Security flaws of the existing electronic voting systems

advertisement
Security flaws of existing electronic voting
systems
by Slavik Krassovsky
Introduction
In the “Help America Vote Act” which was passed in 2002 US Congress appropriated
$3.9 billion to establish a program to help individual states replace punch card voting
systems with a modern age technology.
In many states, the natural choice for the replacement was Direct Recording Electronic or
DRE, a type electronic voting system that already existed on the market and was
produced by several vendors: ES&S, MicroVote, WINvote, Sequoia, Hart InterCivic,
Diebold and such.
Federal act mandates that machines are only allowed to be used for elections, when
certified by independent testing authorities, which should, at least on paper, make sure
that they are secure.
Today millions of people vote on DRE systems every year thus entrusting the democratic
process to these machines. Nevertheless numerous security experts raise concerns about
DREs. In this paper we’ll discuss how these machines are built, overview the problems
encountered so far with these machines as well as review security attacks on such
machines.
Architecture of a typical DRE machine
Typical DRE machines have flat panel display screen with touch-screen input, smart card
reader that allows distinguishing one voter from another (voters receive a smart card
when they come to the polling station and return it once they’ve done voting) and a hard
drive that contains ballot definition and votes audit log. Ballot definitions could be
downloaded either from a floppy/flash memory or from a network. After the voting day is
over the results could be uploaded to a central server for final tabulation.
Network
Touch Screen
Voter
Smart Card Reader
HardDrive
Typical cost of such a system is estimated to be around $8000 per voting station.
Certification process
Machines are tested and certified by three private companies - Ciber, Wyle, and SysTest
– which are referred to as Independent Testing Authorities (ITAs). The ITAs are certified
by the National Association of State Election Directors, but are not subjected to any
government oversight. Individual states may have additional requirements that are
certified by the ITAs. Vendors that produce the machines, pay for all testing.
The first Federal Election Commission (FEC) standard for electronic voting machines,
issued in 1990, was replaced with a newer standard of 2002, however many voting
systems in use today were certified to the 1990 standards.
In any case off-the-shelf hardware and software (i.e. common motherboards or Windows
OS) are exempt from the certification process.
The certification results are not being made public presumably due to intellectual
property concerns.
Reported problems
Although there is no central authority that keeps track of voting equipment problems,
evidence of security, software or hardware problems were reported in the media, here are
some examples:
January 2004, Broward County, Florida:
134 out of 10,844 votes cast on a ballots with a single contest were missing. It was
particularly disturbing, since the winning candidate won by only 12 votes and there was
no way of telling if some had been lost by the ES&S DRE system that was employed.
November 2005.Alameda County CA. Touch screen voting machines switched votes on
statewide propositions.
November 2003, Boone County, Indiana:
over 144,000 votes were cast even though Boone County contains fewer than 19,000
registered voters. Of those, only 5,532 actually voted. The county clerk stated that the
problem was caused by a “glitch in the software.”
November 2003, Hinds County, Mississippi:
in, voters arrived to find the WINvote DREs at the polls were down and stayed down for
the rest of the day.
Numerous other machine malfunction problems are listed here:
http://www.votersunite.org/electionproblems.asp?sort=date&selectstate=ALL&selectpro
blemtype=Machine+malfunction
Perhaps the most illustrious example of the problems was the discovery of Diebold
voting machine software on an open FTP website. Tadayoshi Kohno at al subsequently
analyzed that software and published a security analysis in a paper. Numerous problems
were reported in the analysis, such as single hardcoded DES key to encrypt all of the data
on a storage device, usage of DES itself, absence of secure smart card authentication.
Further reports of the system found even more vulnerabilities such as hard coded pin of
election official’s smart card.
All in all there is reasonable evidence that would fortify an assertion that certification
process is not capable of detecting all software flaws.
Attacks
Various components of the system could be subjected by an attack from a number of
parties: malicious voters, members of the polling station staff, outside hackers.
Here we’ll list some of more important attacks and give examples of what could be done:
1. Attacks on a smart card, smart card <-> voting station interface protocol
If properly designed, smart cards are powerful security instruments. In some cases (Diebold is the
prime example), smart cards could be an entry point of an attack. Because of a lack of
cryptography, there was no secure authentication of the smartcard to the voting station employed.
i.e. there is no mechanism to prevent a user to use his/her own smartcards to vote multiple times.
2. Attack on the harddrives capabilities
Machine’s hard drives could be subjected to tampering by someone who have access to the
physical machines prior or after the elections. In case of Diebold the data on the harddrive was
encrypted but by a single well-known company wide key.
3. Attack on the network capabilities of the system
Variety of avenues here – one being producing a malicious voting station that would report the
result to the tabulating authority after the vote day is over.
4. Insert backdoors into code attacks
This could be done by someone from the poll crew or even someone who works for the company
that produces DREs. Although certification process allows code reviews it’s still conceivably
possible to hide a piece of malicious code that is difficult to spot.
5. Insert backdoors into OS/hardware, compiler/linker/loader – other development software.
Since these pieces are not even analyzed by ITAs, this constitutes a conceivable vector of attack.
Table 1: lists attacks summarized by researches who analyzed the Diebold system:
Conclusion
There are a great number of concerns regarding the DREs such as:
- Voters have no way to verify that their votes were recorded correctly.
- There is no way to publicly count the votes.
- Meaningful recounts are impossible.
- Certification process does not work, as we see on the example of Diebold.
- Other vendors do not expose their machines for public scrunity.
- DREs are vulnerable to undetectable rigging.
Some of these concerns could be alleviated by more strict certification process, but some,
for example public recounts are not even allowed by the design or cost-effective to
implement (for example it is inconceivable to review the source code Windows OS by an
ITA at a reasonable cost). That suggests that DREs are inherently unsecure and it’s
prudent to employ other alternatives.
References
[1] A. Keller, D. Mertz, J. Hall, and A.Urkin. Privacy issues in an electronic voting
machine.
http://gnosis.cx/publish/voting/privacy-electronic-voting.pdf
[2] Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S.Wallach. Analysis
of an electronic voting system. In IEEE Symposium on Security and Privacy, pages
27–40, May 2004.
http://avirubin.com/vote.pdf
[3] Diebold Inc, Checks and balances in elections equipment and procedures
prevent alleged fraud scenarios, July 30, 2003
http://www2.diebold.com/checksandbalances.pdf
[4] Tadayoshi Kohno, Adam Stubblefield, Aviel D. Rubin, and Dan S.Wallach. Response
to Diebold's Technical Analysis, 2003. http://avirubin.com/vote/response.html
[5] Paul Kocker and Bruce Schneier. Insider risks in elections.
http://www.ece.cmu.edu/~adrian/630-f05/readings/insiderRisks-kocher-schneier.pdf
[6] David Jefferson, Aviel D. Rubin, Barbara Simons, David Wagner. A Security
Analysis of the Secure Electronic Registration and Voting Experiment (SERVE)
http://www.servesecurityreport.org/paper.pdf
[7] J. Schwartz. Defense Dept. Cancels Use of Internet Voting Project (NYT article)
http://www.nytimes.com/2004/02/05/politics/campaign/05CNDVOTE.html?ex=1141794000&en=479a1c9f9e1ee134&ei=5070
[8] Brad Arkin. Securing the eSlate Electronic Voting System
http://www.hartic.com/files/HART_SYMANTEC_SECURITY_REPORT_White_Paper.
pdf
[9] Francis Petruziello. Ney says HAVA solves election problems (newspaper article)
http://www.csuohio.edu/clevelandstater/glance/glance1.html
[10] Rebecca Mercuri, Critique of "Analysis of an Electronic Voting System" document.
http://www.notablesoftware.com/Papers/critique.html
[11] Private communication with Josh Benaloh, 2006.
[12] Aviel D. Rubin. Testimony, U.S. Election Assistance Commission. 2004
http://avirubin.com/eac.pdf
[13] Aviel D. Rubin. Testimony, U.S. Election Assistance Commission. 2005
http://avirubin.com/eac2.pdf
[14] CBS show 60 Minutes. October 27, 2004
http://avirubin.com/vote/60minutes.mov
[15] Avi Rubin. Can a Voting Machine that is Rigged for a Particular Candidate Pass
Certification?
http://avirubin.com/vote/ita.challenge.pdf
[16] Help America Vote Act of 2002, Public Law 107-252
http://www.fec.gov/hava/hava.htm
Download