Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Nov 4, 2016
The following proof-of-concept (PoC) video demonstrates the techniques Cylance researchers used to compromise a Sequoia AVC Edge Mk1 voting machine.
The video shows how easy it is for a third party to remove and replace internal flash memory cards, directly manipulate the voting tallies in memory, and cause a vote for one candidate to be credited to another by altering elements of the device’s display.
Additionally, the video demonstrates how vote tallies can be manipulated on both the Public Counter and the Protective Counter, which was designed to act as a redundant verification system to ensure results are valid.
While similar methods of exploit have been proposed on a theoretical basis by other researchers, Cylance is the first to successfully demonstrate an exploit for the vulnerabilities in a real-world scenario.