Check out the new USENIX Web site.
WORKSHOP SESSIONS

Session papers are available to workshop registrants immediately and to everyone starting August 10, 2007.

All sessions will take place in the Back Bay Ballroom A of the Sheraton Boston Hotel unless otherwise noted.

Sunday, August 5, 2007

5:00 p.m.–7:00 p.m.    On-site Registration, Constitution Foyer
5:30 p.m.–7:00 p.m.  
USENIX Security '07 Welcome Get-Together
Constitution Foyer

Monday, August 6, 2007

7:30 a.m.–5:00 p.m.    On-site Registration, Constitution Foyer
8:30 a.m.–10:00 a.m.  
Analysis

Studying the Nedap/Groenendaal ES3B Voting Computer: A Computer Security Perspective
Rop Gonggrijp and Willem-Jan Hengeveld, Stichting "Wij vertrouwen stemcomputers niet"
Read the paper in PDF

Security Analysis of the Diebold AccuVote-TS Voting Machine
Ariel J. Feldman, J. Alex Halderman, and Edward W. Felten, Princeton University
Read the paper in PDF | HTML

An Analysis of the Hart Intercivic DAU eSlate
Elliot Proebstel, Sean Riddle, Francis Hsu, and Justin Cummins, University of California, Davis; Freddie Oakley and Tom Stanionis, Yolo County Elections Office; Matt Bishop, University of California, Davis
Read the paper in PDF | HTML

10:00 a.m.–10:30 a.m.    Break
10:30 a.m.–11:45 a.m.  
Design I

Casting Votes in the Auditorium
Daniel Sandler and Dan S. Wallach, Rice University
Read the paper in PDF | HTML

Extending Prerendered-Interface Voting Software to Support Accessibility and Other Ballot Features
Ka-Ping Yee, University of California, Berkeley
Read the paper in PDF | HTML

Verification-Centric Realization of Electronic Vote Counting
Joseph R. Kiniry, Dermot Cochran, and Patrick E. Tierney, University College Dublin
Read the paper in PDF | HTML

11:45 a.m.–1:15 p.m.    Workshop Luncheon, Back Bay Ballroom B
1:15 p.m.–2:45 p.m.  
Auditing and Transparency

Contractual Barriers to Transparency in Electronic Voting
Joseph Lorenzo Hall, University of California, Berkeley
Read the paper in PDF | HTML

On Estimating the Size and Confidence of a Statistical Audit
Javed A. Aslam, Northeastern University; Raluca A. Popa and Ronald L. Rivest, Massachusetts Institute of Technology
Read the paper in PDF | HTML

Machine-Assisted Election Auditing
Joseph A. Calandrino, J. Alex Halderman, and Edward W. Felten, Princeton University
Read the paper in PDF | HTML

An Examination of the Auditability of Voter Verified Paper Audit Trail (VVPAT) Ballots
Stephen N. Goggin and Michael D. Byrne, Rice University
Read the paper in PDF | HTML

2:45 p.m.–3:30 p.m.    Break
3:30 p.m.–4:30 p.m.  
Analysis II

On the Difficulty of Validating Voting Machine Software with Software
Ryan Gardner, Sujata Garera, and Aviel D. Rubin, Johns Hopkins University
Read the paper in PDF | HTML

GEMS Tabulation Database Design Issues in Relation to Voting Systems Certification Standards
Thomas P. Ryan and Candice Hoke, Cleveland State University
Read the paper in PDF | HTML

An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal
Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha Sashidar, Andrew See, and Alexander A. Shvartsman, University of Connecticut
Read the paper in PDF | HTML

4:30 p.m.–5:15 p.m.    Break
5:15 p.m.–6:45 p.m.  
Design II

Ballot Casting Assurance via Voter-Initiated Poll Station Auditing
Josh Benaloh, Microsoft Research
Read the paper in PDF

Bare-Handed Electronic Voting with Pre-processing
Ben Riva and Amnon Ta-Shma, Tel-Aviv University
Read the paper in PDF | HTML

Three Voting Protocols: ThreeBallot, VAV, and Twin
Ronald L. Rivest, Massachusetts Institute of Technology; Warren D. Smith, Center for Range Voting
Read the paper in PDF | HTML

footer
?Need help? Use our Contacts page.

Last changed: 10 Aug. 2007 jel