Gazette
masthead
   About The Gazette Search Back Issues Contact Us    
The newspaper of The Johns Hopkins University August 4, 2003 | Vol. 32 No. 41
 
Electronic Voting System May Be Vulnerable

Technical director of the Information Security Institute at JHU, Avi Rubin, center, assigned doctoral students Adam Stubblefield and Yoshi Kohno to review software code found on the Web.

Computer experts find flaws in popular software produced for U.S. elections

By Phil Sneiderman
Homewood

The software believed to be at the heart of an electronic voting system being marketed for use in elections across the nation has weaknesses that could easily allow someone to cast multiple votes for one candidate, computer security researchers at Johns Hopkins have determined.

The researchers reached this conclusion after studying computer code believed to be for Ohio-based Diebold Election Systems' electronic voting equipment. The code, which included modifications made through 2002, was posted anonymously to a public Web site earlier this year. During 2002, approximately 33,000 Diebold voting stations, which allow ballots to be cast via a 15-inch touch-screen monitor, were used in elections in Georgia, California, Kansas and other locations, according to a company news release. On July 21, the company finalized an agreement with the state of Maryland to provide up to $55.6 million in touch-screen voting technology and related services.

But after analyzing tens of thousands of lines of programming code purportedly used to make this electronic voting system work, three researchers from the Information Security Institute at Johns Hopkins, aided by a computer scientist at Rice University in Houston, have expressed serious concerns about the voting system. The researchers said they uncovered vulnerabilities in the system that could be exploited by an individual or group intent on tampering with election results. In particular, they pointed to the use of a "smart card," containing a tiny computer chip, that each eligible voter receives. The card, inserted into the electronic voting machine, is designed to ensure that each person casts only one ballot. But the researchers believe a voter could hide a specially programmed counterfeit card in a pocket, withdraw it inside the booth and use it to cast multiple votes for a single candidate.

"A 15-year-old computer enthusiast could make these counterfeit cards in a garage and sell them," said Avi Rubin, technical director of the Information Security Institute at Johns Hopkins and one of the researchers involved in the study. "Then, even an ordinary voter, without knowing anything about computer code, could cast more than one vote for a candidate at a polling place that uses this electronic voting system."

The researchers were quick to note that no evidence exists that anyone has used such tactics to tamper with an election. They chose, however, to make their findings public because of concerns that election fraud will almost certainly occur if weaknesses in the electronic voting system are not addressed before many more jurisdictions move to this method of picking public officials.

The security flaws were discovered this summer after Rubin assigned Adam Stubblefield and Yoshi Kohno, two computer science doctoral students at the institute, to review the voting software code found on the Web. The students analyzed only those files that were publicly accessible and did not attempt to breach others that were protected by passwords. "Many of the attacks are very simple," Kohno said. "It is unfortunate to find such flaws in a system potentially as important as this one." Stubblefield added, "When people vote in the United States, they have to believe the election is fair."

The researchers, joined by Dan Wallach, an assistant professor of computer science at Rice University, were able to reconstruct the electronic voting terminal in a Johns Hopkins computer lab and detected the security problems. "Even without access to the protected files, we've determined this system is fundamentally flawed," Rubin said. "There will be no easy fix for this."

The issue is important, Rubin said, because problems related to Florida's punch card ballots during the 2000 presidential election have prompted many cities and states to consider computer screen voting systems as a better alternative. But Rubin, who has conducted extensive research into electronic voting and has been tapped to review the security of a federal electronic voting proposal, said the move to high-tech balloting should not be conducted in haste. "People are rushing too quickly to computerize our method of voting before we know how to do it securely," he said.

The researchers have detailed their findings in a technical paper posted at this Web address avirubin.com/vote.pdf.

Although the researchers have not independently verified the current or past use of the code by Diebold or that the code they analyzed is actually Diebold code, they stated in their technical paper that "the copyright notices and code legacy information in the code itself are consistent with publicly available systems offered by Diebold and a company it acquired in 2001, Global Election Systems. Also, the code itself compiled and worked as an election system consistent with Diebold's public descriptions of its system."

 

Researchers respond to critics

Since its release on July 23, the electronic voting security study by Johns Hopkins and Rice universities has generated nationwide news coverage and triggered a vigorous public debate among state and local election supervisors, members of Congress, technology researchers, members of the public and electronic voting system vendors.

Diebold Elections Systems, whose software was evaluated by the Hopkins-Rice team, criticized the research in a July 30 analysis. In it, the company stated that it did not believe the types of tampering suggested by the researchers could occur. The researchers said they stand behind their findings.

"Our goal in this project was to call the public's attention to some very serious security concerns that may be overlooked in our rush to adopt new electronic voting systems, problems that could jeopardize the integrity of fair and open elections," said Avi Rubin, technical director of the Information Security Institute at Johns Hopkins. "Although we were tempted to stand back now and allow our elected officials and the public to come to their own conclusions, we could not allow some of Diebold's attacks on our research to go unchallenged."

The researchers' technical response to Diebold's analysis of their work has been posted online at avirubin.com/vote/response.html. The original technical report is online at avirubin.com/vote.pdf.

GO TO AUGUST 4, 2003 TABLE OF CONTENTS.
GO TO THE GAZETTE FRONT PAGE.


The Gazette | The Johns Hopkins University | Suite 100 | 3003 N. Charles St. | Baltimore, MD 21218 | 410-516-8514 | gazette@jhu.edu