back icon
close icon

Capture phrases in quotes for more specific queries (e.g. "rocket ship" or "Fred Lynn")

Article  May 1, 2015

Weakness in Depth: A Voting Machine’s Demise

Citation

COPY

Epstein, J. (2015). Weakness in depth: a voting machine's demise. IEEE Security & Privacy, 13(3), 55-58. 

Abstract

Every voting system examined over the past decade has had severe security vulnerabilities. Virginia's government recently examined the AVS WinVote and learned that the vulnerabilities are more serious than any other voting system, allowing complete exploitation over a Wi-Fi network. The combination of vulnerabilities exhibits "weakness in depth," rather than the "defense in depth" frequently suggested as a model. The lessons learned are applicable to other emerging technologies, including the Internet of Things.

How can we help?

Once you hit send…

We’ll match your inquiry to the person who can best help you. Expect a response within 48 hours.

Our Privacy Policy