Defeating Malicious Terminals in an Electronic Voting System Daniel - - PowerPoint PPT Presentation

defeating malicious terminals in an electronic voting
SMART_READER_LITE
LIVE PREVIEW

Defeating Malicious Terminals in an Electronic Voting System Daniel - - PowerPoint PPT Presentation

Defeating Malicious Terminals in an Electronic Voting System Daniel Hanley Andre dos Santos Jeff King Georgia Tech Information Security Center Overview Motivation Related Work Protocol Examples Analysis Motivation The


slide-1
SLIDE 1

Defeating Malicious Terminals in an Electronic Voting System

Daniel Hanley Andre dos Santos Jeff King

Georgia Tech Information Security Center

slide-2
SLIDE 2

Overview

Motivation Related Work Protocol Examples Analysis

slide-3
SLIDE 3

Motivation

The Voting Problem Traditional Approach Electronic Voting

slide-4
SLIDE 4

Motivation: The Voting Problem

Scenario: Alice, a human, wishes to transmit

message c Є C to central tallier, Trent.

Security requirements

 Anonymity  Accuracy  etc.

slide-5
SLIDE 5

Motivation: Traditional Approach

 Paper-based systems

 Alice creates physical vote record and relays the vote to

Trent.

 Disadvantages

 Inaccurate  Expensive

 Advantages

 Simple, usable  Secure (?)

slide-6
SLIDE 6

Motivation: Electronic Voting

 Current state of electronic voting systems

 Systems entrust untrustworthy voting terminals, volunteers  Security policy dictates isolation and physical controls

 Advantages

 Relatively inexpensive  Accurate

 Disadvantages

 Fails to use public infrastructure  Vulnerable to automated attacks  Vulnerable to undetectable attacks

slide-7
SLIDE 7

Motivation: Electronic Voting

 Current state of electronic voting systems

 Systems entrust untrustworthy voting terminals, volunteers  Security policy dictates isolation and physical controls

 Advantages

 Relatively inexpensive  Accurate

 Disadvantages

 Fails to use public infrastructure  Vulnerable to automated attacks  Vulnerable to undetectable attacks

slide-8
SLIDE 8

Motivation: Electronic Voting

 Solution: Blind signature protocol with trustworthy hardware

 Direct communication with Trent – infeasible!  Trustworthy voting terminals – costly!  Personal tamper resistant device – yes!

 Problem: How can we establish a trusted path between Alice

and her voting device?

 Direct I/O? Form factor prohibits this.  Via voting terminal? No!  CAPTCHA-Voting Protocol?

 Other schemes (Chaum, Prêt-à-Voter, KHAP)

 Voter performs verification and auditing steps.

slide-9
SLIDE 9

Related Work

Completely Automated

Publicly Available Turing Tests to tell Computers and Humans Apart (CAPTCHAs)

One-time random

substitution

slide-10
SLIDE 10

Trent

Protocol: Actors

Alice a human voter Trent a central tallier, trusted to perform complex, anonymous operations on Alice's behalf Mallory an untrusted voting terminal

Alice

Mallory

slide-11
SLIDE 11

Protocol

 Public list of candidates C = [ c1 , c2 , … , cn ]  Public, random set R = [ r1 , r2 , … , rm ] such that m ≥ n  Random mapping of candidates to random elements

K : C → R such that

 P( K(c) = ri ) = P( K(c) = rj ) for all i, j  K-1 : R → C

 CAPTCHA transformation function T(m) such that Mallory

cannot derive m from T(m), while Alice may infer m from T(m)

 Trent may encode K using T. This is denoted by T(K).

slide-12
SLIDE 12

Protocol

  • 1. Trent generates and sends a CAPTCHA-encrypted ballot.

1.1. K : C → R Trent

Alice

Mallory

slide-13
SLIDE 13

Protocol

  • 1. Trent generates and sends a CAPTCHA-encrypted ballot.

1.1. K : C → R 1.2. T(K) Trent

Alice

Mallory

slide-14
SLIDE 14

Protocol

  • 1. Trent generates and sends a CAPTCHA-encrypted ballot.

1.1. K : C → R 1.2. T(K) 1.3. T(K) Trent

Alice

Mallory

slide-15
SLIDE 15

Protocol

  • 2. Alice responds with the encrypted candidate.

1.1. K : C → R 1.2. T(K) 1.3. T(K) 2.1. T -1( T(K) ) = K Trent

Alice

Mallory

slide-16
SLIDE 16

Protocol

  • 2. Alice responds with the encrypted candidate.

1.1. K : C → R 1.2. T(K) 1.3. T(K) 2.1. T -1( T(K) ) = K 2.2. K(c) = r Trent

Alice

Mallory

slide-17
SLIDE 17

Protocol

  • 2. Alice responds with the encrypted candidate.

1.1. K : C → R 1.2. T(K) 1.3. T(K) 2.1. T -1( T(K) ) = K 2.2. K(c) = r 2.3. r Trent

Alice

Mallory

slide-18
SLIDE 18

Protocol

  • 3. Trent decrypts Alice's preferred candidate.

1.1. K : C → R 1.2. T(K) 1.3. T(K) 2.1. T -1( T(K) ) = K 2.2. K(c) = r 2.3. r 3.1. K -1(r) = c Trent

Alice

Mallory

slide-19
SLIDE 19

Examples

Text CAPTCHA 3D Animation CAPTCHA Audio CAPTCHA

slide-20
SLIDE 20

Example: Text CAPTCHA

R consists of

distinct regions in image.

T renders mapping

as image and contributes noise.

slide-21
SLIDE 21

Example: 3D Animation CAPTCHA

R consists of

equally sized, contiguous sets of frames.

T renders candidate

names in animation.

slide-22
SLIDE 22

Example: Audio CAPTCHA

K is a similar,

temporal mapping

  • f candidates.

Audio noise thwarts

Mallory.

slide-23
SLIDE 23

Analysis

Fabricated votes Human adversaries Selective denial of service

slide-24
SLIDE 24

Analysis: Fabricated Votes

 Fabricated vote through guessed K

 Mallory attempts to vote for c' through selection of

arbitrary r''.

 If |R| = |C|, then P( K-1(r'') = c' ) = 1 / n.  If |R| > |C|, then P( K-1(r'') = c' ) = 1 / m.

 Probability that K-1(r'') is undefined: (m – n) / m  Invalid vote → detected attack!

 Fabricated vote through cracked T

 Mallory increases probability that P( K-1(r'') = c' ).  Solution: Find a better CAPTCHA?

slide-25
SLIDE 25

Analysis: Human Adversary

Transmission of T(K) to a human

collaborator

Time-dependent protocol Increased likelihood of detection Architectural solutions

slide-26
SLIDE 26

Analysis: Selective DoS

 Selective DoS: Mallory discards Alice's vote if it is

likely that c ≠ c'.

 Mallory must learn Alice's preference.

 Alice and Mallory's location  Alice's previous votes

 Solution: Single ballot

 Fabricated ballot

 Detection of selective denial of service  Educated guessing

slide-27
SLIDE 27

Conclusion

Human interaction required – no efficient

automated attacks

Easy detection of large-scale attacks Comparison to traditional voting systems Future work

 Usability data  Broader applications, using this protocol

(possibly combined with KHAP) to form a trusted path

slide-28
SLIDE 28

Questions?

slide-29
SLIDE 29

Questions?