{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T00:28:20Z","timestamp":1766449700111,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,3,18]],"date-time":"2013-03-18T00:00:00Z","timestamp":1363564800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,3,18]]},"DOI":"10.1145\/2480362.2480702","type":"proceedings-article","created":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T19:47:45Z","timestamp":1367437665000},"page":"1816-1823","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Malicious takeover of voting systems"],"prefix":"10.1145","author":[{"given":"Russell J.","family":"Jancewicz","sequence":"first","affiliation":[{"name":"University of Connecticut, Storrs, CT"}]},{"given":"Aggelos","family":"Kiayias","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT"}]},{"given":"Laurent D.","family":"Michel","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT"}]},{"given":"Alexander C.","family":"Russell","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT"}]},{"given":"Alexander A.","family":"Shvartsman","sequence":"additional","affiliation":[{"name":"University of Connecticut, Storrs, CT"}]}],"member":"320","published-online":{"date-parts":[[2013,3,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cwe-134: Uncontrolled format string. http:\/\/cwe.mitre.org\/data\/definitions\/134.html.  Cwe-134: Uncontrolled format string. http:\/\/cwe.mitre.org\/data\/definitions\/134.html."},{"key":"e_1_3_2_1_2_1","volume-title":"December 14","author":"Project EVEREST","year":"2007","unstructured":"Project EVEREST : Risk assesment study of ohio voting systems , December 14 2007 . Project EVEREST: Risk assesment study of ohio voting systems, December 14 2007."},{"key":"e_1_3_2_1_3_1","volume-title":"September 20","author":"Linux","year":"2010","unstructured":"printf(3) - Linux manual page. https:\/\/www.kernel.org\/doc\/man-pages\/online\/pages\/man3\/printf.3.html , September 20 2010 . printf(3) - Linux manual page. https:\/\/www.kernel.org\/doc\/man-pages\/online\/pages\/man3\/printf.3.html, September 20 2010."},{"volume-title":"September 19, 2002.","author":"Caltech","key":"e_1_3_2_1_4_1","unstructured":"Caltech -mit team finds 35% improvement in florida's voting technology , September 19, 2002. Caltech-mit team finds 35% improvement in florida's voting technology, September 19, 2002."},{"key":"e_1_3_2_1_5_1","volume-title":"of the 2010 USENIX\/ACCURATE Electronic Voting Workshop (EVT\/WOTE 2010)","author":"Antonyan T.","year":"2010","unstructured":"Antonyan , T. , Nicolaou , N. , Shvartsman , A. , and Smith , T . Determining the causes of accuvote optical scan voting terminal memory card failures . In of the 2010 USENIX\/ACCURATE Electronic Voting Workshop (EVT\/WOTE 2010) (Washington, DC, 2010 ). Antonyan, T., Nicolaou, N., Shvartsman, A., and Smith, T. Determining the causes of accuvote optical scan voting terminal memory card failures. In of the 2010 USENIX\/ACCURATE Electronic Voting Workshop (EVT\/WOTE 2010) (Washington, DC, 2010)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2004.1264851"},{"key":"e_1_3_2_1_7_1","volume-title":"July 20","author":"Calandrino J.","year":"2007","unstructured":"Calandrino , J. , Feldman , A. , Halderman , J. , Wagner , D. , Yu , H. , and Zeller , W . Source code review of the diebold voting system. www.sos.ca.gov\/elections\/elections_vsr.htm , July 20 2007 . Calandrino, J., Feldman, A., Halderman, J., Wagner, D., Yu, H., and Zeller, W. Source code review of the diebold voting system. www.sos.ca.gov\/elections\/elections_vsr.htm, July 20 2007."},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/www.sos.ca.gov\/elections\/voting_systems\/ttbr\/db07_042_ttbr_system_decisions_release.pdf","author":"Secretary","year":"2007","unstructured":"Secretary of State Debra Bowen moves to strengthen voter confidence in election security following top-to-bottom review of voting systems. http:\/\/www.sos.ca.gov\/elections\/voting_systems\/ttbr\/db07_042_ttbr_system_decisions_release.pdf , 2007 . Secretary of State Debra Bowen moves to strengthen voter confidence in election security following top-to-bottom review of voting systems. http:\/\/www.sos.ca.gov\/elections\/voting_systems\/ttbr\/db07_042_ttbr_system_decisions_release.pdf, 2007."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529736"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Feldman A. J. Halderman J. A. and Felten E. W. Security analysis of the Diebold AccuVote-TS voting machine. http:\/\/www.usenix.org\/event\/evt07\/tech\/full_papers\/feldman\/feldman.pdf 13 September 2006.  Feldman A. J. Halderman J. A. and Felten E. W. Security analysis of the Diebold AccuVote-TS voting machine. http:\/\/www.usenix.org\/event\/evt07\/tech\/full_papers\/feldman\/feldman.pdf 13 September 2006.","DOI":"10.1177\/1350508406068500"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-0239-5","volume-title":"Secure Electronic Voting","author":"Gritzalis D.","year":"2003","unstructured":"Gritzalis , D. , Ed. Secure Electronic Voting . Springer-Verlag , Berlin, Germany ., Jan 1, 2003 . Gritzalis, D., Ed. Secure Electronic Voting. Springer-Verlag, Berlin, Germany., Jan 1, 2003."},{"key":"e_1_3_2_1_12_1","unstructured":"Help America Vote Act. http:\/\/www.fec.gov\/hava\/law_ext.txt.  Help America Vote Act. http:\/\/www.fec.gov\/hava\/law_ext.txt."},{"key":"e_1_3_2_1_13_1","unstructured":"Hursti H. Critical security issues with Diebold optical scan design. http:\/\/www.blackboxvoting.org\/BBVreport.pdf 4 July 2005.  Hursti H. Critical security issues with Diebold optical scan design. http:\/\/www.blackboxvoting.org\/BBVreport.pdf 4 July 2005."},{"key":"e_1_3_2_1_14_1","unstructured":"Hursti H. Diebold TSx evaluation. Black Box Voting Project http:\/\/www.blackboxvoting.org\/BBVtsxstudy.pdf 11 May 2006.  Hursti H. Diebold TSx evaluation. Black Box Voting Project http:\/\/www.blackboxvoting.org\/BBVtsxstudy.pdf 11 May 2006."},{"key":"e_1_3_2_1_15_1","volume-title":"The C Programming Language","author":"Kernighan B. W.","year":"1988","unstructured":"Kernighan , B. W. , and Ritchie , D . The C Programming Language , second edition ed. Prentice-Hall , 1988 . Kernighan, B. W., and Ritchie, D. The C Programming Language, second edition ed. Prentice-Hall, 1988."},{"key":"e_1_3_2_1_16_1","volume-title":"the USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT 07)","author":"Shvartsman A","year":"2007","unstructured":"Kiayias, A., Michel, L., Russell, A., Shashidar, N., See, A., and Shvartsman , A . An authentication and ballot layout attack against an optical scan voting terminal . In the USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT 07) ( August 2007 ). Kiayias, A., Michel, L., Russell, A., Shashidar, N., See, A., and Shvartsman, A. An authentication and ballot layout attack against an optical scan voting terminal. In the USENIX\/ACCURATE Electronic Voting Technology Workshop (EVT 07) (August 2007)."},{"key":"e_1_3_2_1_17_1","first-page":"30","volume-title":"the 23rd Annual Computer Security Applications Conference (ACSAC 2007)","author":"Shvartsman A. A.","year":"2007","unstructured":"Kiayias, A., Michel, L., Russell, A., Shashidhar, N., See, A., Shvartsman , A. A. , and Davtyan , S . Tampering with special purpose trusted computing devices: A case study in optical scan e-voting . In the 23rd Annual Computer Security Applications Conference (ACSAC 2007) , December 10-14, 2007 , Miami Beach, FL (2007), pp. 30 -- 39 . Kiayias, A., Michel, L., Russell, A., Shashidhar, N., See, A., Shvartsman, A. A., and Davtyan, S. Tampering with special purpose trusted computing devices: A case study in optical scan e-voting. In the 23rd Annual Computer Security Applications Conference (ACSAC 2007), December 10-14, 2007, Miami Beach, FL (2007), pp. 30--39."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301313"},{"key":"e_1_3_2_1_19_1","volume-title":"http:\/\/blackboxvoting.com\/s9\/index.php?\/archives\/138-CONNECTING-MARYLANDS-ELECTION-DEBACLE-DOTS.html","author":"Connecting Maryland's","year":"2006","unstructured":"Connecting Maryland's election debacle dots. http:\/\/blackboxvoting.com\/s9\/index.php?\/archives\/138-CONNECTING-MARYLANDS-ELECTION-DEBACLE-DOTS.html , 2006 . Connecting Maryland's election debacle dots. http:\/\/blackboxvoting.com\/s9\/index.php?\/archives\/138-CONNECTING-MARYLANDS-ELECTION-DEBACLE-DOTS.html, 2006."},{"key":"e_1_3_2_1_20_1","volume-title":"November","author":"Morgan M.","year":"2009","unstructured":"Morgan , M. Election night in washtenaw county , November 2009 . The Ann Arbor Chronicle . Morgan, M. Election night in washtenaw county, November 2009. The Ann Arbor Chronicle."},{"key":"e_1_3_2_1_21_1","volume-title":"The machinery of democracy: Protecting elections in an electronic world","author":"Norden L.","year":"2005","unstructured":"Norden , L. The machinery of democracy: Protecting elections in an electronic world , 2005 . Brennan Center Task Force on Voting System Security, http:\/\/www.brennancenter.org\/page\/-\/d\/download_file_36343.pdf. Norden, L. The machinery of democracy: Protecting elections in an electronic world, 2005. Brennan Center Task Force on Voting System Security, http:\/\/www.brennancenter.org\/page\/-\/d\/download_file_36343.pdf."},{"key":"e_1_3_2_1_22_1","volume-title":"et al. Technological audits of optical scan voting systems: Summary for 2007 to 2010 connecticut elections. Tech. rep","author":"Shvartsman A. A.","year":"2011","unstructured":"Shvartsman , A. A. et al. Technological audits of optical scan voting systems: Summary for 2007 to 2010 connecticut elections. Tech. rep ., UConn Center for Voting Technology Research , 2011 . Shvartsman, A. A. et al. Technological audits of optical scan voting systems: Summary for 2007 to 2010 connecticut elections. Tech. rep., UConn Center for Voting Technology Research, 2011."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029496.1029520"},{"key":"e_1_3_2_1_24_1","volume-title":"Security analysis of the Diebold AccuBasic interpreter. Voting Systems Technology Assessment Advisory Board","author":"Wagner D.","year":"2006","unstructured":"Wagner , D. , Jefferson , D. , and Bishop , M . Security analysis of the Diebold AccuBasic interpreter. Voting Systems Technology Assessment Advisory Board , University of California , Berkeley , 14 February 2006 . Wagner, D., Jefferson, D., and Bishop, M. Security analysis of the Diebold AccuBasic interpreter. Voting Systems Technology Assessment Advisory Board, University of California, Berkeley, 14 February 2006."},{"key":"e_1_3_2_1_25_1","unstructured":"Wertheimer M. A. Trusted agent report Diebold AccuVote-TS voting system. RABA Innovative Solution Cell http:\/\/people.csail.mit.edu\/rivest\/voting\/reports\/2004-01-20%20RABA%20evaluation%20of%20Diebold%20AccuVote.pdf January 2004.  Wertheimer M. A. Trusted agent report Diebold AccuVote-TS voting system. RABA Innovative Solution Cell http:\/\/people.csail.mit.edu\/rivest\/voting\/reports\/2004-01-20%20RABA%20evaluation%20of%20Diebold%20AccuVote.pdf January 2004."}],"event":{"name":"SAC '13: SAC '13","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Coimbra Portugal","acronym":"SAC '13"},"container-title":["Proceedings of the 28th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2480362.2480702","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2480362.2480702","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:24Z","timestamp":1750277664000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2480362.2480702"}},"subtitle":["arbitrary code execution on optical scan voting terminals"],"short-title":[],"issued":{"date-parts":[[2013,3,18]]},"references-count":25,"alternative-id":["10.1145\/2480362.2480702","10.1145\/2480362"],"URL":"https:\/\/doi.org\/10.1145\/2480362.2480702","relation":{},"subject":[],"published":{"date-parts":[[2013,3,18]]},"assertion":[{"value":"2013-03-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}