[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help] 

Status: Not Logged In; Sign In

No place for hate apeech

America and Israel both told Qatar to allow Hamas to stay in their country

Video | Robert Kennedy brings down the house.

Owner releases video of Trump banner ripping, shooting in WNC

Cash Jordan: Looters ‘Forcibly Evict’ Millionaires… as California’s “NO ARRESTS” Policy BACKFIRES

Dallas Motel Horror: Immigrant Machete Killer Caught

America has been infiltrated and occupied Netanyahu 1980

Senior Trump Official Declares War On Far-Left NGOs Sowing Chaos Nationwide

White House Plans Security Boost On Civil Terrorism Fears

Visualizing The Number Of Farms In Each US State

Let her cry

The Secret Version of the Bible You’re Never Taught - Secret History

Rocker defames Charlie Kirk threatens free speech

Paramount Has a $1.5 Billion South Park Problem

European Warmongers Angry That Trump Did Not Buy Into the ‘Drone Attack in Poland’

Grassley Unveils Declassified Documents From FBI's Alleged 'Political Hit Job' On Trump

2 In 5 Young Adults Are Taking On Debt For Social Image, To Impress Peers, Study Finds

Visualizing Global Gold Production By Region

RFK Jr. About to DROP the Tylenol–Autism BOMBSHELL & Trump tweets cryptic vaccine message

Elon Musk Delivers Stunning Remarks At Historic UK March

Something BIG is happening (One Assassination Changed Everything)

The Truth About This Piece Of Sh*t

Breaking: 18,000 Epstein emails just dropped.

Memphis: FOUR CHILDREN shot inside a home (National Guard Inbound)

Elon Musk gives CHILLING WARNING after Charlie Kirk's DEATH...

ActBlue Lawyers Subpoenaed As House GOP Investigation Into Donor Fraud Intensifies

Cash Jordan: Gangs EMPTY Chicago Plaza... as Mayor's "LET THEM LOOT" Plan IMPLODES

Trump to send troops to Memphis

Who really commands China’s military? (Xi Jinping on his way out)

Ghee: Is It Better Than Butter?


(s)Elections
See other (s)Elections Articles

Title: Evaluating the Security of Electronic Voting Systems
Source: UCSB
URL Source: http://www.cs.ucsb.edu/~seclab/projects/voting/
Published: Sep 23, 2008
Author: CSG
Post Date: 2008-09-23 16:00:35 by Split
Keywords: None
Views: 75
Comments: 2

Are your votes really counted?

Electronic voting systems have been introduced to improve the voting process. Since their inception, they have been controversial, because both the technologists and the general public realized that they were losing direct control over an important part of the voting process: counting the votes.

A quote attributed to Stalin says: "Those who cast the votes decide nothing. Those who count the votes decide everything." It is clear that voting systems represent a critical component of a democracy. Although the consequences of a malfunctioning electronic voting system are not as readily apparent as those for air traffic control or nuclear power plant control systems, they are just as important, because the well-being of a society depends on them.

While most critical systems are continuously scrutinized and evaluated for safety and correctness, electronic voting systems are not subject to the same level of scrutiny. A number of recent studies have shown that most (if not all) of the electronic voting systems being used today are fatally flawed, and that their quality does not match the importance of the task that they are supposed to carry out.

In the Summer of 2007, the Security Group of UCSB participated in the Top-To-Bottom Review (TTBR) of the electronic voting systems used in California. This was a first-of-its-kind review, where the evaluators had unprecedented access to the systems' source code, hardware, and associated documentation.

The Report

Our team focused on the security analysis of the Sequoia voting system. Our public report can be found here (a local copy can be found here). We found a number of major flaws that can be exploited to compromise the integrity, confidentiality, and availability of the voting process.

In particular, we developed a virus-like software that can spread across the voting system, modifying the firmware of the voting machines. The modified firmware is able to steal votes even in the presence of a Voter-Verified Paper Audit Trail (VVPAT).

The Paper

We wrote a paper that describes our methodology and our findings:

Are Your Votes Really Counted? Testing the Security of Real-world Electronic Voting Systems, D. Balzarotti, G. Banks, M. Cova, V. Felmetsger, R. Kemmerer, W. Robertson, F. Valeur, and G. Vigna, in Proceedings of the International Symposium on Software Testing and Analysis, Seattle, WA July 2008.[PDF]

The Video

We also prepared a movie that shows how the virus-like attack would be carried out, and exemplifies the different scenarios that our malicious firmware would exploit.

The video shows how one can use a simple USB key to infect the laptop used to prepare the cards that initialize the various voting devices. As a result, the cards are loaded with a malicious software component.

When a card is inserted in a voting terminal, the malicious software exploits a vulnerability in the terminal loading procedure and installs a modified firmware, effectively "brainwashing" the terminal.

Later, when the terminal is used by the voters to cast their votes, the firmware uses a number of different techniques to modify the contents of the ballots being cast.

The movie also shows that the physical security measures being used to limit access to essential parts of the voting systems are ineffective.

The movie cannot be downloaded from this page anymore, because after we were featured on Slashdot the Department web server maxed out.

However somebody uploaded the video on YouTube.

Part 1

Part 2



The Computer Security Group at UCSB

Post Comment   Private Reply   Ignore Thread  


TopPage UpFull ThreadPage DownBottom/Latest

#1. To: Split, Original_Intent, critter, lodwick, rotara (#0)

A number of recent studies have shown that most (if not all) of the electronic voting systems being used today are fatally flawed, and that their quality does not match the importance of the task that they are supposed to carry out.

Duh! The electronic voting machines in the 2000 election had a higher error rate than the punch cards did and were also involved in the close but non confrontation race in New Mexico yet there was still this call to use them to replace the chads. Why? They don't need viruses to scew the vote. Many of the memory cards are replace mid vote. Again, why? It is quite obvious that our elections are rigged.


"You have delusions of adequacy."

farmfriend  posted on  2008-09-23   17:58:34 ET  Reply   Trace   Private Reply  


#2. To: farmfriend (#1)

The electoral system is rigged from beginning to end; heads they win, tails you lose. When all else fails they'll fudge the vote tallies.

Split  posted on  2008-09-23   18:51:14 ET  Reply   Trace   Private Reply  


TopPage UpFull ThreadPage DownBottom/Latest


[Home]  [Headlines]  [Latest Articles]  [Latest Comments]  [Post]  [Sign-in]  [Mail]  [Setup]  [Help]