How not to do security

Mitch Bradley wmb at firmworks.com
Sat Sep 16 18:16:40 EDT 2006


Analysis of plausible attack vectors on some voting machines.  The 
machine studied is pathetically easy to compromise.

http://itpolicy.princeton.edu/voting/ts-paper.pdf





More information about the Devel mailing list