I show that the ICX suffers from critical vulnerabilities that can be exploited
to subvert all of its security mechanisms, including: user authentication, data
integrity protection, access control, privilege separation, audit logs, protective
counters, hash validation, and external firmware validation. I demonstrate that
these vulnerabilities provide multiple routes by which attackers can install malicious software on Georgia’s BMDs, either with temporary physical access or
remotely from election management systems (EMSs). I explain how such malware
can alter voters’ votes while subverting all of the procedural protections practiced
by the State, including acceptance testing, hash validation, logic and accuracy
testing, external firmware validation, and risk-limiting audits (RLAs).