WORKSHOP SESSIONS
Session papers are available to workshop registrants immediately and to everyone starting August 10, 2007.
All sessions will take place in the Back Bay Ballroom A of the Sheraton Boston Hotel unless otherwise noted.
Sunday, August 5, 2007
|
5:00 p.m.7:00 p.m. On-site Registration, Constitution Foyer |
|
5:30 p.m.7:00 p.m. |
|
USENIX Security '07 Welcome Get-Together
Constitution Foyer
|
Monday, August 6, 2007
|
7:30 a.m.5:00 p.m. On-site Registration, Constitution Foyer |
|
8:30 a.m.10:00 a.m. |
|
Analysis
Studying the Nedap/Groenendaal ES3B Voting Computer: A Computer Security Perspective
Rop Gonggrijp and Willem-Jan Hengeveld, Stichting "Wij vertrouwen stemcomputers niet"
Read the paper in PDF
Security Analysis of the Diebold AccuVote-TS Voting Machine
Ariel J. Feldman, J. Alex Halderman, and Edward W. Felten, Princeton University
Read the paper in PDF | HTML
An Analysis of the Hart Intercivic DAU eSlate
Elliot Proebstel, Sean Riddle, Francis Hsu, and Justin Cummins, University of California, Davis; Freddie Oakley and Tom Stanionis, Yolo County Elections Office;
Matt Bishop, University of California, Davis
Read the paper in PDF | HTML
|
|
10:00 a.m.10:30 a.m. Break |
|
10:30 a.m.11:45 a.m. |
|
Design I
Casting Votes in the Auditorium
Daniel Sandler and Dan S. Wallach, Rice University
Read the paper in PDF | HTML
Extending Prerendered-Interface Voting Software to Support
Accessibility and Other Ballot Features
Ka-Ping Yee, University of California, Berkeley
Read the paper in PDF | HTML
Verification-Centric Realization of Electronic Vote Counting
Joseph R. Kiniry, Dermot Cochran, and Patrick E. Tierney, University College
Dublin
Read the paper in PDF | HTML
|
|
11:45 a.m.1:15 p.m. Workshop Luncheon, Back Bay Ballroom B |
|
1:15 p.m.2:45 p.m. |
|
Auditing and Transparency
Contractual Barriers to Transparency in Electronic Voting
Joseph Lorenzo Hall, University of California, Berkeley
Read the paper in PDF | HTML
On Estimating the Size and Confidence of a Statistical Audit
Javed A. Aslam, Northeastern University; Raluca A. Popa and
Ronald L. Rivest, Massachusetts Institute of Technology
Read the paper in PDF | HTML
Machine-Assisted Election Auditing
Joseph A. Calandrino, J. Alex Halderman, and Edward W. Felten,
Princeton University
Read the paper in PDF | HTML
An Examination of the Auditability of Voter Verified Paper Audit
Trail (VVPAT) Ballots
Stephen N. Goggin and Michael D. Byrne, Rice University
Read the paper in PDF | HTML
|
|
2:45 p.m.3:30 p.m. Break |
|
3:30 p.m.4:30 p.m. |
|
Analysis II
On the Difficulty of Validating Voting Machine Software with Software
Ryan Gardner, Sujata Garera, and Aviel D. Rubin, Johns Hopkins University
Read the paper in PDF | HTML
GEMS Tabulation Database Design Issues in Relation to Voting Systems
Certification Standards
Thomas P. Ryan and Candice Hoke, Cleveland State University
Read the paper in PDF | HTML
An Authentication and Ballot Layout Attack Against an Optical Scan
Voting Terminal
Aggelos Kiayias, Laurent Michel, Alexander Russell,
Narasimha Sashidar, Andrew See, and Alexander A. Shvartsman, University
of Connecticut
Read the paper in PDF | HTML
|
|
4:30 p.m.5:15 p.m. Break |
|
5:15 p.m.6:45 p.m. |
|
Design II
Ballot Casting Assurance via Voter-Initiated Poll Station Auditing
Josh Benaloh, Microsoft Research
Read the paper in PDF
Bare-Handed Electronic Voting with Pre-processing
Ben Riva and Amnon Ta-Shma, Tel-Aviv University
Read the paper in PDF | HTML
Three Voting Protocols: ThreeBallot, VAV, and Twin
Ronald L. Rivest, Massachusetts Institute of Technology; Warren D. Smith, Center for Range Voting
Read the paper in PDF | HTML
|
|