Black Hat USA
August 4-9, 2018
Las Vegas, NV, USA
Black Hat Trainings
October 22-23, 2018
Chicago, IL USA
Black Hat Europe
December 3-6, 2018
London UK
6/5/2018
11:00 AM
Black Hat Staff
Black Hat Staff
Event Updates
50%
50%

Black Hat USA 2018:
A History of Voting Machine Vulnerabilities & Persistent Hacks

For the past decade, researchers have been discovering vulnerabilities of voting machine models, even holding hacking competitions to publicly test theories and demonstrate exploit paths. Recent allegations of voting machine tampering, nation-state interference and other security breaches surrounding the United States Presidential Election have increased awareness and attention on voting policies and machine weaknesses.

Carsten Schuermann, Associate Professor at IT University of Copenhagen will present “Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines” at Black Hat USA 2018. In this Briefing he will detail issues of the “WinVote” machines, widely regarded as the worst voting machines made and prevailing gaps in the technology that could be impacting voting security today. Decommissioned after the 2015 elections in Virginia, WinVote machines have since been gathered and analyzed to aid in developing more stable and credible machines. Most notable,

Potentiality to breach voting machines brings to the forefront possible flaws in the federal testing and certification process and the overall integrity of the entire electoral process. Don’t miss “Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines” at Black Hat USA 2018. View the Briefings lineup by Track to narrow down more than 110+ Briefings by topic of interest. Register soon to secure the lowest possible rate and save on your pass type.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft Fixes 11 Critical, 39 Important Vulns
Kelly Sheridan, Staff Editor, Dark Reading,  6/12/2018
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12580
PUBLISHED: 2018-06-19
library/DBTech/Security/Action/Sessions.php in DragonByte vBSecurity 3.x through 3.3.0 for vBulletin 3 and vBulletin 4 allows self-XSS via $session['user_agent'] in the "Login Sessions" feature.
CVE-2018-12578
PUBLISHED: 2018-06-19
There is a heap-based buffer overflow in bmp_compress1_row in appliers.cpp in sam2p 0.49.4 that leads to a denial of service or possibly unspecified other impact.
CVE-2018-1061
PUBLISHED: 2018-06-19
python before versions 2.7.15, 3.4.9, 3.5.6 and 3.7.0 is vulnerable to catastrophic backtracking in the difflib.IS_LINE_JUNK method. An attacker could use this flaw to cause denial of service.
CVE-2018-1073
PUBLISHED: 2018-06-19
The web console login form in ovirt-engine before version 4.2.3 returned different errors for non-existent users and invalid passwords, allowing an attacker to discover the names of valid user accounts.
CVE-2018-12557
PUBLISHED: 2018-06-19
An issue was discovered in Zuul 3.x before 3.1.0. If nodes become offline during the build, the no_log attribute of a task is ignored. If the unreachable error occurred in a task used with a loop variable (e.g., with_items), the contents of the loop items would be printed in the console. This could ...