Formal analysis of an electronic voting system: An experience report
We have seen that several currently deployed e-voting systems share critical failures in their design and implementation that render their technical and procedural controls insufficient to guarantee trustworthy voting. The application of formal methods would greatly help to better address problems a...
Saved in:
Published in | The Journal of systems and software Vol. 84; no. 10; pp. 1618 - 1637 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
Elsevier Inc
01.10.2011
Elsevier Sequoia S.A |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | We have seen that several currently deployed e-voting systems share critical failures in their design and implementation that render their technical and procedural controls insufficient to guarantee trustworthy voting. The application of formal methods would greatly help to better address problems associated with assurance against requirements and standards. More specifically, it would help to thoroughly specify and analyze the underlying assumptions and security specific properties, and it would improve the trustworthiness of the final systems. In this article, we show how such techniques can be used to model and reason about the security of one of the currently deployed e-voting systems in the U.S.A named ES&S. We used the ASTRAL language to specify the voting process of ES&S machines and the critical security requirements for the system. Proof obligations that verify that the specified system meets the critical requirements were automatically generated by the ASTRAL Software Development Environment (SDE). The PVS interactive theorem prover was then used to apply the appropriate proof strategies and discharge the proof obligations. We also believe that besides analyzing the system against its requirements, it is equally important to perform an analysis under malicious circumstances where the execution model is augmented with attack behaviors. Thus, we extend the formal specification of the system by specifying attacks that have been shown to successfully compromise the system, and we then repeat the formal verification. This is helpful in detecting missing requirements or unwarranted assumptions about the specification of the system. In addition, this allows one to sketch countermeasure strategies to be used when the system behaves differently than it should and to build confidence about the system under development. Finally, we acknowledge the main problem that arises in e-voting system specification and verification: modeling attacks is very difficult because the different types of attack often cut across the structure of the original behavior models, thus making (incremental or compositional) verification very difficult. |
---|---|
AbstractList | We have seen that several currently deployed e-voting systems share critical failures in their design and implementation that render their technical and procedural controls insufficient to guarantee trustworthy voting. The application of formal methods would greatly help to better address problems associated with assurance against requirements and standards. More specifically, it would help to thoroughly specify and analyze the underlying assumptions and security specific properties, and it would improve the trustworthiness of the final systems. In this article, we show how such techniques can be used to model and reason about the security of one of the currently deployed e-voting systems in the U.S.A named ES&S. We used the ASTRAL language to specify the voting process of ES&S machines and the critical security requirements for the system. Proof obligations that verify that the specified system meets the critical requirements were automatically generated by the ASTRAL Software Development Environment (SDE). The PVS interactive theorem prover was then used to apply the appropriate proof strategies and discharge the proof obligations. We also believe that besides analyzing the system against its requirements, it is equally important to perform an analysis under malicious circumstances where the execution model is augmented with attack behaviors. Thus, we extend the formal specification of the system by specifying attacks that have been shown to successfully compromise the system, and we then repeat the formal verification. This is helpful in detecting missing requirements or unwarranted assumptions about the specification of the system. In addition, this allows one to sketch countermeasure strategies to be used when the system behaves differently than it should and to build confidence about the system under development. Finally, we acknowledge the main problem that arises in e-voting system specification and verification: modeling attacks is very difficult because the different types of attack often cut across the structure of the original behavior models, thus making (incremental or compositional) verification very difficult. This paper had seen that several currently deployed e-voting systems share critical failures in their design and implementation that render their technical and procedural controls insufficient to guarantee trustworthy voting. The application of formal methods would greatly help to better address problems associated with assurance against requirements and standards. This paper showed how such techniques can be used to model and reason about the security of one of the currently deployed e-voting systems in the US named ES&S. This paper used the ASTRAL language to specify the voting process of ES&S machines and the critical security requirements for the system. Proof obligations that verify that the specified system meets the critical requirements were automatically generated by the ASTRAL Software Development Environment. The PVS interactive theorem prover was then used to apply the appropriate proof strategies and discharge the proof obligations. |
Author | Villafiorita, Adolfo Weldemariam, Komminist Kemmerer, Richard A. |
Author_xml | – sequence: 1 givenname: Komminist surname: Weldemariam fullname: Weldemariam, Komminist email: sisai@fbk.eu, komminist@gmail.com organization: Foundation Bruno Kessler, via Sommarive 18, TN 38123 Trento, Italy – sequence: 2 givenname: Richard A. surname: Kemmerer fullname: Kemmerer, Richard A. organization: Department of Computer Science, University of California, Santa Barbara, CA 93106-5110, United States – sequence: 3 givenname: Adolfo surname: Villafiorita fullname: Villafiorita, Adolfo organization: Foundation Bruno Kessler, via Sommarive 18, TN 38123 Trento, Italy |
BookMark | eNp9kEFLAzEQhYNUsFZ_gLfFi6etmSTN7uqpVKtCwYueQ5pOJMvuZk22xf57U-vJgzAwD-a9B_Odk1HnOyTkCugUKMjbelrHOGUUYEp5GnZCxlAWPAfGyhEZJ49IGtgZOY-xppQWjLIxeVj60Oom051u9tHFzNukM2zQDMF3zmQ7P7juI4v7OGB7l83T8avH4LAzmAXsfRguyKnVTcTL3z0h78vHt8Vzvnp9elnMV7nhMznkFYBmyMFWfA2ysDMq17bczCwyWcJabCS3GsBoq5kRBUq2riQaWdpZhZUAPiE3x94--M8txkG1LhpsGt2h30ZVgZBcVIVIzus_ztpvQ_oxqrKkvBQSDnVwNJngYwxoVR9cq8NeAVUHqqpWiao6UFWUp2Epc3_MYPpz5zCoaH5QbFxIyNTGu3_S33magMw |
CODEN | JSSODM |
CitedBy_id | crossref_primary_10_1007_s10586_018_2162_7 crossref_primary_10_1016_j_jss_2013_09_020 crossref_primary_10_4018_IJSI_309731 crossref_primary_10_1007_s11042_017_4853_0 |
Cites_doi | 10.3233/JCS-2009-0340 10.1145/373243.360213 10.1109/52.57891 10.3233/JCS-2009-0339 10.1023/A:1018934104631 10.1109/TIFS.2009.2034903 10.1147/sj.411.0140 10.1109/TSE.2009.53 10.1007/3-540-45657-0_29 10.1145/1297797.1297827 10.1109/TSE.2007.70772 10.1007/978-3-642-13556-9_6 10.1504/EG.2009.024443 10.1109/MSP.2008.62 10.1109/HICSS.1997.661700 10.1109/5254.722359 10.1145/332159.332163 10.1016/j.entcs.2007.01.060 |
ContentType | Journal Article |
Copyright | 2011 Elsevier Inc. Copyright Elsevier Sequoia S.A. Oct 2011 |
Copyright_xml | – notice: 2011 Elsevier Inc. – notice: Copyright Elsevier Sequoia S.A. Oct 2011 |
DBID | AAYXX CITATION 7SC 8FD JQ2 L7M L~C L~D |
DOI | 10.1016/j.jss.2011.03.032 |
DatabaseName | CrossRef Computer and Information Systems Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Computer and Information Systems Abstracts Technology Research Database Computer and Information Systems Abstracts – Academic Advanced Technologies Database with Aerospace ProQuest Computer Science Collection Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Computer and Information Systems Abstracts Computer and Information Systems Abstracts |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 1873-1228 |
EndPage | 1637 |
ExternalDocumentID | 2413735291 10_1016_j_jss_2011_03_032 S0164121211000756 |
Genre | Feature |
GeographicLocations | United States--US |
GeographicLocations_xml | – name: United States--US |
GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 29L 4.4 457 4G. 5GY 5VS 7-5 71M 8P~ 9JN 9M8 AABNK AACTN AAEDT AAEDW AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AAXUO AAYFN AAYOK ABBOA ABEFU ABFNM ABFRF ABFSI ABJNI ABMAC ABTAH ABXDB ABYKQ ACDAQ ACGFO ACGFS ACGOD ACNNM ACRLP ACZNC ADBBV ADEZE ADHUB ADJOM ADMUD AEBSH AEFWE AEKER AENEX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHZHX AI. AIALX AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ASPBG AVWKF AXJTR AZFZN BKOJK BKOMP BLXMC CS3 DU5 E.L EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 FDB FEDTE FGOYB FIRID FNPLU FYGXN G-Q G8K GBLVA GBOLZ HLZ HVGLF HZ~ IHE J1W KOM LG9 M41 MO0 MS~ N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. PQQKQ Q38 R2- RIG RNS ROL RPZ RXW SBC SDF SDG SDP SES SEW SPC SPCBC SSV SSZ T5K TAE TN5 TWZ UHS UNMZH VH1 WUQ XPP ZMT ZY4 ~G- AAXKI AAYXX AFJKZ AKRWK CITATION 7SC 8FD JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c356t-911a2e31f93b167f506bf8d5fe2681b4d63fa11cafa2c47e62b96ec68f59e9413 |
IEDL.DBID | AIKHN |
ISSN | 0164-1212 |
IngestDate | Fri Oct 25 23:33:33 EDT 2024 Thu Oct 10 17:07:05 EDT 2024 Thu Sep 26 17:43:31 EDT 2024 Fri Feb 23 02:32:33 EST 2024 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 10 |
Keywords | Formal specification and verification Electronic voting systems Critical requirements ES&S system |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c356t-911a2e31f93b167f506bf8d5fe2681b4d63fa11cafa2c47e62b96ec68f59e9413 |
Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
PQID | 880384611 |
PQPubID | 45802 |
PageCount | 20 |
ParticipantIDs | proquest_miscellaneous_914634974 proquest_journals_880384611 crossref_primary_10_1016_j_jss_2011_03_032 elsevier_sciencedirect_doi_10_1016_j_jss_2011_03_032 |
PublicationCentury | 2000 |
PublicationDate | 2011-10-01 |
PublicationDateYYYYMMDD | 2011-10-01 |
PublicationDate_xml | – month: 10 year: 2011 text: 2011-10-01 day: 01 |
PublicationDecade | 2010 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | The Journal of systems and software |
PublicationYear | 2011 |
Publisher | Elsevier Inc Elsevier Sequoia S.A |
Publisher_xml | – name: Elsevier Inc – name: Elsevier Sequoia S.A |
References | Kemmerer (bib0170) 1990; 7 Bishop, Wagner (bib0040) 2007; 50 Abadi, Fournet (bib0005) 2001; 36 Cranor, Cytron (bib0110) 1997; 3 Cansell, Gibson, Mery (bib0070) 2007 Xu, Nygard (bib0305) 2005 Bryans, Littlewood, Ryan, Strigini (bib0050) 2006 Abrial (bib0010) 1996 Juels, Catalano, Jakobsson (bib0160) 2005 Villafiorita, Weldemariam, Tiella (bib0270) 2009; 4 Federal Election Commission, Voting System Standards, 2005. URL Schmidt, Volkamer, Buchmann (bib0235) 2010 Tiella, Villafiorita, Tomasi (bib0265) 2007 Heitmeyer, C.L., Archer, M.M., Leonard, E.I., McLean, J.D., 2008. Applying formal methods to a certifiably secure software system. IEEE Transactions on Software Engineering (1), 34, pp. 82–98. Aviv, Černy, Clark, Cronin, Shah, Sherr, Blaze (bib0020) 2008 Cimatti, Clarke, Giunchiglia, Giunchiglia, Pistore, Roveri, Sebastiani, Tacchella (bib0085) 2002 . Ansari, Sakarindr, Haghani, Zhang, Jain, Shi (bib0015) 2008; 6 Bryl, Dalpiaz, Ferrario, Mattioli, Villafiorita (bib0055) 2009; 6 Council of Europe Recommendation on legal, Operational and Technical Standards for e-voting, Council of Europe, 2004. Jones (bib0155) 2003 ES&S Inc, Election Systems & Software: iVotronic Thomas, Moorby (bib0255) 1991 Sastry, N.K., 2007. Verifying Security Properties in Electronic Voting Machines, Ph.D. thesis, EECS Department, University of California, Berkeley, URL Cobleigh, Clarke, Osterweil (bib0090) 2002; 41 Election Systems & Software, Video: Voting with the ES&S iVotronic, 2009. Tiella, Villafiorita, Tomasi (bib0260) 2006 Gardner, Garera, Rubin (bib0130) 2007 McGaley, M.,2008. E-voting: an Immature Technology in a Critical Context. Ph.D. thesis, Departement of Computer Science, National University of Ireland, Maynooth, URL Delaune, Kremer, Ryan (bib0115) 2009; 17 Sturton, Jha, Seshia, Wagner, D. (bib0250) 2009 Owre, S., Shankar, N., Rushby, J.M., 1993. The PVS Specification Language. Küsters, Truderung, Vogt (bib0165) 2010 Balzarotti, Banks, Cova, Felmetsger, Kemmerer, Robertson, Valeur, Vigna (bib0035) 2008 Gibson, J.P., Lallet, E., Raffy, J.-L., 2010. Engineering a distributed e-voting system architecture: meeting critical requirements. In: ISARCS, pp. 89–108. Cansell, Gibson, Méry (bib0075) 2007; 183 Voting System, version 9.1.x Election Day Operations Checklist, 2007. Kolano, Dang, Kemmerer (bib0185) 1999; 7 Simidchieva, Marzilli, Clarke, Osterweil (bib0240) 2008 Backes, M., Hritcu, C., Maffei, M., 2008. Automated verification of remote electronic voting protocols in the applied pi-calculus. In: CSF, IEEE, ISBN 978-0-7695-3182-3, pp. 195–209. Weldemariam, Villafiorita (bib0290) 2008 Kremer, Ryan (bib0190) 2005 Volkamer, Krimmer (bib0280) 2007 Grimm, Hupf, Volkamer (bib0140) 2010 Balzarotti, Banks, Cova, Felmetsger, Kemmerer, Robertson, Valeur, Vigna (bib0030) 2010; 36 Reinhard, Jung (bib0225) 2007 Smith, Avrunin, Clarke, Osterweil (bib0245) 2002 Weldemariam, Mattioli, Villafiorita (bib0295) 2009 California Secretary of State, 2007. Withdrawal of Approval of Diebold Election Systems, Inc., GEMS 1.18.24/AccuVote-TSWAccuVote-OS DRE & Optical Scan Voting System and conditional re-approval of use of Diebold Election Systems, Inc., GEMS 1.18.24/AccuVote-TSX/AccuVote-OS DRE & optical scan voting system, URL Cass, Lerner, Sutton, McCall, Wise, Osterweil (bib0080) 2000 Volkamer, McGaley (bib0285) 2007 Common Criteria Common Criteria for Information Technology Security Evaluation, 2007. Campanelli, Falleni, Martinelli, Petrocchi, Vaccarelli (bib0065) 2008 Kolano, P., 1999. Tools and Techniques for the Design and Systematic Analysis of Real-Time Systems. Ph.D. thesis, University of California, Santa Barbara). Kohno, Stubblefield, Rubin, Wallach (bib0175) 2004 Wolchok, Wustrow, Halderman, Prasad, Kankipati, Sakhamuri, Yagati, Gonggrijp (bib0300) 2010 Blanchet (bib0045) 2009 Mercuri, R.T., 2001. Electronic Vote Tabulation Checks and Balances. Ph.D. thesis, University of Pennsylvania. McDaniel, P., Butler, K., Enck, W., Hursti, H., McLaughlin, S., Traynor, P., Blaze, M., Aviv, A., Cerny, P., Clark, S., Vigna, G., Kemmerer, R., Balzarotti, D., Banks, G., Cova, M., Felmetsger, V., Robertson, W., Valeur, F., Hall, J.L., Quilter, L., 2007. EVEREST: Evaluation and Validation of Election-Related Equipment, Standards and Testing, Ohio Secretary of State’s EVEREST Project Report. Volkamer (bib0275) 2009 Martinelli (bib0200) 2002 Cranor (bib0105) 1996; 2 Lowry, Dvorak (bib0195) 1998; 13 Volkamer (10.1016/j.jss.2011.03.032_bib0285) 2007 Simidchieva (10.1016/j.jss.2011.03.032_bib0240) 2008 Wolchok (10.1016/j.jss.2011.03.032_bib0300) 2010 Kremer (10.1016/j.jss.2011.03.032_bib0190) 2005 10.1016/j.jss.2011.03.032_bib0125 10.1016/j.jss.2011.03.032_bib0205 Martinelli (10.1016/j.jss.2011.03.032_bib0200) 2002 Schmidt (10.1016/j.jss.2011.03.032_bib0235) 2010 Cass (10.1016/j.jss.2011.03.032_bib0080) 2000 Balzarotti (10.1016/j.jss.2011.03.032_bib0035) 2008 Villafiorita (10.1016/j.jss.2011.03.032_bib0270) 2009; 4 10.1016/j.jss.2011.03.032_bib0120 Xu (10.1016/j.jss.2011.03.032_bib0305) 2005 Kolano (10.1016/j.jss.2011.03.032_bib0185) 1999; 7 Cimatti (10.1016/j.jss.2011.03.032_bib0085) 2002 Volkamer (10.1016/j.jss.2011.03.032_bib0275) 2009 Cansell (10.1016/j.jss.2011.03.032_bib0070) 2007 Delaune (10.1016/j.jss.2011.03.032_bib0115) 2009; 17 Bryans (10.1016/j.jss.2011.03.032_bib0050) 2006 Weldemariam (10.1016/j.jss.2011.03.032_bib0290) 2008 Bryl (10.1016/j.jss.2011.03.032_bib0055) 2009; 6 10.1016/j.jss.2011.03.032_bib0150 Grimm (10.1016/j.jss.2011.03.032_bib0140) 2010 10.1016/j.jss.2011.03.032_bib0230 Tiella (10.1016/j.jss.2011.03.032_bib0260) 2006 Gardner (10.1016/j.jss.2011.03.032_bib0130) 2007 Campanelli (10.1016/j.jss.2011.03.032_bib0065) 2008 Küsters (10.1016/j.jss.2011.03.032_bib0165) 2010 Cobleigh (10.1016/j.jss.2011.03.032_bib0090) 2002; 41 Cranor (10.1016/j.jss.2011.03.032_bib0110) 1997; 3 Juels (10.1016/j.jss.2011.03.032_bib0160) 2005 Sturton (10.1016/j.jss.2011.03.032_bib0250) 2009 Lowry (10.1016/j.jss.2011.03.032_bib0195) 1998; 13 Bishop (10.1016/j.jss.2011.03.032_bib0040) 2007; 50 Kohno (10.1016/j.jss.2011.03.032_bib0175) 2004 10.1016/j.jss.2011.03.032_bib0220 10.1016/j.jss.2011.03.032_bib0100 Cranor (10.1016/j.jss.2011.03.032_bib0105) 1996; 2 Kemmerer (10.1016/j.jss.2011.03.032_bib0170) 1990; 7 10.1016/j.jss.2011.03.032_bib0145 10.1016/j.jss.2011.03.032_bib0025 Volkamer (10.1016/j.jss.2011.03.032_bib0280) 2007 Abadi (10.1016/j.jss.2011.03.032_bib0005) 2001; 36 Abrial (10.1016/j.jss.2011.03.032_bib0010) 1996 Ansari (10.1016/j.jss.2011.03.032_bib0015) 2008; 6 10.1016/j.jss.2011.03.032_bib0180 10.1016/j.jss.2011.03.032_bib0060 Cansell (10.1016/j.jss.2011.03.032_bib0075) 2007; 183 Aviv (10.1016/j.jss.2011.03.032_bib0020) 2008 10.1016/j.jss.2011.03.032_bib0215 Reinhard (10.1016/j.jss.2011.03.032_bib0225) 2007 Smith (10.1016/j.jss.2011.03.032_bib0245) 2002 Tiella (10.1016/j.jss.2011.03.032_bib0265) 2007 Weldemariam (10.1016/j.jss.2011.03.032_bib0295) 2009 Blanchet (10.1016/j.jss.2011.03.032_bib0045) 2009 10.1016/j.jss.2011.03.032_bib0095 10.1016/j.jss.2011.03.032_bib0210 10.1016/j.jss.2011.03.032_bib0135 Jones (10.1016/j.jss.2011.03.032_bib0155) 2003 Thomas (10.1016/j.jss.2011.03.032_bib0255) 1991 Balzarotti (10.1016/j.jss.2011.03.032_bib0030) 2010; 36 |
References_xml | – start-page: 1 year: 2008 end-page: 13 ident: bib0020 article-title: Security evaluation of ES&S voting machines and election management system publication-title: EVT: Proceedings of the Conference on Electronic Voting Technology contributor: fullname: Blaze – volume: 41 start-page: 140 year: 2002 end-page: 165 ident: bib0090 article-title: FLAVERS: a finite state verification technique for software systems publication-title: IBM Systems Journal contributor: fullname: Osterweil – start-page: 84 year: 2006 end-page: 94 ident: bib0260 article-title: Specification of the Control Logic of an eVoting System in UML: the ProVotE experience publication-title: Csduml contributor: fullname: Tomasi – volume: 36 start-page: 104 year: 2001 end-page: 115 ident: bib0005 article-title: Mobile values new names and secure communication publication-title: SIGPLAN Notices contributor: fullname: Fournet – year: 2003 ident: bib0155 article-title: The Evaluation of Voting Technology, Chap 1. Advances in Information Security contributor: fullname: Jones – start-page: 754 year: 2000 end-page: 757 ident: bib0080 article-title: Little-JIL/Juliette: A process definition language and interpreter publication-title: Proceedings of the 22nd International Conference on Software Engineering contributor: fullname: Osterweil – volume: 4 start-page: 651 year: 2009 end-page: 661 ident: bib0270 article-title: Development, formal verification, and evaluation of an E-voting System with VVPAT publication-title: IEEE Transactions on Information Forensics and Security contributor: fullname: Tiella – start-page: 29 year: 2009 end-page: 37 ident: bib0295 article-title: Managing Requirements for E-Voting Systems: Issues and Approaches publication-title: Proceedings of the 2009 First International Workshop on Requirements Engineering for e-Voting Systems contributor: fullname: Villafiorita – start-page: 93 year: 2007 end-page: 102 ident: bib0265 article-title: FSMC+ a tool for the generation of Java code from statecharts publication-title: PPPJ: Proceedings of the 5th International Symposium on Principles and Practice of Programming in Java contributor: fullname: Tomasi – start-page: 519 year: 2002 end-page: 531 ident: bib0200 article-title: Symbolic semantics and analysis for crypto-CCS with (almost) generic inference systems publication-title: MFCS: Proceedings of the 27th International Symposium on Mathematical Foundations of Computer Science contributor: fullname: Martinelli – start-page: 463 year: 2009 end-page: 476 ident: bib0250 article-title: On voting machine design for verification and testability publication-title: ACM Conference on Computer and Communications Security contributor: fullname: D. – year: 2007 ident: bib0280 article-title: Independent audits of remote electronic voting—developing a common criteria protection profile publication-title: Proceedings der EDEM 2007—Elektronische Demokratie in Österreich contributor: fullname: Krimmer – year: 1991 ident: bib0255 article-title: The VERILOG Hardware Description Language contributor: fullname: Moorby – start-page: 476 year: 2008 end-page: 481 ident: bib0065 article-title: Mobile Implementation and Formal Verification of an e-Voting System publication-title: Proceedings of the 2008 Third International Conference on Internet and Web Applications and Services, IEEE Computer Society contributor: fullname: Vaccarelli – start-page: 89 year: 2010 end-page: 107 ident: bib0140 article-title: A formal IT-security model for the correction and abort requirement of electronic voting publication-title: Electronic Voting contributor: fullname: Volkamer – year: 2008 ident: bib0290 article-title: Modeling and analysis of procedural security in (e)voting: the Trentino’s approach and experiences publication-title: EVT: Proceedings of the Conference on Electronic Voting Technology contributor: fullname: Villafiorita – year: 2007 ident: bib0130 article-title: On the Difficulty of Validating Voting Machine Software with Software publication-title: EVT: Proceedings of the USENIX/Accurate Electronic Voting Technology on USENIX/Accurate Electronic Voting Technology Workshop contributor: fullname: Rubin – start-page: 895 year: 2007 end-page: 902 ident: bib0285 article-title: Requirements and evaluation procedures for eVoting publication-title: ARES, IEEE Computer Society contributor: fullname: McGaley – start-page: 186 year: 2005 end-page: 200 ident: bib0190 article-title: Analysis of an electronic voting protocol in the applied Pi-calculus publication-title: Programming Languages and Systems—Proceedings of the 14th European Symposium on Programming (ESOP’05) contributor: fullname: Ryan – start-page: 988 year: 2006 end-page: 995 ident: bib0050 article-title: E-voting: dependability requirements and design for dependability publication-title: ARES contributor: fullname: Strigini – start-page: 329 year: 2007 end-page: 338 ident: bib0070 article-title: Formal verification of tamper-evident storage for E-voting publication-title: SEFM, IEEE Computer Society contributor: fullname: Mery – volume: 2 start-page: 12 year: 1996 end-page: 16 ident: bib0105 article-title: Electronic voting: computerized polls may save money protect privacy publication-title: Crossroads contributor: fullname: Cranor – start-page: 1 year: 2010 end-page: 14 ident: bib0300 article-title: Security analysis of India’s electronic voting machines publication-title: Proceedings of the 17th ACM Conference on Computer and Communications Security contributor: fullname: Gonggrijp – volume: 6 start-page: 213 year: 2009 end-page: 231 ident: bib0055 article-title: Evaluating procedural alternatives: a case study in e-voting publication-title: EG contributor: fullname: Villafiorita – start-page: 241 year: 2002 end-page: 268 ident: bib0085 article-title: NuSMV 2: an open source tool for symbolic model checking publication-title: Computer Aided Verification, Lecture Notes in Computer Science contributor: fullname: Tacchella – year: 1996 ident: bib0010 article-title: The B-book: Assigning Programs to Meanings contributor: fullname: Abrial – start-page: 135 year: 2010 end-page: 148 ident: bib0235 article-title: An Evaluation and Certification Approach to Enable Voting Service Providers publication-title: Electronic Voting contributor: fullname: Buchmann – volume: 17 start-page: 435 year: 2009 end-page: 487 ident: bib0115 article-title: Verifying privacy-type properties of electronic voting protocols publication-title: Journal of Computer Security contributor: fullname: Ryan – volume: 50 start-page: 120 year: 2007 end-page: 1120 ident: bib0040 article-title: Risks of e-voting publication-title: Communication of ACM contributor: fullname: Wagner – volume: 7 start-page: 37 year: 1990 end-page: 50 ident: bib0170 article-title: Integrating Formal Methods into the Development Process publication-title: IEEE Software contributor: fullname: Kemmerer – volume: 183 start-page: 39 year: 2007 end-page: 55 ident: bib0075 article-title: Refinement: a constructive approach to formal software design for a secure e-voting interface publication-title: Electronic Notes in Theoretical Computer Science contributor: fullname: Méry – start-page: 11 year: 2002 end-page: 21 ident: bib0245 article-title: PROPEL: an approach supporting property elucidation publication-title: ICSE’02: Proceedings of the 24th International Conference on Software Engineering contributor: fullname: Osterweil – volume: 36 start-page: 453 year: 2010 end-page: 473 ident: bib0030 article-title: An experience in testing the security of real-world electronic voting systems publication-title: IEEE Transaction on Software Engineering contributor: fullname: Vigna – start-page: 363 year: 2009 end-page: 434 ident: bib0045 article-title: Automatic verification of correspondences for security protocols publication-title: Journal of Computer Security contributor: fullname: Blanchet – start-page: 62 year: 2007 end-page: 75 ident: bib0225 article-title: Compliance of POLYAS with the BSI Protection Profile—Basic Requirements for Remote Electronic Voting Systems publication-title: VOTE-ID contributor: fullname: Jung – year: 2009 ident: bib0275 article-title: Evaluation of Electronic Voting: Requirements and Evaluation Procedures to Support Responsible Election Authorities contributor: fullname: Volkamer – start-page: 342 year: 2005 end-page: 346 ident: bib0305 article-title: A threat-driven approach to modeling and verifying secure software publication-title: Proceedings of the 20th IEEE/ACM International Conference on Automated Software Engineering contributor: fullname: Nygard – start-page: 61 year: 2005 end-page: 70 ident: bib0160 article-title: Coercion-resistant electronic elections publication-title: WPES: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society contributor: fullname: Jakobsson – volume: 6 start-page: 30 year: 2008 end-page: 39 ident: bib0015 article-title: Evaluating electronic voting systems equipped with voter-verified paper records publication-title: IEEE Security and Privacy contributor: fullname: Shi – start-page: 27 year: 2004 ident: bib0175 article-title: Analysis of an electronic voting system publication-title: IEEE Symposium on Security and Privacy contributor: fullname: Wallach – start-page: 237 year: 2008 end-page: 248 ident: bib0035 article-title: Are your votes really counted? Testing the security of real-world electronic voting systems publication-title: ISSTA: International Symposium on Software Testing and Analysis contributor: fullname: Vigna – start-page: 63 year: 2008 end-page: 72 ident: bib0240 article-title: Specifying and verifying requirements for election processes publication-title: Proceedings of the 2008 International Conference on Digital Government Research contributor: fullname: Osterweil – volume: 7 start-page: 177 year: 1999 end-page: 210 ident: bib0185 article-title: The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment publication-title: Annals of Software Engineering contributor: fullname: Kemmerer – volume: 13 start-page: 45 year: 1998 end-page: 49 ident: bib0195 article-title: Analytic Verification of Flight Software publication-title: IEEE Intelligent Systems contributor: fullname: Dvorak – volume: 3 start-page: 561 year: 1997 ident: bib0110 article-title: Sensus: a security-conscious electronic polling system for the Internet publication-title: Hawaii International Conference on System Sciences contributor: fullname: Cytron – start-page: 281 year: 2010 end-page: 295 ident: bib0165 publication-title: Proving coercion-resistance of scantegrity II contributor: fullname: Vogt – volume: 17 start-page: 435 issue: 4 year: 2009 ident: 10.1016/j.jss.2011.03.032_bib0115 article-title: Verifying privacy-type properties of electronic voting protocols publication-title: Journal of Computer Security doi: 10.3233/JCS-2009-0340 contributor: fullname: Delaune – start-page: 11 year: 2002 ident: 10.1016/j.jss.2011.03.032_bib0245 article-title: PROPEL: an approach supporting property elucidation contributor: fullname: Smith – volume: 36 start-page: 104 issue: 3 year: 2001 ident: 10.1016/j.jss.2011.03.032_bib0005 article-title: Mobile values new names and secure communication publication-title: SIGPLAN Notices doi: 10.1145/373243.360213 contributor: fullname: Abadi – year: 1991 ident: 10.1016/j.jss.2011.03.032_bib0255 contributor: fullname: Thomas – volume: 7 start-page: 37 issue: 5 year: 1990 ident: 10.1016/j.jss.2011.03.032_bib0170 article-title: Integrating Formal Methods into the Development Process publication-title: IEEE Software doi: 10.1109/52.57891 contributor: fullname: Kemmerer – start-page: 89 year: 2010 ident: 10.1016/j.jss.2011.03.032_bib0140 article-title: A formal IT-security model for the correction and abort requirement of electronic voting contributor: fullname: Grimm – year: 1996 ident: 10.1016/j.jss.2011.03.032_bib0010 contributor: fullname: Abrial – start-page: 519 year: 2002 ident: 10.1016/j.jss.2011.03.032_bib0200 article-title: Symbolic semantics and analysis for crypto-CCS with (almost) generic inference systems contributor: fullname: Martinelli – year: 2007 ident: 10.1016/j.jss.2011.03.032_bib0280 article-title: Independent audits of remote electronic voting—developing a common criteria protection profile contributor: fullname: Volkamer – start-page: 895 year: 2007 ident: 10.1016/j.jss.2011.03.032_bib0285 article-title: Requirements and evaluation procedures for eVoting contributor: fullname: Volkamer – start-page: 363 year: 2009 ident: 10.1016/j.jss.2011.03.032_bib0045 article-title: Automatic verification of correspondences for security protocols publication-title: Journal of Computer Security doi: 10.3233/JCS-2009-0339 contributor: fullname: Blanchet – start-page: 1 year: 2008 ident: 10.1016/j.jss.2011.03.032_bib0020 article-title: Security evaluation of ES&S voting machines and election management system contributor: fullname: Aviv – start-page: 988 year: 2006 ident: 10.1016/j.jss.2011.03.032_bib0050 article-title: E-voting: dependability requirements and design for dependability contributor: fullname: Bryans – volume: 7 start-page: 177 issue: 1–4 year: 1999 ident: 10.1016/j.jss.2011.03.032_bib0185 article-title: The Design and Analysis of Real-Time Systems Using the ASTRAL Software Development Environment publication-title: Annals of Software Engineering doi: 10.1023/A:1018934104631 contributor: fullname: Kolano – start-page: 342 year: 2005 ident: 10.1016/j.jss.2011.03.032_bib0305 article-title: A threat-driven approach to modeling and verifying secure software contributor: fullname: Xu – year: 2007 ident: 10.1016/j.jss.2011.03.032_bib0130 article-title: On the Difficulty of Validating Voting Machine Software with Software contributor: fullname: Gardner – start-page: 754 year: 2000 ident: 10.1016/j.jss.2011.03.032_bib0080 article-title: Little-JIL/Juliette: A process definition language and interpreter contributor: fullname: Cass – ident: 10.1016/j.jss.2011.03.032_bib0025 – start-page: 27 year: 2004 ident: 10.1016/j.jss.2011.03.032_bib0175 article-title: Analysis of an electronic voting system contributor: fullname: Kohno – start-page: 29 year: 2009 ident: 10.1016/j.jss.2011.03.032_bib0295 article-title: Managing Requirements for E-Voting Systems: Issues and Approaches contributor: fullname: Weldemariam – start-page: 63 year: 2008 ident: 10.1016/j.jss.2011.03.032_bib0240 article-title: Specifying and verifying requirements for election processes contributor: fullname: Simidchieva – start-page: 186 year: 2005 ident: 10.1016/j.jss.2011.03.032_bib0190 article-title: Analysis of an electronic voting protocol in the applied Pi-calculus contributor: fullname: Kremer – start-page: 61 year: 2005 ident: 10.1016/j.jss.2011.03.032_bib0160 article-title: Coercion-resistant electronic elections contributor: fullname: Juels – year: 2009 ident: 10.1016/j.jss.2011.03.032_bib0275 contributor: fullname: Volkamer – start-page: 476 year: 2008 ident: 10.1016/j.jss.2011.03.032_bib0065 article-title: Mobile Implementation and Formal Verification of an e-Voting System contributor: fullname: Campanelli – ident: 10.1016/j.jss.2011.03.032_bib0205 – ident: 10.1016/j.jss.2011.03.032_bib0150 – year: 2003 ident: 10.1016/j.jss.2011.03.032_bib0155 contributor: fullname: Jones – volume: 4 start-page: 651 issue: 4 year: 2009 ident: 10.1016/j.jss.2011.03.032_bib0270 article-title: Development, formal verification, and evaluation of an E-voting System with VVPAT publication-title: IEEE Transactions on Information Forensics and Security doi: 10.1109/TIFS.2009.2034903 contributor: fullname: Villafiorita – start-page: 281 year: 2010 ident: 10.1016/j.jss.2011.03.032_bib0165 contributor: fullname: Küsters – ident: 10.1016/j.jss.2011.03.032_bib0215 – volume: 41 start-page: 140 issue: 1 year: 2002 ident: 10.1016/j.jss.2011.03.032_bib0090 article-title: FLAVERS: a finite state verification technique for software systems publication-title: IBM Systems Journal doi: 10.1147/sj.411.0140 contributor: fullname: Cobleigh – year: 2008 ident: 10.1016/j.jss.2011.03.032_bib0290 article-title: Modeling and analysis of procedural security in (e)voting: the Trentino’s approach and experiences contributor: fullname: Weldemariam – volume: 36 start-page: 453 issue: 4 year: 2010 ident: 10.1016/j.jss.2011.03.032_bib0030 article-title: An experience in testing the security of real-world electronic voting systems publication-title: IEEE Transaction on Software Engineering doi: 10.1109/TSE.2009.53 contributor: fullname: Balzarotti – start-page: 241 year: 2002 ident: 10.1016/j.jss.2011.03.032_bib0085 article-title: NuSMV 2: an open source tool for symbolic model checking doi: 10.1007/3-540-45657-0_29 contributor: fullname: Cimatti – start-page: 463 year: 2009 ident: 10.1016/j.jss.2011.03.032_bib0250 article-title: On voting machine design for verification and testability contributor: fullname: Sturton – start-page: 93 year: 2007 ident: 10.1016/j.jss.2011.03.032_bib0265 article-title: FSMC+ a tool for the generation of Java code from statecharts contributor: fullname: Tiella – volume: 50 start-page: 120 issue: 11 year: 2007 ident: 10.1016/j.jss.2011.03.032_bib0040 article-title: Risks of e-voting publication-title: Communication of ACM doi: 10.1145/1297797.1297827 contributor: fullname: Bishop – start-page: 62 year: 2007 ident: 10.1016/j.jss.2011.03.032_bib0225 article-title: Compliance of POLYAS with the BSI Protection Profile—Basic Requirements for Remote Electronic Voting Systems contributor: fullname: Reinhard – ident: 10.1016/j.jss.2011.03.032_bib0095 – ident: 10.1016/j.jss.2011.03.032_bib0210 – ident: 10.1016/j.jss.2011.03.032_bib0120 – ident: 10.1016/j.jss.2011.03.032_bib0145 doi: 10.1109/TSE.2007.70772 – ident: 10.1016/j.jss.2011.03.032_bib0135 doi: 10.1007/978-3-642-13556-9_6 – volume: 6 start-page: 213 issue: 2 year: 2009 ident: 10.1016/j.jss.2011.03.032_bib0055 article-title: Evaluating procedural alternatives: a case study in e-voting publication-title: EG doi: 10.1504/EG.2009.024443 contributor: fullname: Bryl – volume: 6 start-page: 30 issue: 3 year: 2008 ident: 10.1016/j.jss.2011.03.032_bib0015 article-title: Evaluating electronic voting systems equipped with voter-verified paper records publication-title: IEEE Security and Privacy doi: 10.1109/MSP.2008.62 contributor: fullname: Ansari – start-page: 237 year: 2008 ident: 10.1016/j.jss.2011.03.032_bib0035 article-title: Are your votes really counted? Testing the security of real-world electronic voting systems contributor: fullname: Balzarotti – volume: 3 start-page: 561 year: 1997 ident: 10.1016/j.jss.2011.03.032_bib0110 article-title: Sensus: a security-conscious electronic polling system for the Internet publication-title: Hawaii International Conference on System Sciences doi: 10.1109/HICSS.1997.661700 contributor: fullname: Cranor – start-page: 84 year: 2006 ident: 10.1016/j.jss.2011.03.032_bib0260 article-title: Specification of the Control Logic of an eVoting System in UML: the ProVotE experience publication-title: Csduml contributor: fullname: Tiella – ident: 10.1016/j.jss.2011.03.032_bib0220 – ident: 10.1016/j.jss.2011.03.032_bib0125 – volume: 13 start-page: 45 issue: 5 year: 1998 ident: 10.1016/j.jss.2011.03.032_bib0195 article-title: Analytic Verification of Flight Software publication-title: IEEE Intelligent Systems doi: 10.1109/5254.722359 contributor: fullname: Lowry – volume: 2 start-page: 12 issue: 4 year: 1996 ident: 10.1016/j.jss.2011.03.032_bib0105 article-title: Electronic voting: computerized polls may save money protect privacy publication-title: Crossroads doi: 10.1145/332159.332163 contributor: fullname: Cranor – start-page: 135 year: 2010 ident: 10.1016/j.jss.2011.03.032_bib0235 article-title: An Evaluation and Certification Approach to Enable Voting Service Providers contributor: fullname: Schmidt – start-page: 329 year: 2007 ident: 10.1016/j.jss.2011.03.032_bib0070 article-title: Formal verification of tamper-evident storage for E-voting contributor: fullname: Cansell – volume: 183 start-page: 39 year: 2007 ident: 10.1016/j.jss.2011.03.032_bib0075 article-title: Refinement: a constructive approach to formal software design for a secure e-voting interface publication-title: Electronic Notes in Theoretical Computer Science doi: 10.1016/j.entcs.2007.01.060 contributor: fullname: Cansell – ident: 10.1016/j.jss.2011.03.032_bib0180 – ident: 10.1016/j.jss.2011.03.032_bib0060 – start-page: 1 year: 2010 ident: 10.1016/j.jss.2011.03.032_bib0300 article-title: Security analysis of India’s electronic voting machines contributor: fullname: Wolchok – ident: 10.1016/j.jss.2011.03.032_bib0100 – ident: 10.1016/j.jss.2011.03.032_bib0230 |
SSID | ssj0007202 |
Score | 2.0846148 |
Snippet | We have seen that several currently deployed e-voting systems share critical failures in their design and implementation that render their technical and... This paper had seen that several currently deployed e-voting systems share critical failures in their design and implementation that render their technical and... |
SourceID | proquest crossref elsevier |
SourceType | Aggregation Database Publisher |
StartPage | 1618 |
SubjectTerms | Critical requirements E-voting Electronic voting systems ES&S system Formal specification and verification Online voting Program verification (computers) Programming languages Proving Security Security management Specifications Strategy Studies Systems development Voting Voting machines |
Title | Formal analysis of an electronic voting system: An experience report |
URI | https://dx.doi.org/10.1016/j.jss.2011.03.032 https://www.proquest.com/docview/880384611 https://search.proquest.com/docview/914634974 |
Volume | 84 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3PS8MwFH7M7eLF3-Kcjhw8CXXLj6attzEdU9GLCruFpEtgIttwm0f_dl_adKKgByGH0jS0fGm-fOW9fg_gLNFcS0NFpHMjIyHjLNJj7SKTOZ52jeW0KDZx_yCHz-J2FI9q0K_-hfFplYH7S04v2Dqc6QQ0O_PJpPPozaEo8xZlxcYnN6BRBInq0Ojd3A0f1oScsCL10F8f-QFVcLNI83pZLIKRJ8fGftuefhB1sfsMdmAryEbSK59sF2p2ugfbVUkGElboPlwNvAZ9JTp4jZCZw2PyVeyGvM98ojMpHZwvSQ87127HpIwgHMDz4PqpP4xCoYQo57FcesLSDGF1GTdUJi7uSuPScewskyhLxVhypynNtdMsF4mVzGTS5jJ1cWYzxOwQ6tPZ1B4BSRKcVCGdROUtONcG5V6WJkLnWliauiacV_ioeemHoapEsReFYCoPpupybKwJokJQfZtUhXz917BWhbYKK2qhkGc4aiVKm0DWvbgUfHxDT-1stVAZsj4X-IF0_L_7tmCTVRl-9ATqy7eVPUXJsTRt2Lj4oO3wYn0CZmLVAg |
link.rule.ids | 315,783,787,4511,24130,27938,27939,45599,45693 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3JTsMwEB2xHODCjiirD5yQotZLnJhbBVRlaS-0Um-WndoSCLWIFr6fceIUgQQHpByiOFaiZ_vNizx5A3CeGW6kpSIxhZWJkKlKzNj4xCrP85Z1nJbFJnp92R2Ku1E6WoKr-l-YkFYZub_i9JKt45VmRLP5-vTUfAzmUJQFi7Iy8MllWEU1oHCyr7Zv77v9BSFnrEw9DPcnoUO9uVmmeT3PZtHIk-PBfgtPP4i6jD6dLdiIspG0qzfbhiU32YHNuiQDiSt0F647QYO-EBO9RsjU4zn5KnZDPqYh0ZlUDs6XpI2NC7djUu0g7MGwczO46iaxUEJS8FTOA2EZhrB6xS2VmU9b0vp8nHrHJMpSMZbcG0oL4w0rROYks0q6QuY-VU5hGNuHlcl04g6AZBkOqpBeovIWnBuLck_lmTCFEY7mvgEXNT76tfLD0HWi2LNGMHUAU7c4HqwBokZQfxtUjXz9V7ejGm0dV9RMI89w1EqUNoAsWnEphP0NM3HT95lWyPpc4AfS4f-eewZr3UHvQT_c9u-PYJ3V2X70GFbmb-_uBOXH3J7G6fUJpwfW_w |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Formal+analysis+of+an+electronic+voting+system%3A+An+experience+report&rft.jtitle=The+Journal+of+systems+and+software&rft.au=Weldemariam%2C+Komminist&rft.au=Kemmerer%2C+Richard+A.&rft.au=Villafiorita%2C+Adolfo&rft.date=2011-10-01&rft.issn=0164-1212&rft.volume=84&rft.issue=10&rft.spage=1618&rft.epage=1637&rft_id=info:doi/10.1016%2Fj.jss.2011.03.032&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_jss_2011_03_032 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0164-1212&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0164-1212&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0164-1212&client=summon |