Presentation is loading. Please wait.

Presentation is loading. Please wait.

1 J. Alex Halderman Security Failures in Electronic Voting Machines Ariel Feldman Alex Halderman Edward Felten Center for Information Technology Policy.

Similar presentations


Presentation on theme: "1 J. Alex Halderman Security Failures in Electronic Voting Machines Ariel Feldman Alex Halderman Edward Felten Center for Information Technology Policy."— Presentation transcript:

1 1 J. Alex Halderman Security Failures in Electronic Voting Machines Ariel Feldman Alex Halderman Edward Felten Center for Information Technology Policy Department of Computer Science Princeton University

2 2 J. Alex Halderman http://itpolicy.princeton.edu

3 3 J. Alex Halderman

4 4 J. Alex Halderman

5 5 J. Alex Halderman 2000 Recount Debacle Legislative response: Help America Vote Act Provided $3.9 billion to states to upgrade voting machines by November 2006

6 6 J. Alex Halderman DREs to the Rescue? Direct Recording Electronic – Store votes in internal memory

7 7 J. Alex Halderman DREs are Computers Bugs Rootkits Viruses Attacks

8 8 J. Alex Halderman

9 9 J. Alex Halderman

10 10 J. Alex Halderman Diebold’s History of Secrecy Uses NDAs to prevent states from allowing independent security audits Source code leaked in 2003, researchers at Johns Hopkins found major flaws Diebold responded with vague legal threats, personal attacks, disinformation campaign Internal emails leaked in 2003 reveal poor security practices by developers Diebold tried to suppress sites with legal threats

11 11 J. Alex Halderman We Get a Machine (2006) Obtained legally from an anonymous private party Software is 2002 version, but certified and used in actual elections First complete, public, independent security audit of a DRE

12 12 J. Alex Halderman Research Goals Conduct independent security audit Confirm findings of previous researchers (Hursti, Kohno et al.) Verify threats by implementing attack demos Who wants to know? Voters, candidates, election officials, policy makers, researchers

13 13 J. Alex Halderman 16 MB Flash 128 KB EPROM SH3 CPU32 MB SDRAM Removable Flash Memory Card

14 14 J. Alex Halderman Bootloader WinCE 3.0 Kernel BallotStation (Internal Flash or EPROM) (Internal Flash)

15 15 J. Alex Halderman

16 16 J. Alex Halderman Our Findings Malicious software running on the machine can steal votes undetectably, altering all backups and logs Anyone with physical access to the machine or memory card can install malicious code in as little as one minute Malicious code can spread automatically and silently from machine to machine in the form of a voting machine virus

17 17 J. Alex Halderman Vulnerabilities Malicious software running on the machine can steal votes undetectably, altering all backups and logs Anyone with physical access to the machine or memory card can install malicious code in as little as one minute Malicious code can spread automatically and silently from machine to machine in the form of a voting machine virus

18 18 J. Alex Halderman (Video Demonstration)

19 19 J. Alex Halderman Correct result: George 5, Benedict 0

20 20 J. Alex Halderman

21 21 J. Alex Halderman Bootloader WinCE 3.0 Kernel BallotStationStuffer

22 22 J. Alex Halderman Stealing Votes Stuffer Primary Vote RecordBackup Vote RecordAudit Log (President: George) (President: Benedict) (President: George) … (President: Benedict) (President: George) …

23 23 J. Alex Halderman

24 24 J. Alex Halderman Vulnerabilities Malicious software running on the machine can steal votes undetectably, altering all backups and logs Anyone with physical access to the machine or memory card can install malicious code in as little as one minute Malicious code can spread automatically and silently from machine to machine in the form of a voting machine virus

25 25 J. Alex Halderman

26 26 J. Alex Halderman EXPLORER.GLB

27 27 J. Alex Halderman Bootloader WinCE 3.0 Kernel BallotStation EBOOT.NB0

28 28 J. Alex Halderman Bootloader WinCE 3.0 Kernel BallotStation EBOOT.NB0

29 29 J. Alex Halderman 128 KB EPROM Jumper Table EBOOT.NB0

30 30 J. Alex Halderman Weakness in Depth Manually install using Explorer Replace boot firmware Replace boot EPROM

31 31 J. Alex Halderman

32 32 J. Alex Halderman The Key

33 33 J. Alex Halderman

34 34 J. Alex Halderman Weakness in Depth Key Commonly Available Lock Easy-to-Pick Key Pictured on Web Site

35 35 J. Alex Halderman Tamper-Evident Seals?

36 36 J. Alex Halderman Vulnerabilities Malicious software running on the machine can steal votes undetectably, altering all backups and logs Anyone with physical access to the machine or memory card can install malicious code in as little as one minute Malicious code can spread automatically and silently from machine to machine in the form of a voting machine virus

37 37 J. Alex Halderman EBOOT.NB0 The Viral Lifecycle: Infection VIRUS.EXE 

38 38 J. Alex Halderman The Viral Lifecycle: Propagation EBOOT.NB0 VIRUS.EXE What if the viral firmware sees EBOOT.NB0? Hidden  Ignore it Non-hidden  Fake a firmware update

39 39 J. Alex Halderman Voting Machine Virus

40 40 J. Alex Halderman Viral Spread

41 41 J. Alex Halderman Are all DREs this bad?

42 42 J. Alex Halderman

43 43 J. Alex Halderman

44 44 J. Alex Halderman Memory Organization Diebold AccuVoteSequoia AVC Firmware Ballots Votes Ballots Votes Firmware EPROM (RO) Flash Memory (RW) NV-RAM (RW)

45 45 J. Alex Halderman We can do better!

46 46 J. Alex Halderman Why Vote Electronically? Voters prefer it Faster reporting Fewer undervotes Improved accessibility Potentially increased security*

47 47 J. Alex Halderman Low-Tech vs. High-Tech Paper Ballots Low-cost cheating (ballot stuffing) Small scale tampering (individual precincts) Electronic Voting High-cost cheating (viral attacks) Large scale tampering (counties or states) Leverage these complementary failure modes for greater security.

48 48 J. Alex Halderman Paper to the Rescue Voter-Verified Paper Audit Trails (VVPAT) DRE prints a paper ballot, voter verifies and places in a ballot box At a few random precincts, paper ballots counted to ensure machines totals are accurate If discrepancies found, paper ballots can be counted more widely

49 49 J. Alex Halderman Software Independence “A voting system is software-independent if an undetected change or error in its software cannot cause an undetectable change or error in an election outcome.” — Ron Rivest and John Wack DREs + VVPATs Electronic Ballot Marking systems Optical Scan systems Cryptographic schemes

50 50 J. Alex Halderman Proposed Legislation H.R. 811: Voter Confidence and Increased Accessibility Act (Rush Holt, D-NJ) Amends HAVA to require VVPATs –Paper ballots would be the official record –Random manual recounts in 3%+ of precincts Opens voting software and source code to public inspection Additional $300 million for states

51 51 J. Alex Halderman Future Work Retrofits for existing systems Improved procedural safeguards Policies for recovering from failures Hardware-assisted security Cryptographically assured voting Techniques for ballot secrecy

52 52 J. Alex Halderman http://itpolicy.princeton.edu/voting


Download ppt "1 J. Alex Halderman Security Failures in Electronic Voting Machines Ariel Feldman Alex Halderman Edward Felten Center for Information Technology Policy."

Similar presentations


Ads by Google