Electronic Voting Machine Risks and Solutions
DOI:
https://doi.org/10.58445/rars.3484Keywords:
Electronic Voting Machine, EVM, EVM HACK, EVM HACKING, EVM TAMPERING, EVM RISKS, EVM Solutions, EVM Analysis, EVM Research Paper, DJ Baluvuri, Dheeraj Deep Baluvuri, Dheeraj Baluvuri, Jayadeep Baluvuri, Jay baluvuri, Jbaluvuri, Jayadeep, Prajwal Deep Baluvuri, Prajwal Baluvuri, Praj BaluvuriAbstract
This research is to analyze security risks and vulnerabilities of Electronic Voting Machine (EVM) by simulating an optical scan EVM. The research also provides potential solutions for more secure, transparent voting procedure. EVM became a pandora box in the countries where the public voting conducted using EVMs. As it’s machine-based voting, voters don’t have transparency on how the EVM system works. People and media are very much curious on functionality and speculations around potential risks of EVMs. As concerns and protests increase about EVMs being hacked using artificial intelligence or due to tampering of the EVM machines, this research paper attempts to provide analysis on possibilities of EVM tampering, security risks and potential solutions. The goal is to analyze security flaws, test patches, and suggest changes that could be applied on real-world EVMs. Through research, design, and experimentation on a software-based system, the research discusses how minor improvements like encryption, paper records, and audit features can significantly strengthen transparency and confidence in electronic voting machines.
References
Voluntary Voting System guidelines. (2025, January 31). U.S. Election Assistance Commission. Retrieved November 26, 2025, from https://www.eac.gov/voting-equipment/voluntary-voting-system-guidelines
Desk, H. N. (2024, March 30). All you need to know about VVPAT. The Hindu. https://www.thehindu.com/news/national/all-you-need-to-know-about-vvpat/article61795074.ece
Verifier. (n.d.). Verified Voting. https://verifiedvoting.org/verifier/#mode/navigate/map/voteEquip/mapType/ppEquip/year/202
Livemint. (2024, June 16). Elon Musk’s “anything can be hacked” VS ’Rajeev Chandrasekhar’s “technically you are right” on use of EVMs. Mint. https://www.livemint.com/news/india/elon-musks-anything-can-be-hacked-vs-rajeev-chandrasekhars-technically-you-are-right-on-use-of-evms-11718523721133.html
Securing the vote. (n.d.). National Academies. https://www.nap.edu/catalog/25120/securing-the-vote-protecting-american-democrac
Felten, E. (2010, April 29). India's Electronic Voting Machines Have Security Problems. CITP Blog. https://blog.citp.princeton.edu/2010/04/29/indias-electronic-voting-machines-have-security-problems/
Blaze, M., Braun, J., Hursti, H., Hall, J. L., MacAlpine, M., & DEFCON. (2017). DEFCON 25 Voting Machine Hacking Village report on cyber vulnerabilities in U.S. election equipment, databases, and infrastructure. https://www.defcon.org/images/defcon-25/DEF%20CON%2025%20voting%20village%20report.pdf
Smartmatic statement on the recent constituent Assembly election in Venezuela. (2017, August 2). Smartmatic. https://www.smartmatic.com/media/smartmatic-statement-on-the-recent-constituent-assembly-election-in-venezuela/
Prasad, H. K., Halderman, J. A., Rop Gonggrijp, Wolchok, S., Wustrow, E., Kankipati, A., Sakhamuri, S. K., Yagati, V., NetIndia, (P) Ltd., & The University of Michigan. (2010). Security analysis of India’s electronic voting machines. Indiaevm. https://indiaevm.org/evm_tr2010.pdf
BEL. (2024, February 29). Electronic Voting Machine - BEL. https://bel-india.in/product/electronic-voting-machine/
Downloads
Posted
Categories
License
Copyright (c) 2025 Dheeraj Deep Baluvuri, Jayadeep Baluvuri

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.