Headlines at Hopkins: news releases from across
the 
university Headlines
@Hopkins
News by Topic: news releases organized by
subject News by Topic
News by School: news releases organized by the 
university's 9 schools & divisions News by School
Events Open to the Public (campus-wide) Events Open
to the Public
Blue Jay Sports: Hopkins Athletic Center Blue Jay Sports
Search News Site Search the Site

Contacting the News Staff: directory of
university 
press officers Contacting
News Staff
Receive News Via Email (listservs) Receive News
Via Email
Resources for Journalists Resources for Journalists

Virtually Live@Hopkins: audio and video news Virtually
Live@Hopkins
Hopkins in the News: news clips about Hopkins Hopkins in
the News

Faculty Experts: searchable resource organized by 
topic Faculty Experts
Faculty and Administrator Photos Faculty and
Administrator
Photos
Faculty with Homepages Faculty with Homepages

JHUNIVERSE Homepage JHUniverse Homepage
Headlines at Hopkins
News Release

Office of News and Information
Johns Hopkins University
3003 N. Charles Street, Suite 100
Baltimore, Maryland 21218-3843
Phone: (410) 516-7160
Fax (410) 516-5251

July 24, 2003
FOR IMMEDIATE RELEASE
Johns Hopkins Contact: Phil Sneiderman
(410) 516-7907, prs@jhu.edu
Rice Univ. Contact: Terry Shepard
(713) 348-6280, tshepard@rice.edu


Electronic Voting System is Vulnerable to Tampering
Computer Researchers Find Critical Flaws in Popular Software Produced for U.S. Elections

The software believed to be at the heart of an electronic voting system being marketed for use in elections across the nation has weaknesses that could easily allow someone to cast multiple votes for one candidate, computer security researchers at The Johns Hopkins University have determined.

The researchers reached this conclusion after studying computer code believed to be for Ohio-based Diebold Election Systems' electronic voting equipment. The code, which included modifications made through 2002, was posted anonymously to a public Web site earlier this year. During 2002, approximately 33,000 Diebold voting stations, which allow ballots to be cast via a 15-inch touch-screen monitor, were used in elections in Georgia, California, Kansas and other locations, according to a company news release. On July 21, the company finalized an agreement with the state of Maryland to provide up to $55.6 million in touch-screen voting technology and related services.

But after analyzing tens of thousands of lines of programming code purportedly used to make this electronic voting system work, three researchers from the Information Security Institute at Johns Hopkins, aided by a computer scientist at Rice University in Houston, have expressed serious concerns about the voting system. The researchers said they uncovered vulnerabilities in the system that could be exploited by an individual or group intent on tampering with election results. In particular, they pointed to the use of a "smart card," containing a tiny computer chip, that each eligible voter receives. The card, inserted into the electronic voting machine, is designed to ensure that each person casts only one ballot. But the researchers believe a voter could hide a specially programmed counterfeit card in a pocket, withdraw it inside the booth and use it to cast multiple votes for a single candidate.

"A 15-year-old computer enthusiast could make these counterfeit cards in a garage and sell them," said Avi Rubin, technical director of the Information Security Institute at Johns Hopkins and one of the researchers involved in the study. "Then, even an ordinary voter, without knowing anything about computer code, could cast more than one vote for a candidate at a polling place that uses this electronic voting system."

Avi Rubin, technical director of the Information Security Institute at Johns Hopkins University
Photo by Will Kirk

The researchers were quick to note that no evidence exists that anyone has used such tactics to tamper with an election. However, they chose to make their findings public because of concerns that election fraud will almost certainly occur if weaknesses in the electronic voting system are not addressed before many more jurisdictions move to this method of picking public officials.

The security flaws were discovered this summer after Rubin assigned Adam Stubblefield, 22, and Yoshi Kohno, 25, two computer science doctoral students at the institute, to review the voting software code found on the Web. The students analyzed only those files that were publicly accessible and did not attempt to breach others that were protected by passwords. "Many of the attacks are very simple," Kohno said. "It is unfortunate to find such flaws in a system potentially as important as this one." Stubblefield added, "When people vote in the United States, they have to believe the election is fair."

Adam Stubblefield (left) and Yoshi Kohno
Photo by Will Kirk
The researchers, joined by Dan Wallach, an assistant professor of computer science at Rice University, were able to reconstruct the electronic voting terminal in a Johns Hopkins computer lab and detected the security problems. "Even without access to the protected files, we've determined this system is fundamentally flawed," Rubin said. "There will be no easy fix for this."

The issue is important, Rubin said, because problems related to Florida's punch card ballots during the 2000 Presidential election have prompted many cities and states to consider computer screen voting systems as a better alternative. But Rubin, who has conducted extensive research into electronic voting and has been tapped to review the security of a federal electronic voting proposal, said the move to high-tech balloting should not be conducted in haste. "People are rushing too quickly to computerize our method of voting before we know how to do it securely," he said.

The researchers have detailed their findings in a technical paper posted at this Web address http://avirubin.com/vote.pdf.

Although the researchers have not independently verified the current or past use of the code by Diebold or that the code they analyzed is actually Diebold code, they stated in their technical paper that "the copyright notices and code legacy information in the code itself are consistent with publicly available systems offered by Diebold and a company it acquired in 2001, Global Election Systems. Also, the code itself compiled and worked as an election system consistent with Diebold's public descriptions of its system."

Color photos of the Johns Hopkins researchers available; Contact Phil Sneiderman.

Related Links
Information Security Institute at Johns Hopkins
Avi Rubin's Web Page
Johns Hopkins Researchers Respond to Diebold Analysis [08/01/03]
Statement of Avi Rubin on relationship with VoteHere Inc.


Johns Hopkins University news releases can be found on the World Wide Web at http://www.jhu.edu/news_info/news/
   Information on automatic e-mail delivery of science and medical news releases is available at the same address.


Go to Headlines@HopkinsHome Page