B. Arkin, S. Stender, and G. Mcgraw, Software penetration testing. Security & Privacy, IEEE, vol.3, issue.1, pp.84-87, 2005.

E. Bonver and M. Cohen, Developing and retaining a security testing mindset. Security & Privacy, IEEE, vol.6, issue.5, pp.82-85, 2008.

B. Potter and G. Mcgraw, Software security testing. Security & Privacy, IEEE, vol.2, issue.5, pp.81-85, 2004.

H. Thompson, Why security testing is hard. Security & Privacy, IEEE, vol.1, issue.4, pp.83-86, 2003.

J. Horlick, HB 150-20 Information Technology Security Testing: Common Criteria. National Institute of Standards and Technology, 2005.

D. Chaum, A. Essex, R. Carback, J. Clark, S. Popoveniuc et al., Scantegrity: End-to-End Voter-Verifiable Optical- Scan Voting, IEEE Security & Privacy Magazine, vol.6, issue.3, pp.40-46, 2008.
DOI : 10.1109/MSP.2008.70

B. Adida, Helios: web-based open-audit voting, SS'08: Proceedings of the 17th conference on Security symposium, pp.335-348, 2008.

A. J. Feldman, J. A. Halderman, and E. W. Felten, Security analysis of the diebold accuvote-ts voting machine, EVT'07: Proceedings of the USENIX Workshop on Accurate Electronic Voting Technology, pp.2-2, 2007.

M. Bishop and D. Wagner, Risks of e-voting, Communications of the ACM, vol.50, issue.11, pp.120-120, 2007.
DOI : 10.1145/1297797.1297827

D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, R. Kemmerer et al., Are your votes really counted?: testing the security of real-world electronic voting systems, ISSTA '08: Proceedings of the 2008 international symposium on Software testing and analysis, pp.237-248, 2008.

D. Wagner, Report of the california voting system review (USENIX Security Symposium, 2007.