security auditability and threats the vvsg2007 security
play

Security, Auditability, and Threats: The VVSG2007 Security - PowerPoint PPT Presentation

Technical Guidelines Development Committee Meeting December 4 and 5, 2006 Security, Auditability, and Threats: The VVSG2007 Security Architecture Presentation for the Technical Guidelines Development Committee (TGDC) John Kelsey Dec 4/ 5,


  1. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 Security, Auditability, and Threats: The VVSG2007 Security Architecture Presentation for the Technical Guidelines Development Committee (TGDC) John Kelsey Dec 4/ 5, 2006 National I nstitute of Standards and Technology VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 1

  2. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 Security Requirements � Goal: Write a standard that leads to secure voting systems! � We need to understand: � Security requirements and attacker goals/resources � Voting system architectures � Threats to voting systems � Write requirements to block attacks � Ensure those requirements are testable! Looking at the big picture VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 2

  3. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 Roadmap: Attackers-> Threats-> Standard � Understand attacker goals and resources � Determine how attacker might accomplish those goals --> Threats � Determine defenses to block threats � Write testable requirements to ensure presence and effectiveness of these defenses VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 3

  4. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 How Does VVSG2007 Address Threats? � For each voting system architecture: � Identify significant threats � Block threats (ideally, block whole classes of threat) � Blocking = Prevention or Detection Example: paper ballots in ballot box � Prevention: Padlock on ballot box � Detection: Tamper-evident seal on box VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 4

  5. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 Current Voting System Architectures � Precinct Count Optical Scan � Hand-marked � Ballot marking devices/ ballot printing devices � DRE+ VVPAT � Paper-roll � Cut-sheet � DRE VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 5

  6. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 What are the attacker’s goals? � Change outcome of election � This is where we spend most of our analysis! � Defeat ballot secrecy � With or without voter’s help � Disrupt election � Force election to be re-run or decided in courts VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 6

  7. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 How Do We Know About Threats? � History and folklore about voting systems � Harris book, election officials, voting people � Current information on computer attacks � Computer security literature, CERT, security people � Analysis of voting system components in the lab � Hopkins, RABA, Hursti, Princeton, Compuware,… � Analysis of voting systems w/ procedures � Brennan Center, NIST Threats Workshops VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 7

  8. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 Threat Methodology Wrong question: Can I tamper with a voting machine? Right question: Can I tamper with an election? � Consider a close statewide election: Look for ways to tamper with outcome! � Parameters like # voting machines, # polling places, how big change can be before noticed � Consider procedural defenses! � Evaluate attacks based on attack team size VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 8

  9. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 Roadmap: Attackers-> Threats-> Standard � Understand attacker goals and resources � Determine how attacker might accomplish those goals --> Threats � Determine defenses to block threats � Write testable requirements to ensure presence and effectiveness of these defenses VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 9

  10. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 Requiring Security Controls � Some threats can be prevented or detected by specific security controls � Event logs � Access control � Software distribtution � System configuration management � Digital signatures on electronic records VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 10

  11. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 Procedural Defenses � Some threats blocked by procedural defenses: � Example Threat : Tampering PCOS scanner software � Procedural Defense: Random auditing recount of ballots from a few precincts VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 11

  12. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 Procedures in an Equipment Standard? � Require equipment to support the procedures it needs to address threats for its architecture: � Specific hardware/software requirements to ensure that procedure can function effectively. � Documentation requirements: user documentation must show how to do procedure. � Technical documentation must show lab why procedure accomplishes desired security goals. VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 12

  13. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 Example: Parallel Testing � Determine if the voting machines are misbehaving on election day. � Procedure: Isolate a few random voting machines, run an all-day test on them. � Requirement: The voting machine must never be able to find out it’s being tested. VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 13

  14. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 This Leads to Equipment Req’ts � Voting machines…. � Must not receive signals during voting. � Must not learn they are being tested by authorizations to vote. � Must not have any observable change between test and voting environment � These are equipment requirements, needed to support parallel testing! VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 14

  15. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 And to Other Requirements � The voting machine documentation must explain how to carry out a parallel test � VSTL verifies that documentation gives a good parallel test--accomplishes security goals. � In open-ended testing, VSTL attempts to find: � Ways for voting machine to notice test environment � Ways for anyone to get message into voting machine VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 15

  16. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 How Are Requirements Enforced? Checklist -> Documentation -> OEVT � VSTL checks to make sure required security controls are present and correctly used. � Documentation requirements--VSTL reads and verifies correctness of documentation � OEVT--open-ended testing, VSTL attempts to find ways in which security of voting system can be violated. VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 16

  17. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 Conclusions � VVSG2007 security standards based heavily on threat analysis � Drawn from extensive literature review, historical data, and internal and external analysis, and workshops � Procedural requirements -> equipment and documentation requirements � Equipment, Documentation, and OEVT requirements fit together to improve chances of getting secure voting systems. VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 17

  18. Technical Guidelines Development Committee Meeting December 4 and 5, 2006 VVSG Security Architecture--Kelsey Dec 4/ 5, 2006 - Page 18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend