|
WORKSHOP SESSIONS
Just Up! Videos of the presentations will be posted as soon as they become available. Access is currently restricted to USENIX members and EVT/WOTE '10 workshop attendees. Not a member? Join today!
All sessions will take place in Wilson AB unless otherwise noted.
Session papers with links below are available to workshop registrants immediately and to everyone beginning August 9, 2010.
|
Monday, August 9, 2010
|
|
9:00 a.m.–10:00 a.m.
|
Opening Remarks
Program Co-Chairs: Doug Jones, University of Iowa; Jean-Jacques Quisquater, Université catholique de Louvain; Eric Rescorla, RTFM, Inc.
Keynote Address
Speaker: Donetta Davidson, United States Election Assistance Commission
Listen in MP3 format
|
10:00 a.m.–10:20 a.m. Break
|
|
10:20 a.m.–11:10 a.m. |
Efficient User-Guided Ballot Image Verification
Arel Cordero, Theron Ji, and Alan Tsai, University of California, Berkeley; Keaton Mowery, University of California, San Diego; David Wagner, University of California, Berkeley
Read the Abstract | Full paper
View the video
OpenScan: A Fully Transparent Optical Scan Voting System
Kai Wang, University of California, San Diego; Eric Rescorla, Skype; Hovav Shacham and Serge Belongie, University of California, San Diego
Read the Abstract | Full paper
View the video
|
11:10 a.m.–11:30 a.m. Break
|
|
11:30 a.m.–12:20 p.m. |
On the Use of Financial Data as a Random Beacon
Jeremy Clark and Urs Hengartner, University of Waterloo
Read the Abstract | Full paper
View the video
Queuing and Elections: Long Lines, DREs and Paper Ballots
William A. Edelstein, Johns Hopkins University School of Medicine; Arthur D. Edelstein, University of California, San Francisco
Read the Abstract | Full paper
View the video
|
12:20 p.m.–1:50 p.m. Workshop Luncheon, Thurgood Marshall South West |
|
1:50 p.m.–3:05 p.m. |
Determining the Causes of AccuVote Optical Scan Voting Terminal Memory Card Failures
Tigran Antonyan, Nicolas Nicolaou, Alexander A. Shvartsman, and Therese Smith, University of Connecticut
Read the Abstract | Full paper
View the video
Modeling and Analyzing Faults to Improve Election Process Robustness
Borislava I. Simidchieva, University of Massachusetts Amherst; Sophie J. Engle and Michael Clifford, University of California, Davis; Alicia Clay Jones, Booz Allen; Sean Peisert, University of California, Davis, and Lawrence Berkeley National Laboratory; Matt Bishop, University of California, Davis; Lori A. Clarke and Leon J. Osterweil, University of Massachusetts Amherst
Read the Abstract | Full paper
View the video
Exploiting the Client Vulnerabilities in Internet E-voting Systems: Hacking Helios 2.0 as an Example
Saghar Estehghari, University College London; Yvo Desmedt, University College London and Research Center for Information Security, Tokyo
Read the Abstract | Full paper
|
3:05 p.m.–3:20 p.m. Break
|
|
3:20 p.m.–5:10 p.m. |
Panel on Indian Electronic Voting Machines (EVMs)
Moderator: Joseph Lorenzo Hall, University of California, Berkeley and Princeton University
Panelists: P.V. Indiresan, Former Director, IIT-Madras; G.V.L Narasimha Rao, Citizens for Verifiability, Transparency, and Accountability in Elections, VeTA; Alok Shukla, Election Commission of India; J. Alex Halderman, University of Michigan
View the video
India is one of a number of nations that deploy a uniform computerized voting system in their national elections. As the second most populous nation, the challenges of running a national election across such a
diverse electorate and geography is challenging. The Indian EVM voting system is considerably more simple than voting systems in the US; it has no interactive interface, no accessibility support, and is intended to operate in elections with only one (or very few) contests on the ballot. Recently, charges of irregularities perpetrated by technically-savvy attackers have surfaced. A group of academics and advocates published a security analysis of the Indian EVM this spring that highlights a number of serious vulnerabilities and describes a few practical exploits. The Electoral Commission of India has responded that these attacks are theoretical in nature and that reports of irregularities have not been substantiated to a degree that implicates deficiencies in the technology itself. This panel will present two researchers from the effort this spring, a representative from the Electoral Commission of India and an academic advisor to the Electoral Commission of India. Panelists will speak about the current state of Indian voting technology, the critiques made of the EVM, and what the future holds for voting technology in India.
|
4:25 p.m.–5:00 p.m. Break
|
|
5:30 p.m.–7:30 p.m.
|
Rump Session
See the complete list of accepted presentations along with videos here.
|
|
|
Tuesday, August 10, 2010
|
9:00 a.m.–10:30 a.m.
|
Invited Talk
Outsmarted Regulators: Gambling Devices in Nevada
Jeff Burbank, Fulbright grantee in journalism and author of four books, including License to Steal: Nevada's Gaming Control System in the Megaresort Age
Listen in MP3 format
Jeff Burbank will offer case studies on how Nevada's gaming control system struggled with advanced technology developed by slot machine companies and was left vulnerable to corruption from within.
|
10:30 a.m.–10:50 a.m. Break
|
|
10:50 a.m.–12:05 p.m. |
Computational Complexity and Information Asymmetry in Election Audits with Low-Entropy Randomness
Nadia Heninger, Princeton University
Read the Abstract | Full paper
View the video
Super-Simple Simultaneous Single-Ballot Risk-Limiting Audits
Philip B. Stark, University of California, Berkeley
Read the Abstract | Full paper
View the video
Single-Ballot Risk-Limiting Audits Using Convex Optimization
Stephen Checkoway, Anand Sarwate, and Hovav Shacham, University of California, San Diego
Read the Abstract | Full paper
View the video
|
12:05 p.m.–1:30 p.m. Workshop Luncheon, Thurgood Marshall South West
|
|
1:30 p.m.–2:45 p.m. |
Performance Requirements for End-to-End Verifiable Elections
Stefan Popoveniuc, KT Consulting; John Kelsey and Andrew Regenscheid, National Institute of Standards and Technology; Poorvi Vora, National Institute of Standards and Technology and the George Washington University
Read the Abstract | Full paper
View the video
Parallel Shuffling and Its Application to Prêt à Voter
Kim Ramchen; Vanessa Teague, University of Melbourne
Read the Abstract | Full paper
View the video
Eperio: Mitigating Technical Complexity in Cryptographic Election Verification
Aleksander Essex, Jeremy Clark, and Urs Hengartner, University of Waterloo; Carlisle Adams, University of Ottawa
Read the Abstract | Full paper
View the video
|
2:45 p.m.–3:05 p.m. Break
|
|
3:05 p.m.–3:55 p.m. |
Towards Publishable Event Logs That Reveal Touchscreen Faults
Andrea L. Mascher, Paul T. Cotton, and Douglas W. Jones, The University of Iowa
Read the Abstract | Full paper
View the video
Baseline Usability Data for a Non-Electronic Approach to Accessible Voting
Gillian E. Piner and Michael D. Byrne, Rice University
Read the Abstract | Full paper
View the video
|
3:55 p.m.–4:15 p.m. Short Break
|
|
4:15 p.m.–5:15 p.m.
|
Closing Remarks
|
|