@lxo I think you should apply for access to the machines and do more research on the protocols around the voting machines - from handling to data transmission.
There are attack vectors we can't really address - what if Intel puts malicious silicon inside the processor or the TPM? Data exfiltration by malicious code and ultrasound modulation? Once you compromise the hardware or the bootloader, anything goes.