56
Electronic Voting: Danger and Opportunity J. Alex Halderman Department of Computer Science Center for Information Technology Policy Princeton University

Electronic Voting: Danger and Opportunity

  • Upload
    kishi

  • View
    33

  • Download
    0

Embed Size (px)

DESCRIPTION

Electronic Voting: Danger and Opportunity. J. Alex Halderman Department of Computer Science Center for Information Technology Policy Princeton University. Joint work with …. Joe Calandrino. Ari Feldman. Ed Felten. 2000 Recount Debacle Legislative response: Help America Vote Act - PowerPoint PPT Presentation

Citation preview

Page 1: Electronic Voting: Danger and Opportunity

Electronic Voting:Danger and Opportunity

J. Alex Halderman

Department of Computer ScienceCenter for Information Technology Policy

Princeton University

Page 2: Electronic Voting: Danger and Opportunity
Page 3: Electronic Voting: Danger and Opportunity

Joint work with …

Joe Calandrino Ari Feldman Ed Felten

Page 4: Electronic Voting: Danger and Opportunity
Page 5: Electronic Voting: Danger and Opportunity

2000 Recount Debacle

Legislative response:Help America Vote Act

Provided $3.9 billion to statesto upgrade voting machines by November 2006

Page 6: Electronic Voting: Danger and Opportunity

DREs to the Rescue?

Direct Recording Electronic – Store votes in internal memory

Page 7: Electronic Voting: Danger and Opportunity

DREs are Computers

BugsRootkits

VirusesAttacks

=

Page 8: Electronic Voting: Danger and Opportunity
Page 9: Electronic Voting: Danger and Opportunity
Page 10: Electronic Voting: Danger and Opportunity

Diebold’s History of Secrecy

• Prevented states from allowing independent security audits – hid behind NDAs, trade secret law

• Source code leaked in 2003, researchers at Johns Hopkins found major flawsDiebold responded with vague legal threats,personal attacks, disinformation campaign

• Internal emails leaked in 2003 reveal poor security practices by developersDiebold tried to suppress sites with legal threats

Page 11: Electronic Voting: Danger and Opportunity

We Get a Machine(2006)

Obtained legally from an anonymous private party

Software is 2002 version, but certified and used in actual elections

First complete, public, independent security audit of a DRE

Page 12: Electronic Voting: Danger and Opportunity

Research Goals• Conduct independent security audit• Confirm findings of previous researchers

(Hursti, Kohno et al.)

• Verify threats by building demonstration attacks• Figure out how to do better

Who wants to know? Voters, candidates, election officials, policy makers, researchers

Page 13: Electronic Voting: Danger and Opportunity

16 MB Flash

128 KB EPROM

SH3CPU

32 MBRAM

2 PCMCIA Slots

Boot Jumper Table

Page 14: Electronic Voting: Danger and Opportunity
Page 15: Electronic Voting: Danger and Opportunity

Software Problems

One Example:

DES-CBCK(BallotID:VoteBitmap), CRC-16(…)

Page 16: Electronic Voting: Danger and Opportunity

Our Findings

• Malicious software running on the machine can steal votes undetectably, altering all backups and logs

[Feldman, Halderman & Felten 2007]

Page 17: Electronic Voting: Danger and Opportunity

Correct result: George 5, Benedict 0

Page 18: Electronic Voting: Danger and Opportunity
Page 19: Electronic Voting: Danger and Opportunity
Page 20: Electronic Voting: Danger and Opportunity

Our Findings

• Malicious software running on the machine can steal votes undetectably, altering all backups and logs

• Anyone with physical access to the machine or memory card can install malicious code in as little as one minute

[Feldman, Halderman & Felten 2007]

Page 21: Electronic Voting: Danger and Opportunity
Page 22: Electronic Voting: Danger and Opportunity

The Key

Page 23: Electronic Voting: Danger and Opportunity
Page 24: Electronic Voting: Danger and Opportunity

Our Findings

• Malicious software running on the machine can steal votes undetectably, altering all backups and logs

• Anyone with physical access to the machine or memory card can install malicious code in as little as one minute

• Malicious code can spread automatically and silently from machine to machine in the form of a voting machine virus

[Feldman, Halderman & Felten 2007]

Page 25: Electronic Voting: Danger and Opportunity

Voting Machine Virus

Page 26: Electronic Voting: Danger and Opportunity

Viral Spread

Page 27: Electronic Voting: Danger and Opportunity
Page 28: Electronic Voting: Danger and Opportunity

Joe Calandrino Ari FeldmanBill Zeller Harlan YuAlex Halderman

Debra Bowen

California “Top-to-Bottom” Study

Page 29: Electronic Voting: Danger and Opportunity

Hart Sequoia Diebold

California “Top-to-Bottom” Results

Page 30: Electronic Voting: Danger and Opportunity
Page 31: Electronic Voting: Danger and Opportunity

WHAT TO DO?

Page 32: Electronic Voting: Danger and Opportunity

Voters prefer it

Faster reporting

Fewer undervotes

Improved accessibility

Potentially increased security*

E-Voting Advantages

Page 33: Electronic Voting: Danger and Opportunity

WE CAN DO BETTER!

Page 34: Electronic Voting: Danger and Opportunity

Electronic + Paper Records

Touch-screen (DRE) machine,plus voter-verifiable paper trail

Hand-marked paper ballot,machine-scanned immediately

Page 35: Electronic Voting: Danger and Opportunity

Failure Modes

Paper BallotsPhysical tampering“Retail” fraudAfter the election

Redundancy + Different failure modes = Greater security

Electronic RecordsCyber-tampering“Wholesale” fraudBefore the election

But…Redundancy only helps if we use both records!

Page 36: Electronic Voting: Danger and Opportunity

How to Use Paper Records?

Use a machine to count the paper records

Count all the paper records by hand

Check a random subset of paper records by hand…but which subset?

Too risky

Too expensive

Page 37: Electronic Voting: Danger and Opportunity

Standard Approach

Pick some precincts randomly.Hand-count paper records.

Should match electronic records.

Page 38: Electronic Voting: Danger and Opportunity

Statistical Auditing’s Goal

Establish, with high statistical confidence, that hand-counting all of the paper records would yield the same winner as the electronic tally.

Page 39: Electronic Voting: Danger and Opportunity

Audit Example

Alice: 55%Bob: 45% Goal: Reject hypothesis that

≥ 5% of ballots differ between electronic and paper

For 95% confidence, hand-audit 60 precincts

Cost: about $100,000

Page 40: Electronic Voting: Danger and Opportunity

An Alternative Approach

Precinct-based auditing

Ballot-based auditing

Page 41: Electronic Voting: Danger and Opportunity

100 marbles, 10% blue 6300 beads, 10% blue

How large a sample do we need?

Page 42: Electronic Voting: Danger and Opportunity

Audit Example

Alice: 55%Bob: 45% Goal: Reject hypothesis that

≥ 5% of ballots differ between electronic and paper

For 95% confidence, hand-audit 60 precincts

Cost: about $100,000

ballots

$1,000

Page 43: Electronic Voting: Danger and Opportunity

Why Not Ballot-based?

VotingMachine

AliceBobAlice

● Alice○ Bob

○ Alice● Bob

● Alice○ Bob

Need to match up electronic with paper ballots.

Compromises the secret ballot!

Page 44: Electronic Voting: Danger and Opportunity

Secret BallotPrevents coercion and vote-buying

Requirements: Nobody can tell how you voted. You can’t prove to anyone how you voted. You can be confident in these properties.

Page 45: Electronic Voting: Danger and Opportunity

Serial Numbers

VotingMachine

1 Alice2 Bob3 Alice

1● Alice○ Bob

2○ Alice● Bob

3● Alice○ Bob

Page 46: Electronic Voting: Danger and Opportunity

“Random” Identifiers

VotingMachine

325631 Alice218594 Bob810581 Alice

325631● Alice○ Bob

218594○ Alice● Bob

810581● Alice○ Bob

Page 47: Electronic Voting: Danger and Opportunity

Machine-Assisted Auditing

[Calandrino, Halderman & Felten 2007]

=

○ Alice● Bob1

1 Bob2 Alice...929 Bob

Alice: 510Bob: 419

○ Alice● Bob

Step 1. Check electronic records against paper recordsusing a recount machine.

Page 48: Electronic Voting: Danger and Opportunity

Machine-Assisted Auditing

[Calandrino, Halderman & Felten 2007]

=

○ Alice● Bob1

1 Bob2 Alice...929 Bob

Alice: 510Bob: 419

○ Alice● Bob

Page 49: Electronic Voting: Danger and Opportunity

=

321 Bob716 Alice

Machine-Assisted Auditing

[Calandrino, Halderman & Felten 2007]

○ Alice● Bob1

1 Bob2 Alice...929 Bob

=

○ Alice● Bob321

● Alice○ Bob716

○ Alice● Bob1

Step 2. Audit the recount machine by selecting random ballots for human inspection.

Page 50: Electronic Voting: Danger and Opportunity

We can use a machinewithout having to trust it!

Machine-Assisted Auditing

As efficient as ballot-based auditing,while protecting the secret ballot.

Machine Recount Manual Audit

Page 51: Electronic Voting: Danger and Opportunity

Doing Even Better

Key idea: Probability of auditing a ballot should depend on how that ballot is marked

Full algorithm accounts for:multi-candidate racesmulti-seat racesundervotes and overvoteswrite-ins

Page 52: Electronic Voting: Danger and Opportunity

Doing Even Better

Alice: 55%Bob: 45%

Goal: Reject hypothesis that ≥ 5% of ballots differ between electronic and paper

Goal: Reject hypothesis that ≥ 5% of ballots are marked electronically for Alice but on paper for Bob.

Only need to audit ballots marked for Alice.

Page 53: Electronic Voting: Danger and Opportunity

Evaluation

2006 Virginia U.S. Senate race0.3% margin of victoryWe want 99% confidence

Precinct-

basedMachine-assisted

Content-sensitive

# ballots 1,141,900 2,339 1,179 # precincts 1,252 1,351 853

Page 54: Electronic Voting: Danger and Opportunity
Page 55: Electronic Voting: Danger and Opportunity

Electronic Voting:Danger and Opportunity

J. Alex Halderman

Department of Computer ScienceCenter for Information Technology Policy

Princeton University

Page 56: Electronic Voting: Danger and Opportunity

Proposed Legislation

H.R. 811: Voter Confidence and Increased Accessibility Act

• Voter-verifiable paper record and random manual audits

• Access to voting software and source code, to verify security

• Additional money for states

Rep. Rush Holt