2018
DOI: 10.1007/978-3-030-00419-4_3
|View full text |Cite
|
Sign up to set email alerts
|

The Threat of SSL/TLS Stripping to Online Voting

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 20 publications
0
4
0
Order By: Relevance
“…Ballot secrecy in online elections has been studied in the context of active attacks, such as subverting TLS [2,8], exploiting implementation vulnerabilities [11,13], or by unacknowledged privileged access [4]. Little related-work has evidently explored passive attacks that focus on the lengths of exchanged messages.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Ballot secrecy in online elections has been studied in the context of active attacks, such as subverting TLS [2,8], exploiting implementation vulnerabilities [11,13], or by unacknowledged privileged access [4]. Little related-work has evidently explored passive attacks that focus on the lengths of exchanged messages.…”
Section: Background and Related Workmentioning
confidence: 99%
“…1 And over 650,000 online voters participated in the 2021 State election in New South Wales (Australia). 2 Despite this rapid growth, few countries have developed adequate legislation or standards for online voting systems. In this under-regulated environment, online voting providers largely set their own security requirements, which has led to mixed outcomes.…”
Section: Introductionmentioning
confidence: 99%
“…(Helios) Use the Helios verifiable online voting system, which is available through a web interface [1,2,22]. Helios is a free, open-source electronic voting system that offers voter verifiability with quite strong security properties [7,8,12,17].…”
Section: Alternativesmentioning
confidence: 99%
“…Furthermore, unpredictable attacks (TLS attack and/or man in the middle attack [100]) can occur due to undetected vulnerabilities of software and hardware. Untrusted client devices (phones, PCs and laptops) can be infected.…”
Section: Rq1: What Are the Current E-voting Systems Gaps?mentioning
confidence: 99%