> I'm talking in the context of checking the Automated Election System, as to,

Alright, let's use the buffer overrun vulnerabilities in the context of AES, 
because it happened before in an AES system used by a state in US. The AES 
machine proposed in our country is using an optical scanner to count votes from 
a ballot. Over the years, several buffer overrun vulnerabilities have been 
discovered on image processing libraries. An existing AES from another country 
shipped with image processing libraries with these kind of vulnerabilities. And 
someone found out a way to create an input (on paper to be scanned) tat will 
exploit this buffer overrun vulnerabilities to execute any kind of instruction. 
Those instructions can be "dada-g-bawas" routine.

There's no way in the world you can catch that using "outcome based" only tests.
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
http://lists.linux.org.ph/mailman/listinfo/plug
Searchable Archives: http://archives.free.net.ph

Reply via email to