Check out the new USENIX Web site.
EVT/WOTE '10 Banner


USENIX Security '09

WORKSHOP SESSIONS

VideoJust Up! Videos of the presentations will be posted as soon as they become available. Access is currently restricted to USENIX members and EVT/WOTE '10 workshop attendees. Not a member? Join today!

All sessions will take place in Wilson AB unless otherwise noted.

Session papers with links below are available to workshop registrants immediately and to everyone beginning August 9, 2010.

Monday, August 9, 2010
9:00 a.m.–10:00 a.m.

Opening Remarks

Program Co-Chairs: Doug Jones, University of Iowa; Jean-Jacques Quisquater, Université catholique de Louvain; Eric Rescorla, RTFM, Inc.

Keynote Address

Speaker: Donetta Davidson, United States Election Assistance Commission

MP3 Icon Listen in MP3 format

10:00 a.m.–10:20 a.m.    Break
10:20 a.m.–11:10 a.m.

Efficient User-Guided Ballot Image Verification
Arel Cordero, Theron Ji, and Alan Tsai, University of California, Berkeley; Keaton Mowery, University of California, San Diego; David Wagner, University of California, Berkeley

Read the Abstract | Full paper

Video View the video

OpenScan: A Fully Transparent Optical Scan Voting System
Kai Wang, University of California, San Diego; Eric Rescorla, Skype; Hovav Shacham and Serge Belongie, University of California, San Diego

Read the Abstract | Full paper

Video View the video

11:10 a.m.–11:30 a.m.    Break
11:30 a.m.–12:20 p.m.

On the Use of Financial Data as a Random Beacon
Jeremy Clark and Urs Hengartner, University of Waterloo

Read the Abstract | Full paper

Video View the video

Queuing and Elections: Long Lines, DREs and Paper Ballots
William A. Edelstein, Johns Hopkins University School of Medicine; Arthur D. Edelstein, University of California, San Francisco

Read the Abstract | Full paper

Video View the video

12:20 p.m.–1:50 p.m.    Workshop Luncheon, Thurgood Marshall South West
1:50 p.m.–3:05 p.m.

Determining the Causes of AccuVote Optical Scan Voting Terminal Memory Card Failures
Tigran Antonyan, Nicolas Nicolaou, Alexander A. Shvartsman, and Therese Smith, University of Connecticut

Read the Abstract | Full paper

Video View the video

Modeling and Analyzing Faults to Improve Election Process Robustness
Borislava I. Simidchieva, University of Massachusetts Amherst; Sophie J. Engle and Michael Clifford, University of California, Davis; Alicia Clay Jones, Booz Allen; Sean Peisert, University of California, Davis, and Lawrence Berkeley National Laboratory; Matt Bishop, University of California, Davis; Lori A. Clarke and Leon J. Osterweil, University of Massachusetts Amherst

Read the Abstract | Full paper

Video View the video

Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example
Saghar Estehghari, University College London; Yvo Desmedt, University College London and Research Center for Information Security, Tokyo

Read the Abstract | Full paper

3:05 p.m.–3:20 p.m.    Break
3:20 p.m.–5:10 p.m.

Panel on Indian Electronic Voting Machines (EVMs)

Moderator: Joseph Lorenzo Hall, University of California, Berkeley and Princeton University

Panelists: P.V. Indiresan, Former Director, IIT-Madras; G.V.L Narasimha Rao, Citizens for Verifiability, Transparency, and Accountability in Elections, VeTA; Alok Shukla, Election Commission of India; J. Alex Halderman, University of Michigan

Video View the video

India is one of a number of nations that deploy a uniform computerized voting system in their national elections. As the second most populous nation, the challenges of running a national election across such a diverse electorate and geography is challenging. The Indian EVM voting system is considerably more simple than voting systems in the US; it has no interactive interface, no accessibility support, and is intended to operate in elections with only one (or very few) contests on the ballot. Recently, charges of irregularities perpetrated by technically-savvy attackers have surfaced. A group of academics and advocates published a security analysis of the Indian EVM this spring that highlights a number of serious vulnerabilities and describes a few practical exploits. The Electoral Commission of India has responded that these attacks are theoretical in nature and that reports of irregularities have not been substantiated to a degree that implicates deficiencies in the technology itself. This panel will present two researchers from the effort this spring, a representative from the Electoral Commission of India and an academic advisor to the Electoral Commission of India. Panelists will speak about the current state of Indian voting technology, the critiques made of the EVM, and what the future holds for voting technology in India.
4:25 p.m.–5:00 p.m.    Break
5:30 p.m.–7:30 p.m.

Rump Session

See the complete list of accepted presentations along with videos here.

Tuesday, August 10, 2010
9:00 a.m.–10:30 a.m.

Invited Talk

Outsmarted Regulators: Gambling Devices in Nevada
Jeff Burbank, Fulbright grantee in journalism and author of four books, including License to Steal: Nevada's Gaming Control System in the Megaresort Age

MP3 Icon Listen in MP3 format

Jeff Burbank will offer case studies on how Nevada's gaming control system struggled with advanced technology developed by slot machine companies and was left vulnerable to corruption from within.

10:30 a.m.–10:50 a.m.    Break
10:50 a.m.–12:05 p.m.

Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness
Nadia Heninger, Princeton University

Read the Abstract | Full paper

Video View the video

Super-Simple Simultaneous Single-Ballot Risk-Limiting Audits
Philip B. Stark, University of California, Berkeley

Read the Abstract | Full paper

Video View the video

Single-Ballot Risk-Limiting Audits Using Convex Optimization
Stephen Checkoway, Anand Sarwate, and Hovav Shacham, University of California, San Diego

Read the Abstract | Full paper

Video View the video

12:05 p.m.–1:30 p.m.    Workshop Luncheon, Thurgood Marshall South West
1:30 p.m.–2:45 p.m.

Performance Requirements for End-to-End Verifiable Elections
Stefan Popoveniuc, KT Consulting; John Kelsey and Andrew Regenscheid, National Institute of Standards and Technology; Poorvi Vora, National Institute of Standards and Technology and the George Washington University

Read the Abstract | Full paper

Video View the video

Parallel Shuffling and Its Application to Prêt à Voter
Kim Ramchen; Vanessa Teague, University of Melbourne

Read the Abstract | Full paper

Video View the video

Eperio: Mitigating Technical Complexity in Cryptographic Election Verification
Aleksander Essex, Jeremy Clark, and Urs Hengartner, University of Waterloo; Carlisle Adams, University of Ottawa

Read the Abstract | Full paper

Video View the video

2:45 p.m.–3:05 p.m.    Break
3:05 p.m.–3:55 p.m.

Towards Publishable Event Logs That Reveal Touchscreen Faults
Andrea L. Mascher, Paul T. Cotton, and Douglas W. Jones, The University of Iowa

Read the Abstract | Full paper

Video View the video

Baseline Usability Data for a Non-Electronic Approach to Accessible Voting
Gillian E. Piner and Michael D. Byrne, Rice University

Read the Abstract | Full paper

Video View the video

3:55 p.m.–4:15 p.m.    Short Break
4:15 p.m.–5:15 p.m.

Closing Remarks

footer
? Need help? Use our Contacts page.

Last changed: 8 Sept. 2010 jp