Sean Peisert

Home Page

Publications

Research Projects

Talks and Tutorials

Professional Service

Teaching

Students & Postdocs

Bio

Links

My Life


Photograph of me lecturing at the blackboard (credit: R. Benjamin Shapiro, 2002).


Upcoming events that I'm involved with:

CLHS (Abstracts due Apr. 4, 2013)

NSPW 2013 (Papers due Apr. 5, 2013)

CSET 2013 (Papers due Apr. 25, 2013)

S&P 2013 (May 20–22, 2013)

 
 

Research


Electronic Voting and E-Voting Forensics

There are two current thrusts to our work with elections and electronic voting.

The first project explores process composition tools as applied to elections, concentrating particularly on mail-in and Internet voting. This includes exploration of how to compose systems from pre-analyzed process components, how to analyze the vulnerability of these systems to attacks, and how to guarantee that important security properties are ensured for the resulting composed system. The underlying processes represent aspects of national and local elections, their composition produces an election process, and analysis of the composition gives insight into potential errors or attacks on the election. Providing an approach for formally reasoning about human participation extends current security work. The project also breaks new ground by exploring process-based approaches for modeling and defending against attacks. We work closely with the Marin County Registrar of Voters' office and the Yolo County Clerk-Recorder's office. We also collaborate closely on this project with Lee Osterweil, Lori Clarke, George Avrunin, and their graduate students in the LASER Lab at UMass Amherst.

The second project looks at auditing. Election auditing verifies that the systems and procedures work as intended, and that the votes have been counted correctly. If a problem arises, forensic techniques enable auditors to determine what happened and how to compensate if possible. Complicating this is that the audit trails enabling analysis of failures may contain information that either exposes the identity of the voter (enabling voter coercion, for example); or that communicates a message to a third party (enabling vote selling). The goal of this project is to determine the information needed to assess whether the election process in general, and e-voting machines in particular, operate with the desired degree of assurance, especially with respect to anonymity and privacy.

We work closely with the Marin County Registrar of Voters' office and the Yolo County Clerk-Recorder's office.

We also collaborate closely with Lee Osterweil, Lori Clarke, and their graduate students in the LASER Lab at UMass Amherst.

Researchers at or affiliated with UC Davis who are currently involved are:

Researchers previously involved:

Current sponsor: National Science Foundation CNS-1258577, CNS-1049738

Past sponsors: National Science Foundation CCF-0905503

More information on the UC Davis E-Voting page

Artifacts and full fault trees available at UMass Amherst's pages.

Publications resulting from this project:

"Security and Elections"
Matt Bishop and Sean Peisert
IEEE Security and Privacy Magazine,10(5), pp. 64–67,
Sept.-Oct. 2012. [BibTeX] [DOI]

"Turtles All the Way Down: A Clean-Slate, Ground-Up, First-Principles Approach to Secure Systems"
Sean Peisert, Ed Talbot, and Matt Bishop,
to appear in Proceedings of the 2012 New Security Paradigms Workshop (NSPW),
Bertinoro, Italy, September 19–21, 2012.

"A Systematic Process-Model-Based Approach for Synthesizing Attacks and Evaluating Them"
Huong Phan, George Avrunin, Matt Bishop, Lori Clarke, and Leon J. Osterweil
Proceedings of the 2012 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE),
Washinton, D.C., August 2012.

"Modeling Faults to Improve Election Process Robustness"
Borislava I. Simidchieva, Sophie J. Engle, Michael Clifford, Alicia Clay Jones, Sean Peisert, Matt Bishop, Lori A. Clarke, and Leon J. Osterweil,
Proceedings of the 2010 Electronic Voting Technology Workshop/ Workshop on Trustworthy Elections (EVT/WOTE),
Washinton, D.C., August 11–13, 2010.

"Quis Custodiet ipsos Custodes? A New Paradigm for Analyzing Security Paradigms"
Sean Peisert, Matt Bishop, Laura Corriss, and Steven J. Greenwald,
Proceedings of the 2009 New Security Paradigms Workshop (NSPW), pp. 133–144
The Queen's College, Oxford, United Kingdom, September 8–11, 2009.

"E-Voting and Forensics: Prying Open the Black Box"
Matt Bishop, Sean Peisert, Candice Hoke, Mark Graff, and David Jefferson,
Proceedings of the 2009 Electronic Voting Technology Workshop/Workshop on Trustworthy Elections (EVT/WOTE),
Montreal, Canada, August 10–11, 2009.

"Vote Selling, Voter Anonymity, and Forensic Logging of Electronic Voting Machines"
Sean Peisert, Matt Bishop, and Alec Yasinsac,
Proceedings of the 42nd Hawaii International Conference on System Sciences (HICSS), Decision Technologies and Service Sciences Track, Digital Forensics Pedagogy and Foundational Research Activity Minitrack (Nominated for Best Paper Award),
Waikoloa, HI, January 5–8, 2009.

"Resolving the Unexpected in Elections: Election Officials' Options"
Matt Bishop, Mark Graff, Candice Hoke, David Jefferson, and Sean Peisert
October 8, 2008.
Currently distributed by the Center For Election Excellence and the American Bar Association.
Public comments are welcome, via this form.
Press on this project:

American Bar Association Buzz: "Resolving the Unexpected in Elections," October 2008.

Pew Center on the States electionlineWeekly: "Resolving the Unexpected in Elections: Election Officials' Options," October 23, 2008.


The definitive versions of the papers posted on this page were first published in the venues indicated. In accordance with publisher copyright policies, these papers are pre-prints or post-prints, and are not the pubilsher's version.

Personal use of the material posted on this page is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the original publishers.

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.


Last modified: Friday, 21-Dec-2012 14:42:46 PST