the risks of electronic voting

42
The Risks of Electronic Voting Dan Wallach Rice University Collaborators: Tadayoshi Kohno (UCSD) Aviel D. Rubin (Johns Hopkins) Adam Stubblefield (Johns Hopkins)

Upload: others

Post on 30-May-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Risks of Electronic Voting

The Risks of Electronic VotingDan WallachRice University

Collaborators: Tadayoshi Kohno (UCSD)Aviel D. Rubin (Johns Hopkins)Adam Stubblefield (Johns Hopkins)

Page 2: The Risks of Electronic Voting

Perception vs. realityVoter feels that

Vote was countedVote was privateNobody else can vote more than onceNobody can alter others’ votes

People believe that the machine works correctly These have to do with perception

It is also important that these perceptions are true.

Perception vs. reality

Page 3: The Risks of Electronic Voting

Human factors issues

Page 4: The Risks of Electronic Voting

Mechanical flaws

BushGore

BushGore

Page 5: The Risks of Electronic Voting

Ugly failure modes

Ballot stuffingAbsentee (mail-in) votes from deceased voters100% of votes in Oregon are mail-in!

Post-election ballot tamperingFraudulent behavior by election officials

Bribery or coercion

Page 6: The Risks of Electronic Voting

Traditional anonymous voting

One paper card per office, list of candidates

Easy to count (just make two piles)Easy to recountUsed in most countries

Page 7: The Risks of Electronic Voting

Mechanical voting systemsOdometer-style rotors inside

Hidden during electionVisible after election

Post-election…Machines impoundedCan be inspected for fraud

Page 8: The Risks of Electronic Voting

Optical scan systemsBetter than punch cards

TransparencySimplicityAccuracyAuditability

Page 9: The Risks of Electronic Voting

What about e-voting?

Several different formsInternet voting (used on many college campuses)Computerized voting machines (DRE)

Page 10: The Risks of Electronic Voting

Obvious benefitsBetter human factors

Can check for “overvoting”Can review for mistakesAccessible interfaces (no need for helpers)

It’s newNo antiquated machineryNon-traditional election styles

Condorcet voting, approval voting, IRV, etc.

Page 11: The Risks of Electronic Voting

Obvious flaws

Indication to voter that vote is recorded?

No paper to drop in ballot box

Why should you trust that the computer worked?

No voter-visible evidence

Page 12: The Risks of Electronic Voting
Page 13: The Risks of Electronic Voting

Accuracy of voting systemsCalifornia recall election (October 2003), residual vote rate

Percentage of “incomplete” / undervoted ballots (source: Rebecca Mercuri)

0

1

2

3

4

5

6

7

8

9

Punch

card

Datavo

tePoll

star

Votomati

cOpti

cally

Scann

edES&S E

agle

Diebold

Acc

u-Vote

-OS

ES&S 550 a

nd 56

0Mark

-A-V

ote

Sequo

ia Opte

chTou

chsc

reen

Diebold

Acc

u-Vote

-TS

Sequo

ia Edg

e

ES&S iVotr

onic

Statew

ide

Res

idua

l Vot

e R

ate

(Per

cent

) .

Page 14: The Risks of Electronic Voting

Reliance on certification

Independent Testing AuthoritiesAllowed to see the code

Nobody else can lookCertify satisfaction of FEC standardsRequired by many states

Result: “Faith-based voting”

Page 15: The Risks of Electronic Voting

Hacked voting machines?

Can a DRE system employee throw the election?

Is it technically feasible?Yes

Would there be any evidence?Probably not

“Logic and accuracy tests”?Easily faked

Page 16: The Risks of Electronic Voting

Trust issues

All code must be correctNo fall-back position if code is buggy

No independent verification that code works

Should voting machines be closed source?

Alternative: Government pays for 3rd

party developerGive source code away to everybody (Australia)

Page 17: The Risks of Electronic Voting

TCB: Optical scan vs. DRE

DRE has a much larger TCBIn-house software developersPre-election storage of machinesPre or post-election manipulation of storage cards

Hand recounting removes software from TCB

Page 18: The Risks of Electronic Voting

How to build e-voting correctly

Option 1: Print onto plain paperDeposit inballot boxAccessibleinterfaceInside: normalinkjet printer

(AccuPoll AVS1000)

Page 19: The Risks of Electronic Voting

How to build e-voting correctly

Option 2: Print onto existing optical-scan ballots

AccessibleinterfaceOnly needone perprecinct

(ES&S Automark)

Page 20: The Risks of Electronic Voting

Mercuri MethodOption 3: Ballot under glass

Voters cannottouch paper

Cancelled inBrazilSuccessful inNevadaprimary

(Brazilian urnas)

Page 21: The Risks of Electronic Voting

Benefits of a hybrid systemHuman factors benefits via computer inputFast computer counting

“Estimated results”Useful re-counting

Computer (OCR)Human

No vendor trust needed

No vendor lock-inStandardize cards, fonts, etc.

Page 22: The Risks of Electronic Voting

Track Record for DRE in U.S.?Diebold AccuVote-TS Adopted by Georgia for Nov. 2002 election

But then something interesting happened…

Page 23: The Risks of Electronic Voting

Bev Harris’ findingsMarch 18, 2003: Bev Harris

announces:Open FTP site from Diebold with many GB of data

Source code, sample ballots, etc.

July 8, 2003: Security holes with GEMS

Uses Microsoft AccessAudit logs can be bypassedAll users have the same password

If it’s online, it’s editable by anybody

Page 24: The Risks of Electronic Voting

Our findings

Smart card issuesIncorrect use of cryptographyGeneral software engineering notes

Page 25: The Risks of Electronic Voting

Smart cardsVoting terminals are offline during the electionVoter gets “voter card”after authenticationInsert cardVoteMachine cancels card

Other cards“Ender card”Administrator card

Page 26: The Risks of Electronic Voting

Diebold’s smart card protocol

My password is (8 bytes)

Terminal Card“Okay”

Are you valid?

“Yup”

Cancel yourself, please.

“Okay”

Page 27: The Risks of Electronic Voting

Administrator cards

Administrator / ender cards require a PIN

End electionPrint recordsEtc.

Page 28: The Risks of Electronic Voting

Administrator card protocol

What kind of card are you?

Terminal Card“Administrator”

What’s the secret PIN?

“1234”

What’s the secret PIN?

“1234”

Page 29: The Risks of Electronic Voting

Malicious poll workers?Private access to voting machines / storage cards?Before election, rearrange the order of the candidates

Votes are recorded by their order, not by nameCandidate #1 got 5 votesCandidate #2 got 3 votes

Change the order change who gets creditedCome back at the end of the day to fix it

Voting machines can never be left alone!

Page 30: The Risks of Electronic Voting

Cryptography

After election is closed, voting terminals phone home

Fast “preliminary” tabulation of voting results

Data also hand-carried via memory card

Encryption to protect data confidentiality…

Page 31: The Risks of Electronic Voting

How not to encrypt data#define DESKEY ((des_key*)"F2654hD4")

One key for every voting machine, everywhereDoug Jones (Iowa official) found this in 1997!

Bug still exists in early 2004Fixed now?

Page 32: The Risks of Electronic Voting

How else not to encrypt dataDesCBCEncrypt((des_c_block*)tmp, (des_c_block*)record.m_Data, totalSize, DESKEY, NULL, DES_ENCRYPT);

Initialization vector is always zeroEncryption is deterministicVulnerable to chosen-plaintext attacks

Page 33: The Risks of Electronic Voting

If the crypto fails…Plaintext data has votes in the order they were cast

Trace votes to who cast themVote buying / voter coercion is now possible

Active adversary can modify the dataConfuse preliminary totalsThreat to storage cards (in transit and post-delivery)

Page 34: The Risks of Electronic Voting

Software engineering

Software written in C++, runs on WinCE

Some effort to prevent buffer overflowsIn public filings, Diebold has admitted problems

Page 35: The Risks of Electronic Voting

Software processAssorted bad practices

#ifdef 0 / #ifdef XXX / #ifdef LOUISIANA

Poor documentationNo evidence of (useful) high-level design docs

Nothing checked into the archiveNo comments quoting from design docs

Some quotes from algorithms textbooksNumerous complex functions without comments

Code quality well below any “high assurance”system

Page 36: The Risks of Electronic Voting

ThoughtsOur democracy is depending on these machines!

Election officials rely on independent testing authoritities (ITAs)

Diebold certified despite its poor designRaises questions about other vendors

Vendors don’t understand computer securityFeatures vs. security

Adding wireless capabilities to voting terminals?

Page 37: The Risks of Electronic Voting

Impact of our workOur results confirmed by several independent studiesCalifornia, Nevada, some others will require voter-verifiable audit trailsHolt bill pending in U.S. Congress (H.R. 2239)

Requires voter-verifiable audit trailU.S. military cancelled SERVE

Paperless, Internet-based voting system

Page 38: The Risks of Electronic Voting

What you can doThink globally, act locally

Every state is differentOften, every county is different

Read any policy & procedure docsMachine storage & maintenanceOffer to help improve policies

Be an election judgeGet to know your representativesVote!

Page 39: The Risks of Electronic Voting

If they’re still using DREs

Leadership Council on Civil Rights/ Brennan Center Report (www.civilrights.org)

Recommendations for Nov. 2004Independent auditsBetter policies and proceduresParallel testingEtc.

Page 40: The Risks of Electronic Voting

ConclusionPaperless DRE voting systems are unacceptable

“Security through obscurity” arguments are fallaciousIndependent certification is (currently) meaninglessBest today: precinct-based optical scan

Our next election will work perfectly.How will you know?

Page 41: The Risks of Electronic Voting

Further readingOur study of Diebold’s systemhttp://avirubin.com/vote/

More about voter-verifiable audit trailshttp://www.verifiedvoting.org/

See also, Bev Harrishttp://www.blackboxvoting.org

Page 42: The Risks of Electronic Voting