CSC 382/582: Computer SecuritySlide #1 CSC 382/582: Computer Security Voting Security.

Slides:



Advertisements
Similar presentations
I Think I Voted. E-voting vs. Democracy Prof. David L. Dill Department of Computer Science Stanford University
Advertisements

Electronic Voting Systems
Instant Runoff Voting (Ranked Choice Voting) Presented By: Rob Richie, Executive Director The Center for Voting and Democracy (The Center is a non-profit,
Good or Bad?.  One of the closest contests in US history  Florida was the pivotal state  Neither Democrat Al Gore nor Republican George W. Bush had.
The Citizen in Government Electing Leaders ~~~~~ The Right to Vote
Voting Systems.  DS200 – new 2013  DS850 – new 2013  AutoMARK Voting Equipment.
Electronic Voting: Danger and Opportunity J. Alex Halderman Department of Computer Science Center for Information Technology Policy Princeton University.
Analysis of an Electronic Voting System
By Varun Jain. Introduction  Florida 2000 election fiasco, drew conclusion that paper ballots couldn’t be counted  Computerized voting system, DRE (Direct.
1 J. Alex Halderman Security Failures in Electronic Voting Machines Ariel Feldman Alex Halderman Edward Felten Center for Information Technology Policy.
ECAM ANNUAL MEETING January , 2012 Updates to SEMS And Election Prep Presented by Madalan Lennep, PMP.
Electronic Voting Network Security 1 Edward Bigos George Duval D. Seth Hunter Katie Schroth.
Voting Machines Failing the World *Voting machines around the world are failing in Colorado as well as 34 other states. *This could be crucial in the upcoming.
17-803/ ELECTRONIC VOTING FALL 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS / Electronic Voting Session 5: Direct Recording Electronic (DRE)
Presentation by Christine McElroy
Electronic Voting Linh Nguyen. Electronic Voting  Voting Technologies  The Florida 2000 Election  Direct Recording Electronic Devices (DREs)‏ - Diebold.
UNIVERSITY LECTURE SERIES OCTOBER 12, 2006 COPYRIGHT © 2006 MICHAEL I. SHAMOS What’s Right With Electronic Voting? Michael I. Shamos, Ph.D., J.D. Institute.
Voting Machines Failing the World The true issue for these electronic voting machines is that the government has not been a full out supporter of this.
TESTING THE SECRUITY OF ELECTRONIC VOTING SYSTEM Presented By: NIPUN NANDA
Objectives Analyze how the administration of elections in the United States helps make democracy work. Define the role of local precincts and polling places.
Data and Applications Security Secure Electronic Voting Machines Lecture #30 Dr. Bhavani Thuraisingham The University of Texas at Dallas April 23, 2008.
States control most of election law and procedure Ohio Secretary of State Jon Husted (R) Nationwide: 500,000+ office holders of over 90,000 positions!
Essential Question: How does citizen involvement play a part in a functioning democracy and what responsibilities do “good” citizens have?
Voting Systems.  DS200  DS850  AutoMARK Voting Equipment.
Election Administration. Ensuring legitimacy of the government Legitimacy: acceptance of the right of public officials to hold office and to promulgate.
October 22, 2008 CSC 682 Security Analysis of the Diebold AccuVote – TS Voting Machine Feldman, Halderman and Felten Presented by: Ryan Lehan.
Chapter 7: The Electoral Process Section 2
Social Choice Lecture 19 John Hey.
Bellwork About 5% CA 55 TX 38 NY 29 FL 29 IL 20 PA 20 OH 18
CIT 380: Securing Computer Systems
Elections Americans vote at extreme levels –Elections are held almost everyday besides Sundays and holidays –500,000 office holders are elected in the.
Digital Democracy: A look at Voting Machines Presented by Justin Dugger April 2003.
Polling Places -Polling Places -precinct based You vote in your local area, -Usually in schools, town halls, public places -open early and close late In.
Polling Places -Polling Places -precinct based -Usually in schools, town halls, public places -open early and close late 7-7 or 8-8.
EE515/IS523 Think Like an Adversary Lecture 8 Usability/Software Failures Yongdae Kim.
Objectives Analyze how the administration of elections in the United States helps make democracy work. Define the role of local precincts and polling places.
The Electoral Process Chapter 7.
Final review Our final exam will be held on Wednesday, May 3rd from 4:00 to 5:50 in room 109 WWH.
Idaho Procedures M100 OPTICAL SCAN PRECINCT TABULATOR.
Against E-Voting Ryan Egan, Amber Jones, Alyssa Sankin, Page Stephens, Amber Straight, Philip Sugg, and Diana Troisi Direct recording electronic (DRE)
Political Process 3.6 Politics and Government. E- voting Electronic voting systems for electorates have been in use since the 1960s when punched card.
Chapter 10 Section 3. Voter Qualification  Each state determines qualifications for registering to vote and voting  States must follow certain guidelines.
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Electronic Voting: Danger and Opportunity
WHAT CONSTITUTES A VOTE? Annual Training for County Election Officials
THE BASICS OF VOTING Requirements: –Must be a US Citizen –18 years or older –Must be a resident of the state In most states prison inmates and the mentally.
Elections and Voting Behavior Chapter 10. How American Elections Work Three types of elections: – Select party nominees – Select officeholders – Select.
Step 1. Meet Eligibility Guidelines Set by the US Constitution Step 2. Test the Water: Pre-Candidacy ProcessTest the Water: Pre-Candidacy Process Step.
Goal 4- Political Parties. Qualifying to Vote Voting is an important right of American citizenship, without it citizens cannot choose who will run their.
Chapter 10 Voting and Elections. Qualifications of Voting 18 years old a US citizen Registered to vote Resident of voting district.
Polling Places -Polling Places -precinct based -Usually in schools, town halls, public places -open early and close late.
Voting: Does the Majority Always Rule?
Chapter 7: Elections.
Ronald L. Rivest MIT NASEM Future of Voting Meeting June 12, 2017
EVoting 23 October 2006.
10.3 notes.
1.3 The Borda Count Method.
Texas Secretary of State Elections Division
Chapter 10 Voting and Elections.
Unit 2: Government Systems & Politics
Who can Vote? And Types of Elections
Texas Secretary of State Elections Division
American Government and Organization
CSC 482/582: Computer Security
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Chapter 7: The Electoral Process Section 2
Quiz – 1/24 - Friday How many people voted in the election?
Unit 2: Govt Systems & Politics
Presentation transcript:

CSC 382/582: Computer SecuritySlide #1 CSC 382/582: Computer Security Voting Security

CSC 382/582: Computer SecuritySlide #2 Topics 1.Why do we vote? 2.Do we have a right to vote? 3.How do we vote? 4.Electronic voting

CSC 382/582: Computer SecuritySlide #3 Why do we vote? 1.What’s the purpose of democracy? 2.Does democracy require voting? 3.Does voting mean you live in a democracy?

CSC 382/582: Computer SecuritySlide #4 Voting Rights Do we have a right to vote?

CSC 382/582: Computer SecuritySlide #5 Voting Rights Non-discrimination is protected –15 th (race) –19 th (sex) –26 th (age) But the SCOTUS majority concluded: "the individual citizen has no federal constitutional right to vote for electors for the President of the United States." (Bush v. Gore, 531 U.S. 98, 104 (2000))

CSC 382/582: Computer SecuritySlide #6 Voting Methods Binary Ranked Condorcet Rated Proportional

CSC 382/582: Computer SecuritySlide #7 Binary Methods Plurality –First-past-the-post, largest number wins. Approval –Vote for multiple candidates; largest number wins. Runoff –Multiple rounds of plurality until majority winner. –Typical: select top 2, then hold election with just those 2. Random –People vote for their candidate. –Randomly selected ballot determines winner.

CSC 382/582: Computer SecuritySlide #8 Voting Criteria Majority criterionMajority criterion — If there exists a majority preferring a single candidate, does he always win if that majority votes sincerely? Monotonicity criterionMonotonicity criterion — Is it impossible to cause a winning candidate to lose by ranking him higher, or to cause a losing candidate to win by ranking him lower? Consistency criterionConsistency criterion — If the electorate is divided in two and a choice wins in both parts, does it always win overall? Participation criterionParticipation criterion — Is it always better to vote honestly than to not vote? Condorcet criterionCondorcet criterion — If a candidate beats every other candidate in pairwise comparison, does that candidate always win? Arrow’s Impossibility Theorem

CSC 382/582: Computer SecuritySlide #9 Indirect Elections Plurality in state select electors Winner takes all in most states Majority of electoral vote wins Congress selects if no majority 2004 Population cartogram 286 (Bush)-251 (Kerry) 2004 Electoral College Map Bush (red), Kerry (blue)

CSC 382/582: Computer SecuritySlide #10 Voting Details

CSC 382/582: Computer SecuritySlide #11 History of Voting Voice Voting Ballots: black pebble, white pebble Paper Ballots Australian Paper Ballot Lever Voting Machines Punched Card Optical Scanner DRE Machines

CSC 382/582: Computer SecuritySlide #12 Types of Electronic Voting Paper-based voting –Computer marks paper ballots, which are counted. Direct-recording electronic (DRE) –Records vote count electronically. Networked DRE –Uploads vote count electronically. –Includes Internet voting.

CSC 382/582: Computer SecuritySlide #13 Advantages of e-voting Accessibility Cheaper per election costs due to no paper –Multi-lingual ballots Speed of tabulation Remote voting

CSC 382/582: Computer SecuritySlide #14 Disadvantages of e-voting Voters could be tracked Lack of reliability Lack of verification Lack of transparency Undetectable fraud (Rice’s theorem) Wholesale fraud

CSC 382/582: Computer SecuritySlide #15 Are Voting Machines Reliable? Columbus, OH – An error while a Danaher / Guardian ELECTronic 1242 was plugged into a laptop to download results gave President Bush 3,893 extra votes.: ohio-evote-trouble_x.htmhttp:// ohio-evote-trouble_x.htm Carteret Co., NC – More early voters voted on Unilect Inc.’s Patriot voting system than the system could handle resulting in the loss of more than 4,500 votes.: lost_x.htm lost_x.htm Broward Co., FL – ES&S software on their machines only reads 32,000 votes at a precinct then it starts counting backwards (see this update): update Mecklenburg Co., NC – More votes registered than voters: LaPorte County, IN - A bug in ES&S’ software causes each precinct to be reported as only having (exactly) 300 voters each; all reports add up to 22,000 voters in a county that has more than 79,000 registered voters.: Utah County, UT - 33,000 straight-party ballots are not counted due to a programming error in punchcard counting equipment.:

CSC 382/582: Computer SecuritySlide #16 Are Voting Machines Secure? “As long as I count the votes, what are you going to do about it?” –William Marcy “Boss” Tweed, 1871

CSC 382/582: Computer SecuritySlide #17 Diebold BallotStation 1.Setup –D/L ballot setup 2.Pre-Election –L&A testing 3.Election –Voting 4.Post-Election –Print result tape –Transfer votes

CSC 382/582: Computer SecuritySlide #18 Attack Scenarios Transferring Votes –Transfer vote from one candidate to another. –Leaves total number of votes unchanged. Denial of Service –Target precinct that votes for opponent. –Malware shuts down or wipes machine. –Forged administrative smartcard attack.

CSC 382/582: Computer SecuritySlide #19 Injecting Attack Code Direct installation –Replace EPROM. –Exploit backdoor to install from smartcard. –Reboot using smartcard with botloader. –Voting machines use standard minibar keys. Virus –Infects memory cards. –Memory cards infect machines on boot. –Software upgrades delivered via memory cards.

CSC 382/582: Computer SecuritySlide #20 Concealing Voting Malware Timing –Software only active in Election mode. –Software only active on certain dates / times. Knock –Software actives only after secret “knock” given. Hiding processes and files –Rootkit techniques –Virtualization

CSC 382/582: Computer SecuritySlide #21 Mitigating Attacks Be like an XBox. Digital signatures for software updates Securing audit logs and counters –Specialized hardware –Cryptographic techniques Chain of custody for memory cards Voter verifiable paper trail

CSC 382/582: Computer SecuritySlide #22 References 1.Caltech/MIT Voting Project, “Residual Votes Attributable to Technology,” rch=%22mit%20caltech%20uncounted%20ballots%22, rch=%22mit%20caltech%20uncounted%20ballots%22 2.“More e-voting problems,” December 12, Ariel J. Feldman, J. Alex Halderman, Edward W. Felten, “Security Analysis of the Diebold AccuVote-TS Voting Machine,” Sep 13, Douglas Jones, “Illustrated Voting Machine History,” Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, Dan S. Wallach, “Analysis of an Electronic Voting System,” IEEE Symposium on Security and Privacy, Oakland, CA, May, Mark Newman, “Election Result Maps,” personal.umich.edu/~mejn/election/, personal.umich.edu/~mejn/election/ 7.Avi Rubin, Brave New Ballot, Morgan Road Books, Kim Zetter, “House Dems seek Election Inquiry,” Nov 5,