Analysis of plausible attack vectors on some voting machines. The machine studied is pathetically easy to compromise. http://itpolicy.princeton.edu/voting/ts-paper.pdf