equal
deleted
inserted
replaced
2 \usepackage{../style} |
2 \usepackage{../style} |
3 \usepackage{../langs} |
3 \usepackage{../langs} |
4 |
4 |
5 \begin{document} |
5 \begin{document} |
6 \fnote{\copyright{} Christian Urban, 2014, 2015} |
6 \fnote{\copyright{} Christian Urban, 2014, 2015} |
|
7 |
|
8 %https://www.usenix.org/sites/default/files/conference/protected-files/jets15_slides_epstein.pdf |
|
9 % |
|
10 %Jeremy Epstein, SRI International |
|
11 % |
|
12 %In April 2015, the US Commonwealth of Virginia decertified the Advanced Voting |
|
13 %Solutions (AVS) WinVote voting machine, after concluding that it was insecure. |
|
14 %This talk presents the results of Virginia's analysis of the WinVote, and |
|
15 %explores how we got to the point where a voting machine using an unpatched |
|
16 %version of Windows XP from 2004, using hardwired WEP keys and administrator |
|
17 %passwords, could be used for over a decade in most of Virginia. |
|
18 |
|
19 |
7 |
20 |
8 \section*{Handout 2 (E-Voting)} |
21 \section*{Handout 2 (E-Voting)} |
9 |
22 |
10 In security engineering, there are many counter-intuitive |
23 In security engineering, there are many counter-intuitive |
11 phenomena: for example I am happy (more or less) to use online |
24 phenomena: for example I am happy (more or less) to use online |