Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Law

Comment With The Copyright Office Regarding A Proposed Exemption Under 17 U.S.C. Section 1201 For Software Security Research (Class 25), Candice Hoke Feb 2015

Comment With The Copyright Office Regarding A Proposed Exemption Under 17 U.S.C. Section 1201 For Software Security Research (Class 25), Candice Hoke

Law Faculty Reports and Comments

Professor Candice Hoke, Cleveland State University, and others (Douglas W. Jones, University of Iowa; Professor Deirdre Mulligan, University of California, Berkeley; Professor Vern Paxson, University of California, Berkeley;Professor Pamela Samuelson, University of California, Berkeley; Bruce Schneier Erik Stallman, Center for Democracy & Technology (CDT); comment addressing Proposed Class 25: Software Security Research and an exemption for software security research in order to promote the active research and testing efforts necessary to keep pace with evolving cybersecurity risks. Software and related access controls are increasingly embedded in a wide range of systems, from consumer goods to medical devices to infrastructure to …


E-Voting And Forensics: Prying Open The Black Box, Candice Hoke, Sean Peisert, Matt Bishop, Mark Graff, David Jefferson Aug 2009

E-Voting And Forensics: Prying Open The Black Box, Candice Hoke, Sean Peisert, Matt Bishop, Mark Graff, David Jefferson

Law Faculty Articles and Essays

Over the past six years, the nation has moved rapidly from punch cards and levers to electronic voting systems. These new systems have occasionally presented election officials with puzzling technical irregularities. The national experience has included unexpected and unexplained incidents in each phase of the election process: preparations, balloting, tabulation, and reporting results. Quick technical or managerial assessment can often identify the cause of the problem, leading to a simple and effective solution. But other times, the cause and scope of anomalies cannot be determined. In this paper, we describe the application of a model of forensics to the types …