Back-door flaws found in Diebold e-voting machines
The flaws could be used to change election results on the systems
IDG News Service - Diebold Election Systems Inc. plans to make changes to its electronic voting machines, following the disclosure of a number of serious security flaws in the systems.
The voting watchdog organization Black Box Voting last week published a report (download PDF) detailing how Diebold's TS6 and TSx touch-pad voting machines could be compromised by taking advantage of back-door features designed to allow new software to be installed on the systems.
Finnish security researcher Harri Hursti discovered back doors in the systems boot loader software, in the operating system and in the Ballot Station software that it runs to tabulate votes.
"These are built-in features, all three of them," said Black Box Voting founder Bev Harris. If a malicious person had access to a Diebold machine, the back doors could be exploited to falsify election results on the system, she said.
A Diebold spokesman did not dispute Hursti's findings but said that Black Box Voting was making too much of the matter because the systems are intended to remain in the hands of trusted election officials.
"What they're proposing as a vulnerability is actually a functionality of the system," said spokesman David Bear. "Instead of recognizing the advantages of the technology, we keep ringing up 'what if' scenarios that serve no purpose other than to confuse and in some instances frighten voters."
Nevertheless, Diebold plans to address the issue in an upcoming version of the product, which will use cryptographic keys to ensure that only authorized software is installed on the machine, Bear said. He could not say when this feature would be added but said that it could be available in time for the Nov. 7 general election in the U.S.
After the November 2000 presidential election exposed flaws in traditional paper ballots, many U.S. states rushed to adopt electronic voting systems. But computer experts have pointed out numerous security flaws in these machines, and some consumer groups have called for them to be dropped altogether.
These latest set of flaws are the most serious voting machine flaws yet reported, according to Ed Felten, a professor of computer science at Princeton University, and Avi Rubin, a professor of computer science at Johns Hopkins University.
"The attacks described in Hursti's report would allow anyone who had physical access to a voting machine for a few minutes to install malicious software code on that machine, using simple, widely available tools," they wrote Thursday on the Freedom to Tinker blog. "The malicious code, once installed, would control all of the functions of the voting machine, including the counting of votes."
Diebold's machines are based on custom hardware that runs Microsoft Corp.'s Windows CE operating system.
Harris called on Diebold to recall the machines and replace them with its optical scanners, which do not suffer from the same vulnerability. "The company sold a defective product," she said. "It should not be used in a federal election."
Harris also called on Congress to find out why these back doors were installed in the first place. "We need to find out how this got through the oversight system, and we need to question the programmer who did the programming under oath."
- Troubleshooting Common Issues in VoIP Learn more about Voice over Internet Protocol (VoIP), including common VoIP metrics used, best practices in VoIP management and tips and tricks for...
- 2013 Network Management Software (NMS) Buyers Guide This white paper contains an independent comparison study of six different network management solutions and provides guidance on how you can choose the...
- Rightsizing Your Network Performance Management Solution: 4 Case Studies This white paper discusses challenges encountered as organizations search for the most cost-effective network performance management solution.
- Global Growing Pains: Tapping into B2B Integration Services to Overcome Global Expansion Challenges A recent survey by IDG Research explored both the challenges and pain points companies face when growing globally, as well as the capabilities...
- E-Signature RFP Checklist Webcast If your organization is looking to adopt e-signatures, you may be overwhelmed by the number of providers that offer seemingly similar solutions. How...
- Cloud and Collaboration: Driving Your Business Value Mission Critical Cloud from Peer 1 Hosting is enterprise-grade. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!