Publications
Any opinions, findings, and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation.
2012
Barbara Simons and Douglas Jones, Broken Ballots, CSLI Publications, April 15, 2012.
Joseph Lorenzo Hall, Emily Barabas, Gregory Shapiro, Coye Cheshire and Deirdre K. Mulligan, Probing the Front Lines: Pollworker Perceptions of Security & Privacy in 2012 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE’12) (2012). available at: josephhall.org/papers/jhall-evtwote12.pdf
2011
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anhei Shu, and Dan S. Wallach, Quire: Lightweight Provenance for Smartphone Operating Systems, 21st USENIX Security Symposium (San Francisco, CA), August 2011.
Josh Benaloh, Douglas Jones, Eric L. Lazarus, Philip B. Stark, SOBA: Secrecy-Preserving Observable Ballot-level Audit, the Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ’11), August 8-9, 2011, San Francisco, CA.
Arel Cordero, David Wagner, Theron Ji, Alan Tsai, Eric Kim, and Raji Srikantan, An Analysis of Write-in Marks on Optical Scan Ballots, the Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ’11), August 8-9, 2011, San Francisco, CA.
Gillian E. Piner and Michael D. Byrne, Accessible Polling Places for the Visually Impaired: A Compilation of Survey Results, the Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ’11), August 8-9, 2011, San Francisco, CA.
Thomas R. Magrino, Ronald L. Rivest, Emily Shen, David Wagner, Computing the Margin of Victory in IRV Elections, the Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ’11), August 8-9, 2011, San Francisco, CA.
David L. Dill, Eric L. Lazarus, Jeremy Epstein, Joseph Lorenzo Hall, Applying a Reusable ElectionThreat Model at the County Level, the Proceedings of the 2011 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ’11), August 8-9, 2011, San Francisco, CA.
Jeremy Epstein, “Internet Voting, Security, and Privacy”, William & Mary Bill of Rights Journal, Volume 19 (2011).
Scott A. Crosby and Dan S. Wallach, High Throughput Asynchronous Algorithms for Message Authentication, currently in journal submission.
Scott A. Crosby and Dan S. Wallach, Autenticated Dictionaries: Real-World Costs and Tradeoffs, currently in journal submission.
2010
Peter G. Neumann, Combatting Insider Threats, Chapter 2 in Insider Threats in Cybersecurity — and Beyond, C.W. Probst, J. Hunker, D. Gollman, and M. Bishop, Springer Verlag, 2010. (This chapter relates insider threats to election integrity, and is based on a position paper for the 2008 Dagstuhl Insider Threats workshop.)
Douglas W. Jones, Kazakhstan: The Sailau E-Voting System, in Direct Democracy: Progress and Pitfalls of Election Technology, Michael Yard, ed., IFES, 2010; pages 57-70.
Arel Cordero, Theron Ji, Alan Tsai, Keaton Mowery, and David Wagner, Efficient User-Guided Ballot Image Verification, Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ’10), August 10, 2010, Washington DC.
Andrea L. Mascher, Paul T. Cottton, Douglas W. Jones, Towards Publishable Event Logs That Reveal Touchscreen Faults, Proceedings of the 2010 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ’10), August 10, 2010, Washington DC.
Douglas W. Jones, On Optical Mark Sense Scanning, in Towards Trustworthy Elections, David Chaum, Markus Jakobsson, Ronald Rivest, et al, Springer Lecture Notes in Computer Science, Vol. 6000, 2010; pages 175-190.
2009
Scott A. Crosby, Rudolf H. Riedi, and Dan S. Wallach, Opportunities and Limits of Remote Timing Attacks, ACM Transactions on Information and Systems Security (TISSEC), vol. 12, no. 3, January 2009.
Jeremy Epstein, Internet Voting: Will We Cast Our Next Votes Online?, ACM Computing Surveys, December 2009.
Erika Chin and David Wagner, Efficient Character-level Taint Tracking for Java, Workshop on Secure Web Services (SWS ’09), November 2009.
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia and David Wagner, On Voting Machine Design for Verification and Testability. 16th ACM Conference on Computer and Communication Security (CCS 2009), November 2009.
Jeremy Epstein, End to End Cryptographic Internet Voting Considered Harmful, NIST End-to-End Voting Workshop, Washington DC, October 2009.
Campbell, B. A., & Byrne, M. D. (2009). Straight party voting: What do voters think? IEEE Transactions on Information Forensics and Security, 4, 718-728.
Scott Crosby and Dan S. Wallach, Super-efficient Aggregating History-independent Persistent Authenticated Dictionaries, 14th European Symposium on Research in Computer Security (Saint Malo, France), September 2009.
Andrea L. Mascher, Paul T. Cotton and Douglas W. Jones, Improving Voting System Event Logs, RE-Vote’09: First International Workshop on Requirements Engineering for E-voting Systems (Atlanta), August, 2009.
Douglas W. Jones Early Requirements for Mechanical Voting Systems, RE-Vote’09: First International Workshop on Requirements Engineering for E-voting Systems (Atlanta), August, 2009.
Scott Crosby and Dan S. Wallach. Efficient Data Structures for Tamper Evident Logging. 18th USENIX Security Symposium (Montreal, Canada), August 2009.
Ersin Öksüzoğlu and Dan S. Wallach, VoteBox Nano: A Smaller, Stronger FPGA-based Voting Machine, Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ’09) (Montreal, Canada), August 2009.
B.A. Campbell and M.D. Byrne. Now do voters notice review screen anomalies? A look at voting system usability. In Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ’09).
Joseph Lorenzo Hall, Luke W. Miratrix, Philip B. Stark, Melvin Briones, Elaine Ginnold, Freddie Oakley, Martin Peaden, Gail Pellerin, Tom Stanionis and Tricia Webber. Implementing Risk-Limiting Audits in California, Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ’09), August 2009.
Cynthia Sturton, Eric Rescorla, and David Wagner. Weight, Weight, Don’t Tell Me: Using Scales to Select Ballots for Auditing. Proceedings of the 2009 Electronic Voting Technology Workshop / Workshop on Trustworthy Elections (EVT/WOTE ’09), August 2009.
Peter G. Neumann. U.S. Election After-Math, Communications of the ACM, February 2009.
2008
Goggin, S. N., Byrne, M. D., Gilbert, J. E., Rogers, G., & McClendon, J. (2008). Comparing the auditability of optical scan, voter verified paper audit trail (VVPAT) and video (VVVAT) ballot systems. In Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Technology Workshop.
Dan S. Wallach. Voting System Risk Assessment via Computational Complexity Analysis. William & Mary Bill of Rights Journal, Volume 17 (December 2008).
Eric Whitman Smith and David L. Dill. Automatic Formal Verification of Block Cipher Implementationsin Proceedings of the 2008 International Conference on Formal Methods in Computer-Aided Design, November 2008
David L. Dill and Daniel Castro. Point/counterpoint: The U.S. should ban paperless electronic voting machines, Communications of the ACM, Vol 51, No 10, October, 2008.
Matthew Finifter, Adrian Mettler, Naveen Sastry, and David Wagner. Verifiable Functional Purity in Java. 15th ACM Conference on Computer and Communication Security (CCS 2008), October 2008.
Joseph Lorenzo Hall, Improving the Security, Transparency and Efficiency of California’s 1% Manual Tally Procedures in Proceedings of the 2008 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT’08) (2008).
Arel Cordero and David Wagner. Replayable Voting Machine Audit Logs. In Proceedings of the 3rd USENIX/ACCURATE Electronic Voting Workshop (EVT ’08), July 2008.
J. Alex Halderman, Eric Rescorla, Hovav Shacham, and David Wagner. You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems. In Proceedings of the 3rd USENIX/ACCURATE Electronic Voting Workshop (EVT ’08), July 2008.
Daniel R. Sandler, Kyle Derr, and Dan S. Wallach. VoteBox: a tamper-evident, verifiable electronic voting system. In Proceedings of the 17th USENIX Security Symposium (USENIX Security ’08), July 2008.
Daniel R. Sandler and Dan S. Wallach. The case for networked remote voting precincts. In Proceedings of the 3rd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT ’08), July 2008.
Daniel R. Sandler, Kyle Derr, Scott Crosby, and Dan S. Wallach. Finding the evidence in tamper-evident logs.
In Proceedings of the 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE ’08), May 2008.
Robert M. Stein, Greg Vonnahme, Michael Byrne, and Dan S. Wallach, Voting Technology, Election Administration, and Voter Performance, Election Law Journal, vol. 7, no. 2, April 2008.
Everett, S. P., Greene, K. K., Byrne, M. D., Wallach, D. S., Derr, K., Sandler, D., & Torous, T. (2008). Electronic voting machines versus traditional methods: Improved preference, similar performance. In Human Factors in Computing Systems: Proceedings of CHI 2008. New York: ACM.
Dan Boneh and Xavier Boyen, Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. J. Cryptology 21(2): 149-177 (2008)
2007
Lawrence Norden, Aaron Burstein, Joseph Lorenzo Hall and Margaret Chen, Post-Election Audits: Restoring Trust In Elections, Brennan Center for Justice at New York University School of Law and the Samuelson Law, Technology & Public Policy Clinic at the University of California, Berkeley School of Law (Boalt Hall) (2007).
Sujata Garera and Aviel D. Rubin, An Independent Audit Framework for Software Dependent Voting Systems, 14th ACM Conference on Computer and Communications Security, November 2007.
Matt Bishop and David Wagner. Risks of E-voting. Communications of the ACM, Inside Risks column, volume 50, issue 11, p.120.
Ryan Gardner, Sujata Garera, and Aviel D. Rubin. On the Difficulty of Validating Voting Machine Software with Software. In Proceedings of the 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT’07), 2007.
Vijay Ganesh and David L. Dill. A Decision Procedure for Bit-Vectors and Arrays. In the Proceedings of Computer Aided Verification (CAV), Berlin, Germany, July 7-11, 2007.
Stephen N. Goggin and Michael D. Byrne. An Examination of the Auditability of Voter Verified Paper Audit Trail (VVPAT) Ballots. In Proceedings of the 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT’07), 2007.
Joseph L. Hall. Contractual Barriers to Transparency in Electronic Voting. In Proceedings of the 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT’07), 2007.
Daniel Sandler and Dan S. Wallach. Casting Votes in the Auditorium. In Proceedings of the 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT’07), 2007.
Ka-Ping Yee. Extending Prerendered-Interface Voting Software to Support Accessibility and Other Ballot Features. In Proceedings of the 2nd USENIX/ACCURATE Electronic Voting Technology Workshop (EVT’07), 2007.
Everett, S. P. (2007). The Usability of Electronic Voting Machines and How Votes Can Be Changed Without Detection. Doctoral disseration, Rice University, Houston, TX.
Byrne, M. D., Greene, K. K., & Everett, S. P. (2007). Usability of voting systems: Baseline data for paper, punch cards, and lever machines. Human Factors in Computing Systems: Proceedings of CHI 2007 (pp. 171-180). New York: ACM.
John Bethencourt, Dan Boneh, and Brent Waters, Cryptographic Methods for Storing Ballots on a Voting Machine. In Proceedings of the 14th Annual Network & Distributed System Security Conference (NDSS) (San Diego, CA), February 2007.
Peter G. Neumann, Reflections on Trustworthy Systems, chapter in Advances in Computers, volume 70, Academic Press imprint of Elsevier Science Publishers, 2007.
2006
Peter G. Neumann, Holistic Systems, ACM Software Engineering Notes, 13,6, November 2006, pp. 4–5.
Peter G. Neumann, System and Network Trustworthiness in Perspective, invited paper for keynote talk, Proceedings of the ACM Computer-Communication Security Conference, Alexandria VA, October-November 2006, pp. 1-5.
Peter G. Neumann, Risks of Untrustworthiness, invited Classic Papers Track, Proceedings of the IEEE 22nd Annual Computer Security Application Conference (ACSAC), Miami Beach, December 13-14, 2006. pp. 321–326.
Douglas W. Jones Technologists as Political Reformers: Lessons from the Early History of Voting Machines presented at the Society for the History of Technology annual conference, Las Vegas, October 13, 2006.
Crutchfield,C., Molnar,D., & Turner,D. (2006) Approximate Measurement of Voter Privacy Loss in an Election With Precinct Reports. Presented at NIST/NSF Voting Systems Rating Workshop.
Greene, K. K., Byrne, M. D., & Everett, S. P. (2006). A comparison of usability between voting methods. In Proceedings of the 2006 USENIX/ACCURATE Electronic Voting Technology Workshop.
Everett, S. P., Byrne, M. D., & Greene, K. K. (2006). Measuring the usability of paper ballots: Efficiency, effectiveness, and satisfaction. Proceedings of the Human Factors and Ergonomics Society 50th Annual Meeting, (pp. 2547-2551). Santa Monica, CA: Human Factors and Ergonomics Society.
Arel Cordero, David Wagner, David Dill. The Role of Dice in Election Audits – Extended Abstract. IAVoSS Workshop On Trustworthy Elections, 2006.
Joseph Lorenzo Hall, Transparency and Access to Source Code in E-Voting in Proceedings of USENIX/ACCURATE Electronic Voting Technology Workshop, 2006.
Ka-Ping Yee, David Wagner, Marti Hearst, and Steven Bellovin. Prerendered User Interfaces for Higher-Assurance Electronic Voting. In Proceedings of the USENIX/ACCURATE Electronic Voting Technology Workshop, 2006.
Douglas W. Jones, and Tom C. Bowersox. Secure Data Export and Auditing using Data Diodes. In Proceedings of the USENIX/ACCURATE Electronic Voting Technology Workshop, 2006.
Naveen Sastry, Tadayoshi Kohno, and David Wagner. Designing voting machines for verification. In Proc. 15th USENIX Security Symposium (August 4, 2006).
David Molnar, Tadayoshi Kohno, Naveen Sastry, and David Wagner. Tamper-Evident, History-Independent, Subliminal-Free Data Structures on PROM Storage -or- How to Store Ballots on a Voting Machine (Extended Abstract). In Proc. IEEE Symposium on Security and Privacy (May 21-24, 2006).
2005
Dan Boneh, Eu-Jin Goh, and K. Nissim, Evaluating 2-DNF Formulas on Ciphertexts and applications to voting. In Proceedings of Theory of Cryptography (TCC) ’05, LNCS 3378, pp. 325-341, 2005
Chris Karlof, Naveen Sastry, and David Wagner. Cryptographic Voting Protocols: A Systems Perspective. In Proc. 14th USENIX Security Symposium (August 2005).
Lillie Coney, Joseph L. Hall, Poorvi L. Vora, David Wagner. Towards a Privacy Measurement Criterion for Voting Systems, Poster Paper, National Conference on Digital Government Research (May 2005).
2004
Poorvi L. Vora, Benjamin Adida, Ren Bucholz, David Chaum, David L. Dill, David Jefferson, Douglas W. Jones, William Lattin, Aviel D. Rubin, Michael I. Shamos, and Moti Yung. Evaluation of Voting Systems. In Communications of the ACM, 47(11) (November 2004), p.144.
Douglas W. Jones. Misassessment of Security in Computer-Based Election Systems. In Cryptobytes, 7(2) (Fall 2004), pp.9-13.
Douglas W. Jones. Auditing Elections. In Communications of the ACM, 47(10) (October 2004), pp.46-50.
David Jefferson, Aviel D. Rubin, Barbara Simons, David Wagner. Analyzing Internet Voting Security. In Communications of the ACM, 47(10), Special issue: The problems and potentials of voting systems (October, 2004), pp.59-64.
Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S. Wallach. Analysis of an Electronic Voting System. In Proc. IEEE Symposium on Security and Privacy (May 2004).
Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach. Hack-a-Vote: Demonstrating Security Issues with Electronic Voting Systems. In IEEE Security & Privacy Magazine, 2(1) (January/February 2004), pp.32-37. Also reprinted by ComputerUser, March 2004.
2003
Nathanael Paul, David Evans, Aviel D. Rubin, and Dan S. Wallach. Authentication for Remote Voting. Workshop on Human-Computer Interaction and Security Systems (Fort Lauderdale, Florida), April 2003.
2002
Aviel D. Rubin. Security Considerations for Remote Electronic Voting. In Communications of the ACM (December, 2002).
Secure Electronic Voting. Dimitris Gritzalis, ed. Kluwer Academic Publishers, 2002 (240 pages, 28 contributors, 14 chapters). D. W. Jones contributed chapter 1 (13 pages).