Back-door flaws found in Diebold e-voting machines
The flaws could be used to change election results on the systems
IDG News Service - Diebold Election Systems Inc. plans to make changes to its electronic voting machines, following the disclosure of a number of serious security flaws in the systems.
The voting watchdog organization Black Box Voting last week published a report (download PDF) detailing how Diebold's TS6 and TSx touch-pad voting machines could be compromised by taking advantage of back-door features designed to allow new software to be installed on the systems.
Finnish security researcher Harri Hursti discovered back doors in the systems boot loader software, in the operating system and in the Ballot Station software that it runs to tabulate votes.
"These are built-in features, all three of them," said Black Box Voting founder Bev Harris. If a malicious person had access to a Diebold machine, the back doors could be exploited to falsify election results on the system, she said.
A Diebold spokesman did not dispute Hursti's findings but said that Black Box Voting was making too much of the matter because the systems are intended to remain in the hands of trusted election officials.
"What they're proposing as a vulnerability is actually a functionality of the system," said spokesman David Bear. "Instead of recognizing the advantages of the technology, we keep ringing up 'what if' scenarios that serve no purpose other than to confuse and in some instances frighten voters."
Nevertheless, Diebold plans to address the issue in an upcoming version of the product, which will use cryptographic keys to ensure that only authorized software is installed on the machine, Bear said. He could not say when this feature would be added but said that it could be available in time for the Nov. 7 general election in the U.S.
After the November 2000 presidential election exposed flaws in traditional paper ballots, many U.S. states rushed to adopt electronic voting systems. But computer experts have pointed out numerous security flaws in these machines, and some consumer groups have called for them to be dropped altogether.
These latest set of flaws are the most serious voting machine flaws yet reported, according to Ed Felten, a professor of computer science at Princeton University, and Avi Rubin, a professor of computer science at Johns Hopkins University.
"The attacks described in Hursti's report would allow anyone who had physical access to a voting machine for a few minutes to install malicious software code on that machine, using simple, widely available tools," they wrote Thursday on the Freedom to Tinker blog. "The malicious code, once installed, would control all of the functions of the voting machine, including the counting of votes."
Diebold's machines are based on custom hardware that runs Microsoft Corp.'s Windows CE operating system.
Harris called on Diebold to recall the machines and replace them with its optical scanners, which do not suffer from the same vulnerability. "The company sold a defective product," she said. "It should not be used in a federal election."
Harris also called on Congress to find out why these back doors were installed in the first place. "We need to find out how this got through the oversight system, and we need to question the programmer who did the programming under oath."
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!