Upload
marina-sarson
View
216
Download
0
Tags:
Embed Size (px)
Citation preview
VoTeR Center University of Connecticut
Pre-Election Testingand
Post-Election Audit of Optical Scan Voting Terminal
Memory Cards
Pre-Election Testingand
Post-Election Audit of Optical Scan Voting Terminal
Memory Cards
Voting Technology Research (VoTeR) CenterDepartment of Computer Science and Engineering
University of Connecticuthttp://voter.engr.uconn.edu
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas Nicolaou, Alexander Russell, Narasimha Shashidhar,
Andrew See, Alexander A. Shvartsman
Work funded by the Connecticut Secretary of the State Office
Voting Technology Research (VoTeR) CenterDepartment of Computer Science and Engineering
University of Connecticuthttp://voter.engr.uconn.edu
Seda Davtyan, Sotiris Kentros, Aggelos Kiayias, Laurent Michel, Nicolas Nicolaou, Alexander Russell, Narasimha Shashidhar,
Andrew See, Alexander A. Shvartsman
Work funded by the Connecticut Secretary of the State Office
VoTeR Center University of Connecticut
OutlineOutline
• Motivation
• Introduction
• Goals of the Memory Card Audit
• AccuVote OS
• AV-OS Software Components
• Auditing Process
• Results and Observations
• Conclusion
2
VoTeR Center University of Connecticut
MotivationMotivation• In a recent primary in an unnamed state there
was a mix of hand-counted and machine-counted precincts
• It was observed that in hand-counted precinct Candidate A was favored by the voters, while in optical-scan tabulated precincts Candidate B was favored
• There were sensible demographic reasons for this
• Nevertheless, a valid question was asked: Were the voting machines programmed correctly?
• The state officials did not have an answer3
VoTeR Center University of Connecticut
MotivationMotivation• The machine in question is Premier’s Accu-Vote
Optical Scan tabulator
• Provides inherent VVPB/VVPAT
• Not the “bleeding edge” machine – relatively few attack vectors
• But:
• [Hursti’05] Memory cards are easy to tamper with if removed from the tabulator
• [EVT’07] Memory cards are easy to tamper with if sealed in the tabulator
• Reports by other workers and CA, CT, FL, AL,…
• Tests/audits of equipment/technology are necessary
4
VoTeR Center University of Connecticut
AccuVote OS (AV-OS)AccuVote OS (AV-OS)
• AV-OS Firmware version 1.96.6• Memory cards programmed on GEMS 5
VoTeR Center University of Connecticut
Process in ConnecticutProcess in Connecticut
Ballot information for a district
Memory cardsprogrammed using GEMS
(at LHS Associates)
Cards insertedand tested
at the district
Cards usedin the electionat the district
Cards shipped
VoTeR Center University of Connecticut
Goals of the Memory Card AuditGoals of the Memory Card Audit
• Pre-election Memory Card Audit
• Perform an integrity check of the contents of the memory cards
• Post-election Memory Card Audit
• Integrity check of contents
• State of cards consistent with election use
7
VoTeR Center University of Connecticut
OutlineOutline
• Motivation
• Introduction
• Goals of the Memory Card Audit
• AccuVote OS
• AV-OS Software Components
• Auditing Process
• Results and Observations
• Conclusion8
VoTeR Center University of Connecticut
AV-OS Software ComponentsAV-OS Software Components
• The behavior of AV-OS is determined by two components:
• AV-OS Firmware
• Data and program on Memory Card
• Memory Card includes:
• Status Information
• Audit Log
• Ballot Description
• Counters
• Bytecode
9
VoTeR Center University of Connecticut
OutlineOutline
• Motivation
• Introduction
• Goals of the Memory Card Audit
• AccuVote OS
• AV-OS Software Components
• Auditing Process
• Results and Observations
• Conclusion10
VoTeR Center University of Connecticut
Auditing ProcessAuditing Process
• Preparation for audit
• Analysis of the AV-OS firmware, development of custom firmware, a data collection and comparison tool, and analysis of the bytecode
• The auditing process
• Data collection from memory cards
• Analysis of the data
11
VoTeR Center University of Connecticut
Contractual IssuesContractual Issues
• Contract between Premier and State of CT
• Prohibits “reverse engineering”, “de-compilation”, “re-assembly”, etc.
• One exception: Contract permits modification/alteration of software/firmware to “display” data “related to election results”
• We used this exception to perform engineering to understand the format of memory cards and to extract this data using special purpose firmware we designed
12
VoTeR Center University of Connecticut
Custom FirmwareCustom Firmware
• Custom firmware was developed to resolve major issues in using the built-in dumping procedure of AV-OS:
• Relying on the undocumented built-in procedure is questionable
• Avoid altering card contents (audit log)
• Ensure faithful reading of contents
• Speeding up memory card dumping
13
VoTeR Center University of Connecticut
Custom Firmware DevelopmentCustom Firmware Development
• Four main point were considered during the production of new firmware:
• Memory Card Access
• Serial Port Access
• Delivery of the Memory Card data
• Avoid any logging on the memory card
(Technical details in the full paper)
14
VoTeR Center University of Connecticut
Format of the Memory CardFormat of the Memory Card
• Epson 128K card
• Our analysis revealed the following formatting of the memory cards
15
VoTeR Center University of Connecticut
Data Collection ToolData Collection Tool
• The Data Collection/Comparison tool serves two purposes:
• Collecting the memory card dump sent using run length encoding
• Auditing the collected data by comparing baseline and audit data and analyzing the differences
16
VoTeR Center University of Connecticut
Testing MethodologyTesting Methodology
• Testing for potential data inconsistencies and integrity problems of the memory cards requires collection of three types of data:
• Baseline Data
• Pre-Election Data
• Post-Election Data
17
VoTeR Center University of Connecticut
State of the Memory CardState of the Memory Card
• Memory card examination focused on:
• Card Format (data and byte code)
• Card Status (set for election, etc.)
• Counter Status (zero / non-zero)
• Election Count (usage)
• Audit Log
18
VoTeR Center University of Connecticut
State DiagramState Diagram
• State transitions for a memory card
19
VoTeR Center University of Connecticut
OutlineOutline
• Motivation
• Introduction
• Goals of the Memory Card Audit
• AccuVote OS
• AV-OS Software Components
• Auditing Process
• Results and Observations
• Conclusion20
VoTeR Center University of Connecticut
Results and ObservationsResults and Observations
• Pre-election audit performed on 522 memory cards
• Covers 75% of all districts
• 378 out of 522 memory cards were received prior to the election, the rest later
• Post-election audit was performed on 100 cards
• Partial audit en route to future broader audits
• 36 out of 100 memory cards were used during the election
• Represents > 5% of the cards used in election21
VoTeR Center University of Connecticut
Pre-Election Sampling IssuesPre-Election Sampling Issues
• A few differences between the procedures followed by the poll workers and the procedures defined by SOTS were noticed:
• The cards were not chosen uniformly at random for the audit
• Instead of choosing random memory cards for each district random districts were chosen
• Some cards were labeled “backup”
22
VoTeR Center University of Connecticut
Pre-Election Memory Card Audit Results
Pre-Election Memory Card Audit Results
23
VoTeR Center University of Connecticut
Post-Election Memory Card Audit Results
Post-Election Memory Card Audit Results
24
VoTeR Center University of Connecticut
ConclusionsConclusions• The following were identified during the
memory card audit
• Examination of memory cards revealed no incorrect ballot data or bytecode
• Poll workers did not follow the exact testing procedures
• Surprising number of cards with “junk data”: 3.5% in pre-election audit and 8% in post-election audit
25
VoTeR Center University of Connecticut
ReferencesReferences
• Black Box Voting http://blackboxvoting.org
• Jonathan Bannet, David W. Price, Algis Rudys, Justin Singer, Dan S. Wallach: Hack-a-Vote: Security Issues with Electronic Voting Systems. IEEE Security & Privacy 2(1): 32-37 (2004)
• Help America Vote Act (HAVA), http://www.fec. gov/hava/law_ext.txt
• Harri Hursti, Critical Security Issues with Diebold Optical Scan Design, Black Box Voting Project, July 4, 2005 http://www.blackboxvoting.org/BBVreport.pdf
• A. Kiayias, L. Mchel, A. Russell, A.A. Shvartsman, M. Korman, A. See, N. Shashidhar and D. Walluck, Security Assessment of the Diebold Optical Scan Voting Terminal, http://voter.engr.uconn.edu/ voter/Report-OS.html
• A. Kiayias, L. Michel, A. Russell, N. Sashidar, A. See, and A. Shvartsman, An Authentication and Ballot Layout Attack Against an Optical Scan Voting Terminal. 2007 USENIX/ACCURATE Electronic Voting Technology Workshop (EVT 07), Augist, 2007, Boston, MA.
• A. Kiayias, L. Michel, A. Russel, N. Sashidar, A. See, A. Shvartsman, S. Davtyan. Tampering with Special Purpose Trusted Computing Devices: A Case Study in Optical Optical Scan E-Voting. Twenty-Third Annual Computer Security Applications Conference (ACSAC), December, 2007, Miami Beach, Fl. 26
VoTeR Center University of Connecticut
About the UConn VoTeR CenterAbout the UConn VoTeR Center
• Participation in Connecticut Voting Technology Standards Board 2005-2006
• Relationship with the CT SOTS Office• Advising on voting technology issues• Evaluation of proposed voting equipment• Development of safe use procedures• Technology audits and security analysis• Faculty: A. Shvartsman, A. Kiayias, L. Michel,
A. Russell• Research Assistants: S. Davtyan, S. Kentros, N.
Nicolaou, N. Sashidhar, A. See
27