handouts/ho02.tex
changeset 415 56bc53ba7c5b
parent 404 4e3bc09748f7
child 443 67d7d239c617
equal deleted inserted replaced
414:9a3aa8c39951 415:56bc53ba7c5b
     2 \usepackage{../style}
     2 \usepackage{../style}
     3 \usepackage{../langs}
     3 \usepackage{../langs}
     4 
     4 
     5 \begin{document}
     5 \begin{document}
     6 \fnote{\copyright{} Christian Urban, 2014, 2015}
     6 \fnote{\copyright{} Christian Urban, 2014, 2015}
       
     7 
       
     8 %https://www.usenix.org/sites/default/files/conference/protected-files/jets15_slides_epstein.pdf
       
     9 %
       
    10 %Jeremy Epstein, SRI International
       
    11 %
       
    12 %In April 2015, the  US  Commonwealth of Virginia decertified the Advanced Voting
       
    13 %Solutions (AVS) WinVote voting machine, after concluding that it was insecure.
       
    14 %This talk presents the results of Virginia's analysis of the WinVote, and
       
    15 %explores how we got to the point where a voting machine using an unpatched
       
    16 %version of Windows XP from 2004, using hardwired  WEP  keys and administrator
       
    17 %passwords, could be used for over a decade in most of Virginia.
       
    18 
       
    19 
     7 
    20 
     8 \section*{Handout 2 (E-Voting)}
    21 \section*{Handout 2 (E-Voting)}
     9 
    22 
    10 In security engineering, there are many counter-intuitive
    23 In security engineering, there are many counter-intuitive
    11 phenomena: for example I am happy (more or less) to use online
    24 phenomena: for example I am happy (more or less) to use online