Little-JIL/Juliette: a process definition language and interpreter
Proceedings of the 22nd international conference on Software engineering
Little-JIL 1.0 Language Report TITLE2:
Little-JIL 1.0 Language Report TITLE2:
Flow analysis for verifying properties of concurrent software systems
ACM Transactions on Software Engineering and Methodology (TOSEM)
Hack-a-Vote: Security Issues with Electronic Voting Systems
IEEE Security and Privacy
Process programming to support medical safety: a case study on blood transfusion
SPW'05 Proceedings of the 2005 international conference on Unifying the Software Process Spectrum
Specifying and verifying requirements for election processes
dg.o '08 Proceedings of the 2008 international conference on Digital government research
Proceedings of the 30th international conference on Software engineering
Formalisms to support the definition of processes
Journal of Computer Science and Technology
An algebraic approach for managing inconsistencies in software processes
ICSP'07 Proceedings of the 2007 international conference on Software process
Support IT service management with process modeling and analysis
ICSP'08 Proceedings of the Software process, 2008 international conference on Making globally distributed software development a success story
Modeling and analyzing faults to improve election process robustness
EVT/WOTE'10 Proceedings of the 2010 international conference on Electronic voting technology/workshop on trustworthy elections
Applying a reusable election threat model at the county level
EVT/WOTE'11 Proceedings of the 2011 conference on Electronic voting technology/workshop on trustworthy elections
A systematic process-model-based approach for synthesizing attacks and evaluating them
EVT/WOTE'12 Proceedings of the 2012 international conference on Electronic Voting Technology/Workshop on Trustworthy Elections
Supporting undo and redo in scientific data analysis
TaPP'13 Proceedings of the 5th USENIX conference on Theory and Practice of Provenance
Supporting undo and redo in scientific data analysis
Proceedings of the 5th USENIX Workshop on the Theory and Practice of Provenance
Hi-index | 0.00 |
This paper shows that process definition and analysis technologies can be used to reason about the vulnerability of election processes with respect to incorrect or fraudulent behaviors by election officials. The Little-JIL language is used to model example election processes, and various election worker fraudulent behaviors. The FLAVERS finite-state verification system is then used to determine whether different combinations of election worker behaviors cause the process to produce incorrect election results or whether protective actions can be used to thwart these threats.