eSlate. In Proc. of the USENIX\/ACCURATE Electronic Voting Technology Workshop, 2007."},{"key":"e_1_3_2_1_23_1","volume-title":"Florida","author":"Pynchon S.","year":"2008","unstructured":"S. Pynchon and K. Garber . Sarasota's Vanished Votes: An Investigation into the Cause of Uncounted Votes in the 2006 Congressional District 13 Race in Sarasota County , Florida . Florida Fair Elections Center Report , January 2008 . S. Pynchon and K. Garber. Sarasota's Vanished Votes: An Investigation into the Cause of Uncounted Votes in the 2006 Congressional District 13 Race in Sarasota County, Florida. Florida Fair Elections Center Report, January 2008."},{"key":"e_1_3_2_1_24_1","volume-title":"http:\/\/openocd.berlios.de\/web","author":"Rath D.","year":"2008","unstructured":"D. Rath . Open On-Chip Debugger . http:\/\/openocd.berlios.de\/web , 2008 . D. Rath. Open On-Chip Debugger. http:\/\/openocd.berlios.de\/web, 2008."},{"key":"e_1_3_2_1_25_1","volume-title":"Broadway","author":"Rubin A.","year":"2006","unstructured":"A. Rubin . Brave New Ballot . Broadway , 2006 . A. Rubin. Brave New Ballot. Broadway, 2006."},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. of the USENIX\/ACCURATE Electronic Voting Technology Workshop","author":"Ryan T.","year":"2007","unstructured":"T. Ryan and C. Hoke . GEMS Tabulation Database Design Issues in Relation to Voting Systems Certification Standards . In Proc. of the USENIX\/ACCURATE Electronic Voting Technology Workshop , 2007 . T. Ryan and C. Hoke. GEMS Tabulation Database Design Issues in Relation to Voting Systems Certification Standards. In Proc. of the USENIX\/ACCURATE Electronic Voting Technology Workshop, 2007."},{"key":"e_1_3_2_1_27_1","volume-title":"Diebold AccuVote-TS Voting System and Processes. Technical report","author":"Risk Assessment Report SAIC.","year":"2003","unstructured":"SAIC. Risk Assessment Report : Diebold AccuVote-TS Voting System and Processes. Technical report , Science Applications International Corporation , 2003 . SAIC. Risk Assessment Report: Diebold AccuVote-TS Voting System and Processes. Technical report, Science Applications International Corporation, 2003."},{"key":"e_1_3_2_1_28_1","first-page":"321","volume-title":"Proc. of the USENIX Security Symposium","author":"Sastry N.","year":"2006","unstructured":"N. Sastry and D. Wagner . Designing Voting Machines for Verification . In Proc. of the USENIX Security Symposium , pages 321 -- 336 , 2006 . N. Sastry and D. Wagner. Designing Voting Machines for Verification. In Proc. of the USENIX Security Symposium, pages 321--336, 2006."},{"key":"e_1_3_2_1_30_1","unstructured":"United States Election Assistance Commission. Voluntary Voting System Guidelines. http:\/\/www.eac.gov\/votingsystems\/voluntary-voting-guidelines\/2005-vvsg 2005.  United States Election Assistance Commission. Voluntary Voting System Guidelines. http:\/\/www.eac.gov\/votingsystems\/voluntary-voting-guidelines\/2005-vvsg 2005."},{"key":"e_1_3_2_1_31_1","author":"Vigna G.","year":"2007","unstructured":"G. Vigna , R. Kemmerer , D. Balzarotti , G. Banks , M. Cova , V. Felmetsger , W. Robertson , and F. Valeur . Security Evaluation of the Sequoia Voting System. Top-To-Bottom Review of the California Voting Machines , July 2007 . G. Vigna, R. Kemmerer, D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, W. Robertson, and F. Valeur. Security Evaluation of the Sequoia Voting System. Top-To-Bottom Review of the California Voting Machines, July 2007.","journal-title":"Security Evaluation of the Sequoia Voting System. Top-To-Bottom Review of the California Voting Machines"},{"key":"e_1_3_2_1_32_1","volume-title":"Testimony before U","author":"Wagner D.","year":"2006","unstructured":"D. Wagner . Testimony before U .S. House of Representatives at joint hearing of the Committee on Science and Committee on House Administration . http:\/\/www.cs.berkeley.edu\/~daw\/papers\/testimony-house06.pdf, 2006 . D. Wagner. Testimony before U.S. House of Representatives at joint hearing of the Committee on Science and Committee on House Administration. http:\/\/www.cs.berkeley.edu\/~daw\/papers\/testimony-house06.pdf, 2006."},{"key":"e_1_3_2_1_33_1","volume-title":"LLC","author":"Wertheimer M.","year":"2004","unstructured":"M. Wertheimer . Trusted Agent Report: Diebold AccuVote-TS Voting System. Technical report, RABA Technologies , LLC , 2004 . M. Wertheimer. Trusted Agent Report: Diebold AccuVote-TS Voting System. Technical report, RABA Technologies, LLC, 2004."},{"key":"e_1_3_2_1_34_1","volume-title":"Software Review and Security Analysis of the ES&S iVotronic 8.0.1.2 Voting Machine Firmware. Technical report, Security and Assurance in Information Technology Laboratory","author":"Yasinsac A.","year":"2007","unstructured":"A. Yasinsac , D. Wagner , M. Bishop , T. Baker , B. de Medeiros , G. Tyson , M. Shamos , and M. Burmester . Software Review and Security Analysis of the ES&S iVotronic 8.0.1.2 Voting Machine Firmware. Technical report, Security and Assurance in Information Technology Laboratory , Florida State University , Tallahassee, FL , 2007 . A. Yasinsac, D. Wagner, M. Bishop, T. Baker, B. de Medeiros, G. Tyson, M. Shamos, and M. Burmester. Software Review and Security Analysis of the ES&S iVotronic 8.0.1.2 Voting Machine Firmware. Technical report, Security and Assurance in Information Technology Laboratory, Florida State University, Tallahassee, FL, 2007."}],"event":{"name":"ISSTA '08: International Symposium on Software Testing and Analysis","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Seattle WA USA","acronym":"ISSTA '08"},"container-title":["Proceedings of the 2008 international symposium on Software testing and analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1390630.1390660","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1390630.1390660","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:16Z","timestamp":1750258036000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1390630.1390660"}},"subtitle":["testing the security of real-world electronic voting systems"],"short-title":[],"issued":{"date-parts":[[2008,7,20]]},"references-count":32,"alternative-id":["10.1145\/1390630.1390660","10.1145\/1390630"],"URL":"https:\/\/doi.org\/10.1145\/1390630.1390660","relation":{},"subject":[],"published":{"date-parts":[[2008,7,20]]},"assertion":[{"value":"2008-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}