How EVM Machines Can Be Manipulated Through Simple Programming

Electronic Voting Machines (EVMs) are widely used in many countries to conduct elections and record votes. While these machines are designed to be secure and tamper-proof, it’s important to understand that they are still computer systems and can potentially be manipulated through programming.

In this blog post, we’ll explore a simple example of how an EVM machine can be manipulated using basic programming techniques. Please note that this example is for educational purposes only and should not be used for any illegal or unethical activities.

Understanding the Basics

At its core, an EVM machine is a computer system that runs on software and hardware components. Like any other computer program, the software that runs on an EVM machine can be modified or manipulated through programming.

In our example, we’ll use a simple web application built with HTML, CSS, and JavaScript to simulate an EVM machine. This application will have four buttons representing different candidates or parties, and users can click on these buttons to cast their votes.

The EVM Machine Simulation

  • HTML: This defines the structure and layout of the user interface, including the buttons representing the candidates and a table to display the results.
  • CSS: This styles the user interface components, making them visually appealing and easy to use.
  • JavaScript: This handles the logic behind the EVM machine, including updating the vote counts and displaying the results.

In our JavaScript code, we define an object called parties that stores the names of the parties and their respective vote counts. We also have a condition that after 10 votes, any additional votes will be counted for a specific party (in our case, BJP).

// Define the parties and their vote counts
const parties = {
'BJP': 0,
'LDF': 0,
'UDF': 0,
'CON': 0
};

// ... (other code)

// Add click event listeners to party buttons
partyButtons.forEach(button => {
button.addEventListener('click', () => {
const party = button.textContent;
const totalVotes = Object.values(parties).reduce((sum, count) => sum + count, 0);

if (totalVotes < 10) {
parties[party]++;
} else {
parties['BJP']++;
}

displayResults();
});
});

Potential Manipulation

By modifying the JavaScript code, an attacker could manipulate the voting process in various ways. For example:

  1. Changing the vote counting logic: The attacker could modify the code that updates the vote counts, making it favor a specific party or candidate.
  2. Altering the results display: The attacker could change the code that displays the results, showing different vote counts than the actual ones.
  3. Introducing bugs or vulnerabilities: The attacker could introduce bugs or vulnerabilities in the code that could lead to unexpected behavior or security issues.

It’s important to note that in a real-world EVM system, there would be additional security measures and safeguards in place to prevent such manipulations. However, this simple example demonstrates how even a basic programming knowledge can potentially be used to manipulate an EVM machine.

Awareness and Vigilance

While this example is simplified and does not represent the complexity of actual EVM systems, it highlights the importance of being aware of the potential vulnerabilities and the need for vigilance when it comes to electronic voting systems.

It’s crucial to have robust security measures, thorough testing, and independent auditing of the software and hardware components used in EVM machines. Additionally, transparency and public scrutiny of the entire voting process can help mitigate the risks of manipulation and ensure the integrity of elections.

In conclusion, while EVM machines are designed to be secure and reliable, they are not immune to potential manipulation through programming. It’s essential for citizens, election officials, and authorities to be aware of these risks and take appropriate measures to ensure the integrity and security of the voting process.


This blog post aims to raise awareness about the potential vulnerabilities of EVM machines and the importance of vigilance and security measures in the electronic voting process. It’s crucial to have open discussions and continuous improvements to ensure the integrity and trust in electoral systems.

(Visited 68 times, 1 visits today)

Leave a comment

Your email address will not be published. Required fields are marked *