@inproceedings{ce82b52e484e4c02a62e3fc0dc99312c,
title = "How Could Snowden Attack an Election?",
abstract = "We discuss a new type of attack on voting systems that in contrast to attacks described in the literature does not disrupt the expected behavior of the voting system itself. Instead the attack abuses the normal functionality to link the tallying of the election to disclosing sensitive information assumed to be held by the adversary. Thus the attack forces election officials to choose between two undesirable options: Not to publish the election result or to play into the adversary{\textquoteright}s hand and to publicize sensitive information We stress that the attack is different from extortion and not restricted to electronic voting systems.",
keywords = "voting systems, covert attack, election security, sensitive information disclosure, adversarial influence, voting systems, covert attack, election security, sensitive information disclosure, adversarial influence",
author = "Douglas Wikstr{\"o}m and Jordi Barrat and Sven Heiberg and Robert Krimmer and Carsten Sch{\"u}rmann and Helger Lipmaa and Vanessa Teague",
year = "2017",
month = oct,
day = "24",
doi = "10.1007/978-3-319-68687-5_17",
language = "English",
isbn = "978-3-319-68686-8",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "280--291",
booktitle = "Electronic Voting",
address = "Germany",
}