Data and Applications Security Secure Electronic Voting Machines Lecture #30 Dr. Bhavani Thuraisingham The University of Texas at Dallas April 23, 2008.

Slides:



Advertisements
Similar presentations
Electronic Voting Systems
Advertisements

Mobile Code Security Yurii Kuzmin. What is Mobile Code? Term used to describe general-purpose executables that run in remote locations. Web browsers come.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Good or Bad?.  One of the closest contests in US history  Florida was the pivotal state  Neither Democrat Al Gore nor Republican George W. Bush had.
Electronic Voting: Danger and Opportunity J. Alex Halderman Department of Computer Science Center for Information Technology Policy Princeton University.
Overview of IS Controls, Auditing, and Security Fall 2005.
Mobile Code Security Aviel D. Rubin, Daniel E. Geer, Jr. MOBILE CODE SECURITY, IEEE Internet Computing, 1998 Minkyu Lee
Analysis of an Electronic Voting System
By Varun Jain. Introduction  Florida 2000 election fiasco, drew conclusion that paper ballots couldn’t be counted  Computerized voting system, DRE (Direct.
Charlie Daniels Arkansas Secretary of State HAVA Compliant Voting Systems Security Considerations General Recommendations to Enhance Security and Integrity.
Data and Applications Security Dr. Bhavani Thuraisingham The University of Texas at Dallas Attacks to Databases October 2014.
1 J. Alex Halderman Security Failures in Electronic Voting Machines Ariel Feldman Alex Halderman Edward Felten Center for Information Technology Policy.
Lecture 1: Overview modified from slides of Lawrie Brown.
Observation of e-enabled elections Jonathan Stonestreet Council of Europe Workshop Oslo, March 2010.
Security+ Guide to Network Security Fundamentals
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Electronic Voting Network Security 1 Edward Bigos George Duval D. Seth Hunter Katie Schroth.
17-803/ ELECTRONIC VOTING FALL 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS / Electronic Voting Session 2: Paper Trails Michael I. Shamos,
CMSC 414 Computer and Network Security Lecture 8 Jonathan Katz.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Electronic Voting Linh Nguyen. Electronic Voting  Voting Technologies  The Florida 2000 Election  Direct Recording Electronic Devices (DREs)‏ - Diebold.
17-803/ ELECTRONIC VOTING FALL 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS / Electronic Voting Session 6: The Diebold Reports Michael I.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Operating System Security Chapter 9. Operating System Security Terms and Concepts An operating system manages and controls access to hardware components.
Internet Voting. What is Internet Voting? Internet voting is: an election process whereby people can cast their votes over the Internet, most likely through.
Voting System Qualification How it happens and why.
TESTING THE SECRUITY OF ELECTRONIC VOTING SYSTEM Presented By: NIPUN NANDA
SEC835 Database and Web application security Information Security Architecture.
1 Testing the Security of Real-World Electronic Voting Systems Sandhya Jognipalli.
October 22, 2008 CSC 682 Security Analysis of the Diebold AccuVote – TS Voting Machine Feldman, Halderman and Felten Presented by: Ryan Lehan.
Information Systems Security Computer System Life Cycle Security.
Data and Applications Security Developments and Directions
Information Security Analytics Dr. Bhavani Thuraisingham The University of Texas at Dallas Attacks to Databases Hardware Security July 2011.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012.
Information Ethics Prof. Madya Dr. Rozinah Jamaludin 11 March 2010.
EE515/IS523 Think Like an Adversary Lecture 8 Usability/Software Failures Yongdae Kim.
Andreas Steffen, , LinuxTag2009.ppt 1 LinuxTag 2009 Berlin Verifiable E-Voting with Open Source Prof. Dr. Andreas Steffen Hochschule für Technik.
Nathanael Paul CRyptography Applications Bistro February 3, 2004.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Georgia Electronic Voting System Testing and Security Voting Systems Testing Summit November 29, 2005.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Attacks to Databases Emerging Security.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
Computers in Society Electronic Voting. Team Projects What is your name? Application? Presentation? Copyright The software industry The open source business.
The Digital Crime Scene: A Software Perspective Written By: David Aucsmith Presented By: Maria Baron.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
WHY THE vvpat has failed
Electronic Voting: Danger and Opportunity
VVPAT Building Confidence in U.S. Elections. WHAT IS VVPAT ? Voter-verifiable paper audit trail Requires the voting system to print a paper ballot containing.
Election Reform The Open Voting Consortium. Elections are important Voting is how we ultimately control.our government Many elections are decided by just.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
The VVSG 2005 Revision Overview EAC Standards Board Meeting February 26-27, 2009 John P. Wack NIST Voting Program National Institute.
Security Issues in Information Technology
Information Security Analytics
EVoting 23 October 2006.
Data and Applications Security Developments and Directions
E-voting …and why it’s good..
Improving Reliability of Direct Recording Electronic Voting Systems
Texas Secretary of State Elections Division
ISI Day – 20th Anniversary
Texas Secretary of State Elections Division
The Italian Academic Community’s Electronic Voting System
Cryptography and Network Security
Presentation transcript:

Data and Applications Security Secure Electronic Voting Machines Lecture #30 Dr. Bhavani Thuraisingham The University of Texas at Dallas April 23, 2008

References and Disclaimer l Analysis of an Electronic Voting System TADAYOSHI KOHNO ADAM STUBBLEFIELD AVIEL D. RUBIN DAN S. WALLACH IEEE Symposium on Security and Privacy 2004 l Security Analysis of the Diebold AccuVote-TS Voting Machine Ariel J. Feldman, J. Alex Halderman, and Edward W. Felten l The views expressed in this presentation are obtained entirely from the above two papers. Prof. Bhavani Thuraisingham has not carried out any analysis of the electronic voting machine discussed in this presentation.

Properties of a Good Voting System l The anonymity of a voter’s ballot must be preserved, both to guarantee the voter’s safety and to guarantee that voters have no evidence that proves which candidates received their votes. l The voting system must also be tamper-resistant to thwart a wide range of attacks ( including ballot stuffing by voters and incorrect tallying by insiders) l “Butterfly ballots” in the Florida 2000 presidential election is the importance of human factors. l A voting system must be comprehensible to and usable by the entire voting population, regardless of age, infirmity, or disability. l Flaws in any of these aspects of a voting system can lead to indecisive/incorrect election results.

Electronic Voting System l As a result of the Florida 2000 presidential election the inadequacies of widely-used punch card voting systems have become well understood by the general population. l This has led to increasingly widespread adoption of “direct recording electronic” (DRE) voting systems. l Voters go to their home precinct and prove that they are allowed to vote there by presenting say an ID card. The voter is then typically given a PIN, a smartcard, or some other token l User then enters the token at a voting terminal and then votes l When the voter’s selection is complete, DRE systems will typically present a summary of the voter’s selections l The ballot is “cast” l The most fundamental problem with such a voting system is that the entire election hinges on the correctness,

What is the problem? l The problem with such a voting system is that the entire election hinges on the correctness, robustness, and security of the software within the voting terminal. l Should that code have security relevant flaws, they might be exploitable either by unscrupulous voters or by malicious insiders. l If flaws are introduced into the voting system software then the results of the election cannot be assured to accurately reflect the votes legally cast by the voters.

A solution? l A solution for securing electronic voting machines is to introduce a “voter-verifiable audit trail”. l A DRE system with a printer attachment, or even a traditional optical scan system will satisfy this requirement by having a piece of paper for voters to read and verify that their intent is correct reflected. l This paper is stored in ballot boxes and is considered to be the primary record of a voter’s intent. l If the printed paper has some kind of error, it is considered to be a “spoiled ballot” and can be mechanically destroyed, giving the voter the chance to vote again. l The correctness of any voting software no longer matters; either a voting terminal prints correct ballots or it is taken out of service. l If there is any discrepancy in the vote tally, the paper ballots will be available to be recounted

Certified Voting Systems and issues l “CERTIFIED” DRE SYSTEMS. Many government entities have adopted paperless DRE systems l Such systems have been “certified” for use without any public release of the analyses l The CVS source code repository for Diebold’s AccuVote-TS DRE voting system recently appeared on the Internet. l Rubin et al discovered significant and wide-reaching security vulnerabilities in their analysis of the AccuVote-TS voting terminal l Voters can easily program their own smartcards to simulate the behavior of valid smartcards used in the election. l With such homebrew cards a voter can cast multiple ballots without leaving any trace. l A voter can also perform actions that normally require administrative privileges (e.g. viewing partial results and terminating the election early)

Certified Voting Systems and issues l The protocols used when the voting terminals communicate with their home base both to fetch election configuration information and to report final election results do not use cryptographic techniques to authenticate either end of the connection nor do they check the integrity of the data in transit. l Given that these voting terminals could potentially communicate over insecure phone lines or even wireless Internet connections, even unsophisticated attackers can perform untraceable “man-in- the-middle” attacks.

Certified Voting Systems and issues l Rubin et al considered both the specific ways that the code uses cryptographic techniques and the general software engineering quality of its construction. l They state neither provides them with any confidence of the system’s correctness. l Cryptography, when used at all, is used incorrectly. In many places where cryptography would seem obvious and necessary, none is used. l No evidence of disciplined software engineering processes. Comments in the code and the revision change logs indicate the engineers were aware of some problems l No evidence of any change-control process that might restrict a developer’s ability to insert arbitrary patches to the code. l Software is written entirely in C++. Rubin et al state when programming in a language like C++, which is not type-safe, programmers must exercise tight discipline to prevent their programs from being vulnerable to buffer overflow attacks and other weaknesses.

What happened next? l Following the release of our results, the state of Maryland hired SAIC and RABA and the state of Ohio hired Compuware to perform independent analyses of Diebold’s AccuVote-TS systems l These analyses supported Rubin’s findings; also showed that many of the issues raised and attacks identified still apply to more recent versions of the AccuVote-TS system l These analyses also identified security problems with the back- end GEMS server.

Security Threats l Smartcards - Exploiting the lack of cryptography; Creating homebrew smartcards; Casting multiple votes ; Accessing administrator and poll worker functionality l Election configurations and election data - Tampering with the system configuration; Tampering with ballot definitions; Impersonating legitimate voting terminals; Key management and other cryptographic issues with the vote and audit records; Tampering with election results and linking voters with their votes; Audit logs ; Attacking the start of an election l Software engineering - Code legacy; Coding style; Coding process; Code completeness and correctness

Rubin’s conclusions l Using publicly available source code, they performed an analysis of the April 2002 snapshot of Diebold’s AccuVote-TS electronic voting system. l They found significant security flaws: voters can trivially cast multiple ballots with no built-in traceability, administrative functions can be performed by regular voters, and the threats posed by insiders such as poll workers, software developers, and janitors is even greater l Based on the analysis of the development environment, including change logs and comments, they believe that an appropriate level of programming discipline for a project was not maintained. l There is little difference in the way code is developed for voting machines relative to other commercial endeavors. l They believe that an open process would result in more careful development as more scientists and software engineers would solve problems. l Need to use appropriate encryptions and security models

Analysis of Feldman et al l Malicious software running on a single voting machine can steal votes with little if any risk of detection. l The malicious software can modify all of the records, audit logs, and counters kept by the voting machine, so that even careful forensic examination of these records will find nothing amiss. l The authors have constructed demonstration software that carries out this vote-stealing attack. l Anyone who has physical access to a voting machine, or to a memory card that will later be inserted into a machine, can install said malicious software using a simple method that takes as little as one minute. l In practice, poll workers and others often have unsupervised access to the machines.

Analysis of Feldman et al l AccuVote-TS machines are susceptible to voting-machine viruses; computer viruses that can spread malicious software automatically and invisibly from machine to machine during normal pre- and post election activity. l Authors have constructed a demonstration virus that spreads in this way, installing their demonstration vote-stealing program on every machine it infects. l While some of these problems can be eliminated by improving Diebold’s software, others cannot be remedied without replacing the machines’ hardware. l Changes to election procedures would also be required to ensure security.