Last updated on: 3/3/2009 | Author:

Edward W. Felten, PhD Biography

Professor of Computer Science and Public Affairs at Princeton University
Con to the question "Do Electronic Voting Machines Improve the Voting Process?"

“From a computer security standpoint, DREs have much in common with desktop PCs. Both suffer from many of the same security and reliability problems, including bugs, crashes, malicious software, and data tampering. Despite years of research and enormous investment, PCs remain vulnerable to these problems, so it is doubtful, unfortunately, that DRE vendors will be able to overcome them… Experience with the [Diebold] AccuVote-TS and paperless DREs shows that they are prone to very serious vulnerabilities.”

“Security Analysis of the Diebold AccuVote-TS Voting Machine,” Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology, Aug. 2007

Involvement and Affiliations:
  • Professor of Computer Science and Public Affairs, Princeton University, 1993-present
  • Association for Computing Machinery (ACM) U.S. Public Policy Committee, 2004-present
  • Advisory Board, Electronic Frontier Foundation, 2004-present
  • Director, Secure Internet Programming Laboratory, Princeton University, 1996-present
  • Pioneer Award, Electronic Frontier Foundation
  • Scientific American Fifty Award
  • Committee Member, National Academy of Sciences Committee on Air Force Information Science and Technology Research, and Committee on Foundations of Computer Science, 2001-2004
  • Consultant to the U.S. Department of Justice, Antitrust Division regarding Microsoft antitrust case, 1998-2002
  • Emerson Electric, E. Lawrence Keyes Faculty Advancement Award, Princeton University School of Engineering, 1996
  • Corporate Advisory Boards – Cigital, Inc.; Sun Microsystems, Java Security; Cloakware, Ltd.;; Finjan Software; Netcertainty; FullComm LLC
  • PhD, Computer Science and Engineering, University of Washington, 1993
  • MS, Computer Science and Engineering, University of Washington, 1991
  • BS, Physics, California Institute of Technology, 1985
  • None found
Quoted in:
  1. Are Electronic Voting Systems Vulnerable to Hacking?
  2. Do Electronic Voting Machines Improve the Voting Process?
  3. Do Electronic Voting Machines Store Votes Securely?