Transcript
Page 1: Electronic Voting: Danger and Opportunity

Electronic Voting:Danger and Opportunity

J. Alex Halderman

Department of Computer ScienceCenter for Information Technology Policy

Princeton University

Page 2: Electronic Voting: Danger and Opportunity
Page 3: Electronic Voting: Danger and Opportunity

Joint work with …

Joe Calandrino Ari Feldman Ed Felten

Page 4: Electronic Voting: Danger and Opportunity
Page 5: Electronic Voting: Danger and Opportunity

2000 Recount Debacle

Legislative response:Help America Vote Act

Provided $3.9 billion to statesto upgrade voting machines by November 2006

Page 6: Electronic Voting: Danger and Opportunity

DREs to the Rescue?

Direct Recording Electronic – Store votes in internal memory

Page 7: Electronic Voting: Danger and Opportunity

DREs are Computers

BugsRootkits

VirusesAttacks

=

Page 8: Electronic Voting: Danger and Opportunity
Page 9: Electronic Voting: Danger and Opportunity
Page 10: Electronic Voting: Danger and Opportunity

Diebold’s History of Secrecy

• Prevented states from allowing independent security audits – hid behind NDAs, trade secret law

• Source code leaked in 2003, researchers at Johns Hopkins found major flawsDiebold responded with vague legal threats,personal attacks, disinformation campaign

• Internal emails leaked in 2003 reveal poor security practices by developersDiebold tried to suppress sites with legal threats

Page 11: Electronic Voting: Danger and Opportunity

We Get a Machine(2006)

Obtained legally from an anonymous private party

Software is 2002 version, but certified and used in actual elections

First complete, public, independent security audit of a DRE

Page 12: Electronic Voting: Danger and Opportunity

Research Goals• Conduct independent security audit• Confirm findings of previous researchers

(Hursti, Kohno et al.)

• Verify threats by building demonstration attacks• Figure out how to do better

Who wants to know? Voters, candidates, election officials, policy makers, researchers

Page 13: Electronic Voting: Danger and Opportunity

16 MB Flash

128 KB EPROM

SH3CPU

32 MBRAM

2 PCMCIA Slots

Boot Jumper Table

Page 14: Electronic Voting: Danger and Opportunity
Page 15: Electronic Voting: Danger and Opportunity

Software Problems

One Example:

DES-CBCK(BallotID:VoteBitmap), CRC-16(…)

Page 16: Electronic Voting: Danger and Opportunity

Our Findings

• Malicious software running on the machine can steal votes undetectably, altering all backups and logs

[Feldman, Halderman & Felten 2007]

Page 17: Electronic Voting: Danger and Opportunity

Correct result: George 5, Benedict 0

Page 18: Electronic Voting: Danger and Opportunity
Page 19: Electronic Voting: Danger and Opportunity
Page 20: Electronic Voting: Danger and Opportunity

Our Findings

• Malicious software running on the machine can steal votes undetectably, altering all backups and logs

• Anyone with physical access to the machine or memory card can install malicious code in as little as one minute

[Feldman, Halderman & Felten 2007]

Page 21: Electronic Voting: Danger and Opportunity
Page 22: Electronic Voting: Danger and Opportunity

The Key

Page 23: Electronic Voting: Danger and Opportunity
Page 24: Electronic Voting: Danger and Opportunity

Our Findings

• Malicious software running on the machine can steal votes undetectably, altering all backups and logs

• Anyone with physical access to the machine or memory card can install malicious code in as little as one minute

• Malicious code can spread automatically and silently from machine to machine in the form of a voting machine virus

[Feldman, Halderman & Felten 2007]

Page 25: Electronic Voting: Danger and Opportunity

Voting Machine Virus

Page 26: Electronic Voting: Danger and Opportunity

Viral Spread

Page 27: Electronic Voting: Danger and Opportunity
Page 28: Electronic Voting: Danger and Opportunity

Joe Calandrino Ari FeldmanBill Zeller Harlan YuAlex Halderman

Debra Bowen

California “Top-to-Bottom” Study

Page 29: Electronic Voting: Danger and Opportunity

Hart Sequoia Diebold

California “Top-to-Bottom” Results

Page 30: Electronic Voting: Danger and Opportunity
Page 31: Electronic Voting: Danger and Opportunity

WHAT TO DO?

Page 32: Electronic Voting: Danger and Opportunity

Voters prefer it

Faster reporting

Fewer undervotes

Improved accessibility

Potentially increased security*

E-Voting Advantages

Page 33: Electronic Voting: Danger and Opportunity

WE CAN DO BETTER!

Page 34: Electronic Voting: Danger and Opportunity

Electronic + Paper Records

Touch-screen (DRE) machine,plus voter-verifiable paper trail

Hand-marked paper ballot,machine-scanned immediately

Page 35: Electronic Voting: Danger and Opportunity

Failure Modes

Paper BallotsPhysical tampering“Retail” fraudAfter the election

Redundancy + Different failure modes = Greater security

Electronic RecordsCyber-tampering“Wholesale” fraudBefore the election

But…Redundancy only helps if we use both records!

Page 36: Electronic Voting: Danger and Opportunity

How to Use Paper Records?

Use a machine to count the paper records

Count all the paper records by hand

Check a random subset of paper records by hand…but which subset?

Too risky

Too expensive

Page 37: Electronic Voting: Danger and Opportunity

Standard Approach

Pick some precincts randomly.Hand-count paper records.

Should match electronic records.

Page 38: Electronic Voting: Danger and Opportunity

Statistical Auditing’s Goal

Establish, with high statistical confidence, that hand-counting all of the paper records would yield the same winner as the electronic tally.

Page 39: Electronic Voting: Danger and Opportunity

Audit Example

Alice: 55%Bob: 45% Goal: Reject hypothesis that

≥ 5% of ballots differ between electronic and paper

For 95% confidence, hand-audit 60 precincts

Cost: about $100,000

Page 40: Electronic Voting: Danger and Opportunity

An Alternative Approach

Precinct-based auditing

Ballot-based auditing

Page 41: Electronic Voting: Danger and Opportunity

100 marbles, 10% blue 6300 beads, 10% blue

How large a sample do we need?

Page 42: Electronic Voting: Danger and Opportunity

Audit Example

Alice: 55%Bob: 45% Goal: Reject hypothesis that

≥ 5% of ballots differ between electronic and paper

For 95% confidence, hand-audit 60 precincts

Cost: about $100,000

ballots

$1,000

Page 43: Electronic Voting: Danger and Opportunity

Why Not Ballot-based?

VotingMachine

AliceBobAlice

● Alice○ Bob

○ Alice● Bob

● Alice○ Bob

Need to match up electronic with paper ballots.

Compromises the secret ballot!

Page 44: Electronic Voting: Danger and Opportunity

Secret BallotPrevents coercion and vote-buying

Requirements: Nobody can tell how you voted. You can’t prove to anyone how you voted. You can be confident in these properties.

Page 45: Electronic Voting: Danger and Opportunity

Serial Numbers

VotingMachine

1 Alice2 Bob3 Alice

1● Alice○ Bob

2○ Alice● Bob

3● Alice○ Bob

Page 46: Electronic Voting: Danger and Opportunity

“Random” Identifiers

VotingMachine

325631 Alice218594 Bob810581 Alice

325631● Alice○ Bob

218594○ Alice● Bob

810581● Alice○ Bob

Page 47: Electronic Voting: Danger and Opportunity

Machine-Assisted Auditing

[Calandrino, Halderman & Felten 2007]

=

○ Alice● Bob1

1 Bob2 Alice...929 Bob

Alice: 510Bob: 419

○ Alice● Bob

Step 1. Check electronic records against paper recordsusing a recount machine.

Page 48: Electronic Voting: Danger and Opportunity

Machine-Assisted Auditing

[Calandrino, Halderman & Felten 2007]

=

○ Alice● Bob1

1 Bob2 Alice...929 Bob

Alice: 510Bob: 419

○ Alice● Bob

Page 49: Electronic Voting: Danger and Opportunity

=

321 Bob716 Alice

Machine-Assisted Auditing

[Calandrino, Halderman & Felten 2007]

○ Alice● Bob1

1 Bob2 Alice...929 Bob

=

○ Alice● Bob321

● Alice○ Bob716

○ Alice● Bob1

Step 2. Audit the recount machine by selecting random ballots for human inspection.

Page 50: Electronic Voting: Danger and Opportunity

We can use a machinewithout having to trust it!

Machine-Assisted Auditing

As efficient as ballot-based auditing,while protecting the secret ballot.

Machine Recount Manual Audit

Page 51: Electronic Voting: Danger and Opportunity

Doing Even Better

Key idea: Probability of auditing a ballot should depend on how that ballot is marked

Full algorithm accounts for:multi-candidate racesmulti-seat racesundervotes and overvoteswrite-ins

Page 52: Electronic Voting: Danger and Opportunity

Doing Even Better

Alice: 55%Bob: 45%

Goal: Reject hypothesis that ≥ 5% of ballots differ between electronic and paper

Goal: Reject hypothesis that ≥ 5% of ballots are marked electronically for Alice but on paper for Bob.

Only need to audit ballots marked for Alice.

Page 53: Electronic Voting: Danger and Opportunity

Evaluation

2006 Virginia U.S. Senate race0.3% margin of victoryWe want 99% confidence

Precinct-

basedMachine-assisted

Content-sensitive

# ballots 1,141,900 2,339 1,179 # precincts 1,252 1,351 853

Page 54: Electronic Voting: Danger and Opportunity
Page 55: Electronic Voting: Danger and Opportunity

Electronic Voting:Danger and Opportunity

J. Alex Halderman

Department of Computer ScienceCenter for Information Technology Policy

Princeton University

Page 56: Electronic Voting: Danger and Opportunity

Proposed Legislation

H.R. 811: Voter Confidence and Increased Accessibility Act

• Voter-verifiable paper record and random manual audits

• Access to voting software and source code, to verify security

• Additional money for states

Rep. Rush Holt


Recommended