Internet Voting- What Could Go Wrong? - USENIX Enigma Conference - 2016
USENIX Enigma Conference via YouTube
Overview
This course explores the challenges and vulnerabilities associated with Internet voting systems. By analyzing case studies and security evaluations, students will learn about the risks of Internet voting, including potential vote manipulation, privacy breaches, and result uncertainties. The course covers topics such as electronic voting, reviewing source code, attacks on voting systems, defeating verification processes, and the future of Internet voting. The intended audience for this course includes individuals interested in cybersecurity, election technology, and the intersection of technology and democracy.
Syllabus
Intro
Electronic Voting
Internet Voting
DC Internet Voting
Reviewing the Source Code
The Problem
The Attack
Second Case Study
Vanessa Teague
The Day of the Election
How to Defeat Verification
The Future
Taught by
USENIX Enigma Conference