Democratic Underground Latest Greatest Lobby Journals Search Options Help Login
Google

HUGE New Diebold "Accuvote" Optical Scan Vulnerabilties Uncovered by University of CT

Printer-friendly format Printer-friendly format
Printer-friendly format Email this thread to a friend
Printer-friendly format Bookmark this thread
This topic is archived.
Home » Discuss » Topic Forums » Election Reform Donate to DU
 
Wilms Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-13-08 01:12 AM
Original message
HUGE New Diebold "Accuvote" Optical Scan Vulnerabilties Uncovered by University of CT
23rd Annual Computer Security Applications Conference (ACSAC 2007)
December 10-14, 2007
Miami Beach, FL

IEEE Computer Society 2007

Tampering with Special Purpose Trusted Computing Devices:
A Case Study in Optical Scan E-Voting

Aggelos Kiayias, Laurent Michel, Alexander Russell, Narasimha Shashidhar, Andrew See, Alexander Shvartsman, Seda Davtyan

Voting Technology Research Center
Department of Computer Science
University of Connecticut
Storrs, CT


Abstract:

snip

In this paper we present a security assessment of the Diebold AccuVote Optical Scan voting terminal (AV-OS), a popular OS terminal currently in wide deployment anticipating the 2008 Presidential elections. The assessment is developed using exclusively reverse-engineering, without any technical specifications provided by the machine suppliers.

We demonstrate a number of security issues that relate to the machine’s proprietary language, called AccuBasic, that is used for reporting election results. While this language is thought to be benign, especially given that it is essentially sandboxed by the firmware to have only read access, we demonstrate that it is powerful enough to (i) strengthen known attacks against the AV-OS so that they become undetectable prior to elections (and thus significantly increasing their magnitude) or, (ii) to conditionally bias the election results to reach a desired outcome.

Given the discovered vulnerabilities and attacks we proceed to discuss how random audits can be used to validate with high confidence that a procedure carried out by special purpose devices such as the AV-OS has not been manipulated. We end with a set of recommendations for the design and safe-use of OS voting systems.

snip

3.2.2 Our Results : AccuBasic MalWare for Concealing Tampering and Results Manipulation

During our own experimentation we found that the bytecode language offers a wealth of functions that can be potentially exploited by an attacker. In particular, we will demonstrate a “time bomb” attack in which the bytecode checks the date and time in order to decide whether the election has begun. An attack utilizing such code can retain proper behavior in pre-election testing, in which the machine is verified by comparison with hand counted ballots, while behaving improperly during the actual election.

Altering Results

As evident from the previous sections, the AccuBasic election reporting functionality is powerful
enough to perform various kinds of biased reporting. In particular, if the AV-OS election reporting printouts are the sole means of reporting the election results (as it is the case in fact in many jurisdictions) then one can write quite complex malicious reporting functionalities that get triggered in specific cases (when e.g., the number of votes of a certain candidate are below a certain percentage) and perform arbitrary vote transfers between the candidates.

The election totals report also includes the number of blank votes in each race. A blank indicates that a voter decided not to assign their vote to any candidate. Thus, the total votes for all candidates plus the blank votes should equal the total number of ballots cast. The bytecode has access to the blank count as well, and so can also transfer votes from these blanks to a target candidate in the report, thus preserving total voter counts and possibly avoiding suspicion.

snip

pdf: http://voter.engr.uconn.edu/voter/Reports_files/seeA-tamperEVoting.pdf

Printer Friendly | Permalink |  | Top
kster Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-13-08 01:26 AM
Response to Original message
1. K&R............ but...........
Edited on Thu Mar-13-08 01:40 AM by kster
Printer Friendly | Permalink |  | Top
 
Wilms Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-13-08 09:28 PM
Response to Reply #1
6. But what??? More like "And...and" if anything.
Edited on Thu Mar-13-08 09:29 PM by Wilms
(And your audience deserves the courtesy of just a hint of info with links you post.)

This hack is different than Hursti's Hack. It suggests there are even more ways to mess with Diebold's (and perhaps a few of the other vendors') Optical Scan.

Did I miss an idea you were expressing?

Printer Friendly | Permalink |  | Top
 
garybeck Donating Member (1000+ posts) Send PM | Profile | Ignore Fri Mar-14-08 12:27 AM
Response to Reply #1
8. Excellent video!!!
Printer Friendly | Permalink |  | Top
 
Bill Bored Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-13-08 03:05 AM
Response to Original message
2. These U. Conn. folks are doing a heck of a job! nt
Printer Friendly | Permalink |  | Top
 
flor de jasmim Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-13-08 03:36 AM
Response to Original message
3. When do we get to boil the Diebold designers in oil?
Printer Friendly | Permalink |  | Top
 
troubleinwinter Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-13-08 03:38 AM
Response to Original message
4. Thanks. K&R. I'll try to read that when I'm awake!
Printer Friendly | Permalink |  | Top
 
Ellipsis Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-13-08 10:02 AM
Response to Original message
5. Thank you for this most excellent post.
K&R

Printer Friendly | Permalink |  | Top
 
garybeck Donating Member (1000+ posts) Send PM | Profile | Ignore Thu Mar-13-08 10:52 PM
Response to Original message
7. Thanks. That's the exact system used throughout Vermont and we
have no audits whatsoever.

I've shown 3 studies like this to our state's Director of Elections and she just basically says the studies are wrong and we have nothing to worry about because the memory cards are kept safe and no one can access them.

Then I mention that LHS and Diebold employees have unfettered access to the machines and the cards, and she just says that we should trust them.

Printer Friendly | Permalink |  | Top
 
Bill Bored Donating Member (1000+ posts) Send PM | Profile | Ignore Sun Mar-16-08 01:26 AM
Response to Reply #7
9. You should FETTER their access big time! And do some hand counts. nt
Printer Friendly | Permalink |  | Top
 
DU AdBot (1000+ posts) Click to send private message to this author Click to view 
this author's profile Click to add 
this author to your buddy list Click to add 
this author to your Ignore list Fri Apr 19th 2024, 12:30 PM
Response to Original message
Advertisements [?]
 Top

Home » Discuss » Topic Forums » Election Reform Donate to DU

Powered by DCForum+ Version 1.1 Copyright 1997-2002 DCScripts.com
Software has been extensively modified by the DU administrators


Important Notices: By participating on this discussion board, visitors agree to abide by the rules outlined on our Rules page. Messages posted on the Democratic Underground Discussion Forums are the opinions of the individuals who post them, and do not necessarily represent the opinions of Democratic Underground, LLC.

Home  |  Discussion Forums  |  Journals |  Store  |  Donate

About DU  |  Contact Us  |  Privacy Policy

Got a message for Democratic Underground? Click here to send us a message.

© 2001 - 2011 Democratic Underground, LLC