Electronic Voting System May Be
Vulnerable

Technical director of the Information Security Institute at
JHU, Avi Rubin, center, assigned doctoral students Adam
Stubblefield and Yoshi Kohno to review software code found
on the Web.
|
Computer experts find flaws in popular software produced
for U.S. elections
By Phil Sneiderman Homewood
The software believed to be at the heart of an
electronic voting system being marketed for use in
elections across the nation has weaknesses that could
easily allow someone to cast multiple votes for one
candidate, computer security researchers at Johns Hopkins
have determined.
The researchers reached this conclusion after studying
computer code believed to be for Ohio-based Diebold
Election Systems' electronic voting equipment. The code,
which included modifications made through 2002, was posted
anonymously to a public Web site earlier this year. During
2002, approximately 33,000 Diebold voting stations, which
allow ballots to be cast via a 15-inch touch-screen
monitor, were used in elections in Georgia, California,
Kansas and other locations, according to a company news
release. On July 21, the company finalized an agreement
with the state of Maryland to provide up to $55.6 million
in touch-screen voting technology and related services.
But after analyzing tens of thousands of lines of
programming code purportedly used to make this electronic
voting system work, three researchers from the
Information Security
Institute at Johns Hopkins, aided by a computer
scientist at Rice University in Houston, have expressed
serious concerns about the voting system. The researchers
said they uncovered vulnerabilities in the system that
could be exploited by an individual or group intent on
tampering with election results. In particular, they
pointed to the use of a "smart card," containing a tiny
computer chip, that each eligible voter receives. The card,
inserted into the electronic voting machine, is designed to
ensure that each person casts only one ballot. But the
researchers believe a voter could hide a specially
programmed counterfeit card in a pocket, withdraw it inside
the booth and use it to cast multiple votes for a single
candidate.
"A 15-year-old computer enthusiast could make these
counterfeit cards in a garage and sell them," said Avi
Rubin, technical director of the Information Security
Institute at Johns Hopkins and one of the researchers
involved in the study. "Then, even an ordinary voter,
without knowing anything about computer code, could cast
more than one vote for a candidate at a polling place that
uses this electronic voting system."
The researchers were quick to note that no evidence
exists that anyone has used such tactics to tamper with an
election. They chose, however, to make their findings
public because of concerns that election fraud will almost
certainly occur if weaknesses in the electronic voting
system are not addressed before many more jurisdictions
move to this method of picking public officials.
The security flaws were discovered this summer after
Rubin assigned Adam Stubblefield and Yoshi Kohno, two
computer science
doctoral students at the institute, to review the voting
software code found on the Web. The students analyzed only
those files that were publicly accessible and did not
attempt to breach others that were protected by passwords.
"Many of the attacks are very simple," Kohno said. "It is
unfortunate to find such flaws in a system potentially as
important as this one." Stubblefield added, "When people
vote in the United States, they have to believe the
election is fair."
The researchers, joined by Dan Wallach, an assistant
professor of computer science at Rice University, were able
to reconstruct the electronic voting terminal in a Johns
Hopkins computer lab and detected the security problems.
"Even without access to the protected files, we've
determined this system is fundamentally flawed," Rubin
said. "There will be no easy fix for this."
The issue is important, Rubin said, because problems
related to Florida's punch card ballots during the 2000
presidential election have prompted many cities and states
to consider computer screen voting systems as a better
alternative. But Rubin, who has conducted extensive
research into electronic voting and has been tapped to
review the security of a federal electronic voting
proposal, said the move to high-tech balloting should not
be conducted in haste. "People are rushing too quickly to
computerize our method of voting before we know how to do
it securely," he said.
The researchers have detailed their findings in a
technical paper posted at this Web address
avirubin.com/vote.pdf.
Although the researchers have not independently
verified the current or past use of the code by Diebold or
that the code they analyzed is actually Diebold code, they
stated in their technical paper that "the copyright notices
and code legacy information in the code itself are
consistent with publicly available systems offered by
Diebold and a company it acquired in 2001, Global Election
Systems. Also, the code itself compiled and worked as an
election system consistent with Diebold's public
descriptions of its system."

Researchers respond to critics
Since its release on July 23, the electronic voting
security study by Johns Hopkins and Rice universities has
generated nationwide news coverage and triggered a vigorous
public debate among state and local election supervisors,
members of Congress, technology researchers, members of the
public and electronic voting system vendors.
Diebold Elections Systems, whose software was
evaluated by the Hopkins-Rice team, criticized the research
in a July 30 analysis. In it, the company stated that it
did not believe the types of tampering suggested by the
researchers could occur. The researchers said they stand
behind their findings.
"Our goal in this project was to call the public's
attention to some very serious security concerns that may
be overlooked in our rush to adopt new electronic voting
systems, problems that could jeopardize the integrity of
fair and open elections," said Avi Rubin, technical
director of the Information Security Institute at Johns
Hopkins. "Although we were tempted to stand back now and
allow our elected officials and the public to come to their
own conclusions, we could not allow some of Diebold's
attacks on our research to go unchallenged."
The researchers' technical response to Diebold's
analysis of their work has been posted online at
avirubin.com/vote/response.html. The
original technical report is online at
avirubin.com/vote.pdf.
GO TO AUGUST 4, 2003
TABLE OF CONTENTS.
GO TO THE GAZETTE
FRONT PAGE.
|