Back-door flaws found in Diebold e-voting machines
The flaws could be used to change election results on the systems
IDG News Service - Diebold Election Systems Inc. plans to make changes to its electronic voting machines, following the disclosure of a number of serious security flaws in the systems.
The voting watchdog organization Black Box Voting last week published a report (download PDF) detailing how Diebold's TS6 and TSx touch-pad voting machines could be compromised by taking advantage of back-door features designed to allow new software to be installed on the systems.
Finnish security researcher Harri Hursti discovered back doors in the systems boot loader software, in the operating system and in the Ballot Station software that it runs to tabulate votes.
"These are built-in features, all three of them," said Black Box Voting founder Bev Harris. If a malicious person had access to a Diebold machine, the back doors could be exploited to falsify election results on the system, she said.
A Diebold spokesman did not dispute Hursti's findings but said that Black Box Voting was making too much of the matter because the systems are intended to remain in the hands of trusted election officials.
"What they're proposing as a vulnerability is actually a functionality of the system," said spokesman David Bear. "Instead of recognizing the advantages of the technology, we keep ringing up 'what if' scenarios that serve no purpose other than to confuse and in some instances frighten voters."
Nevertheless, Diebold plans to address the issue in an upcoming version of the product, which will use cryptographic keys to ensure that only authorized software is installed on the machine, Bear said. He could not say when this feature would be added but said that it could be available in time for the Nov. 7 general election in the U.S.
After the November 2000 presidential election exposed flaws in traditional paper ballots, many U.S. states rushed to adopt electronic voting systems. But computer experts have pointed out numerous security flaws in these machines, and some consumer groups have called for them to be dropped altogether.
These latest set of flaws are the most serious voting machine flaws yet reported, according to Ed Felten, a professor of computer science at Princeton University, and Avi Rubin, a professor of computer science at Johns Hopkins University.
"The attacks described in Hursti's report would allow anyone who had physical access to a voting machine for a few minutes to install malicious software code on that machine, using simple, widely available tools," they wrote Thursday on the Freedom to Tinker blog. "The malicious code, once installed, would control all of the functions of the voting machine, including the counting of votes."
Diebold's machines are based on custom hardware that runs Microsoft Corp.'s Windows CE operating system.
Harris called on Diebold to recall the machines and replace them with its optical scanners, which do not suffer from the same vulnerability. "The company sold a defective product," she said. "It should not be used in a federal election."
Harris also called on Congress to find out why these back doors were installed in the first place. "We need to find out how this got through the oversight system, and we need to question the programmer who did the programming under oath."
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts