20 research outputs found

    Sophisticated Attacks on Decoy Ballots: The Devil's Menu and the Market for Lemons

    Full text link
    Decoy ballots do not count in election outcomes, but otherwise they are indistinguishable from real ballots. By means of a game-theoretical model, we show that decoy ballots may not provide effective protection against a malevolent adversary trying to buy real ballots. If the citizenry is divided into subgroups (or districts), the adversary can construct a so-called "Devil's Menu" consisting of several prices. In equilibrium, the adversary can buy the real ballots of any strict subset of districts at a price corresponding to the willingness to sell on the part of the citizens holding such ballots. By contrast, decoy voters are trapped into selling their ballots at a low, or even negligible, price. Blowing up the adversary's budget by introducing decoy ballots may thus turn out to be futile. The Devil's Menu can also be applied to the well-known "Lemons Problem"

    Security Hazards when Law is Code.

    Full text link
    As software continues to eat the world, there is an increasing pressure to automate every aspect of society, from self-driving cars, to algorithmic trading on the stock market. As this pressure manifests into software implementations of everything, there are security concerns to be addressed across many areas. But are there some domains and fields that are distinctly susceptible to attacks, making them difficult to secure? My dissertation argues that one domain in particular—public policy and law— is inherently difficult to automate securely using computers. This is in large part because law and policy are written in a manner that expects them to be flexibly interpreted to be fair or just. Traditionally, this interpreting is done by judges and regulators who are capable of understanding the intent of the laws they are enforcing. However, when these laws are instead written in code, and interpreted by a machine, this capability to understand goes away. Because they blindly fol- low written rules, computers can be tricked to perform actions counter to their intended behavior. This dissertation covers three case studies of law and policy being implemented in code and security vulnerabilities that they introduce in practice. The first study analyzes the security of a previously deployed Internet voting system, showing how attackers could change the outcome of elections carried out online. The second study looks at airport security, investigating how full-body scanners can be defeated in practice, allowing attackers to conceal contraband such as weapons or high explosives past airport checkpoints. Finally, this dissertation also studies how an Internet censorship system such as China’s Great Firewall can be circumvented by techniques that exploit the methods employed by the censors themselves. To address these concerns of securing software implementations of law, a hybrid human-computer approach can be used. In addition, systems should be designed to allow for attacks or mistakes to be retroactively undone or inspected by human auditors. By combining the strengths of computers (speed and cost) and humans (ability to interpret and understand), systems can be made more secure and more efficient than a method employing either alone.PhDComputer Science and EngineeringUniversity of Michigan, Horace H. Rackham School of Graduate Studieshttp://deepblue.lib.umich.edu/bitstream/2027.42/120795/1/ewust_1.pd

    Nullification, a coercion-resistance add-on for e-voting protocols

    Get PDF
    Coercion is one of the remaining issues on internet voting. Many developing countries are prone to this problem due to lower income rate. In this study, a novel coercion-resistant protocol has been proposed that can be integrated with previously proposed e-voting systems. We call it nullification. We present it as a part of the VoteXX e-voting protocol that has been designed and implemented through this study. Nullification gives the voter a strategic advantage over the coercer. The voter can share her keys with a trusted proxy, called a nullifier, for later flipping that vote. Integrity and ballot secrecy are provided simultaneously through the use of zero-knowledge proofs, specifically ÎŁ-protocols. We show how our approach is different from (and potentially composable with) re-voting or panic password techniques that have been previously proposed in the academic literature. Through designing this protocol, we solve several issues, design new ÎŁ-protocols and protocols for the secure evaluation of basic logic functions like exclusive-or (xor) under encryption: True XOR and Online XOR have been proposed that improves the previously proposed Mix and Match protocol for secure multi-party computation of an arbitrary function under constrained input domain

    Penticton Herald

    Get PDF

    Portland Daily Press: December 29,1879

    Get PDF
    https://digitalmaine.com/pdp_1879/1119/thumbnail.jp

    Winona Daily News

    Get PDF
    https://openriver.winona.edu/winonadailynews/1314/thumbnail.jp

    The Review Wed, October 15, 1986

    Get PDF
    corecore