Check out the new USENIX Web site.

Model Procedures and Inject Threats

A subset of UML diagrams is used to model (an excerpt of) the procedure that is followed during project trials for delivering the voting software to the polling stations (See Figure 3).
Figure 3: An example of asset flows
Image ExampleNominal
The diagram shows how, before the election, the Electoral Office encrypts the e-voting software and creates a memory support which contains the final software release. The responsible person at the Electoral Office then prepares an envelope with the PIN code (that it is used to activate the voting functions) and the memory support. A messenger (e.g. a police officer) takes the envelope and delivers it to the polling station, where the polling officers, once verified that the enveloped is sealed, open it, insert the memory support in the voting machine, insert the PIN and start the voting operations.


In order to analyze possible threats to this procedure, we inject threats into the model of the procedures and generate the extended model. Figure 4 depicts the extended model resulting from the injection of some delete and replace threat actions in the example of Figure 3 (threat actions are stereotyped with the ``threat-action'' stereotype and marked in color). Note that the semantics of delete and replace actions may slightly vary when applied to different kinds of assets.

Figure 4: An example of extended model
Image ExampleExtended

komminist 2008-06-30