Rop Gonggrijp’s scientific contributions

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (3)


Security Analysis of India’s Electronic Voting Machines
  • Conference Paper

September 2010

·

3,616 Reads

·

217 Citations

Scott Wolchok

·

Eric Wustrow

·

J. Alex Halderman

·

[...]

·

Rop Gonggrijp

Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, known in India as EVMs, have been praised for their simple design, ease of use, and reliability, but recently they have also been criticized following widespread reports of election irregularities. Despite this criticism, many details of the machines' design have never been publicly disclosed, and they have not been subjected to a rigorous, independent security evaluation. In this paper, we present a security analysis of a real Indian EVM obtained from an anonymous source. We describe the machine's design and operation in detail, and we evaluate its security in light of relevant election procedures. We conclude that in spite of the machines' simplicity and minimal software trusted computing base, they are vulnerable to serious attacks that can alter election results and violate the secrecy of the ballot. We demonstrate two attacks, implemented using custom hardware, which could be carried out by dishonest election insiders or other criminals with only brief physical access to the machines. This case study carries important lessons for Indian elections and for electronic voting security more generally.


RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code

September 2009

·

65 Reads

·

4 Citations

Lecture Notes in Computer Science

The Rijnland Internet Election System (RIES) is a system designed for voting in public elections over the internet. A rather cursory scan of the source code to RIES showed a significant lack of security-awareness among the programmers which – among other things – appears to have left RIES vulnerable to near-trivial attacks. If it had not been for independent studies finding problems, RIES would have been used in the 2008 Water Board elections, possibly handling a million votes or more. While RIES was more extensively studied to find cryptographic shortcomings, our work shows that more down–to–earth secure design practices can be at least as important, and the aspects need to be examined much sooner than right before an election.


Studying the Nedap/Groenendaal ES3B voting computer: a computer security perspective

January 2007

·

293 Reads

·

68 Citations

The Nedap/Groenendaal ES3B voting computer is being used by 90% of the Dutch voters. With very minor modifications, the same computer is also being used in parts of Germany and France. In Ireland the use of this machine is currently on hold after significant doubts were raised concerning its suitability for elections. This paper details how we installed new software in Nedap ES3B voting computers. It details how anyone, when given brief access to the devices at any time before the election, can gain complete and virtually undetectable control over the election results. It also shows how radio emanations from an unmodified ES3B can be received at several meters distance and used to tell what is being voted. We conclude that the Nedap ES3B is unsuitable for use in elections, that the Dutch regulatory framework surrounding e-voting currently insufficiently addresses security, and we pose that not enough thought has been given to the trust relationships and verifiability issues inherent to DRE class voting machines.

Citations (3)


... We don't trust voting computers). The group demonstrated that the voting machines were susceptible to hacking and compromising the secrecy of the vote [26]. Their successful campaign exposed a set of vulnerabilities provoking the decision to discontinue the use of voting machines in 2008, reverting to paper ballots-a decision that remains unchanged to date. ...

Reference:

Trust and Distrust in electoral technologies: what can we learn from the failure of electronic voting in the Netherlands (2006/07)
Studying the Nedap/Groenendaal ES3B voting computer: a computer security perspective
  • Citing Article
  • January 2007

... Perceived security is the extent to which a consumer perceives that the usage of a given technology is secure and without risk (Schuß et al., 2023). Notably, Wolchok et al. (2010) and Sagar et al. (2023) raised concerns about the potential for election insiders to manipulate e-voting machines, posing risks to both the integrity of voting outcomes and the protection of personal privacy. uch instances might discourage voters from participating in the voting process. ...

Security Analysis of India’s Electronic Voting Machines
  • Citing Conference Paper
  • September 2010

... SafeVOTE is a software company which offers a variety of products supporting both public and private elections using Internet voting (SafeVOTE, 2006). The Rijnland Internet Election System (RIES) is a system designed for voting in public elections over the Internet (Gonggrijp et al., 2009). Moreover, a browser-based Agile E-Voting system is another effort to provide a practical, voter-friendly e-voting system (Simhalu and Takeda, 2007). ...

RIES - Rijnland Internet Election System: A Cursory Study of Published Source Code
  • Citing Conference Paper
  • September 2009

Lecture Notes in Computer Science