SlideShare ist ein Scribd-Unternehmen logo
1 von 51
Press to Vote?
Security Analysis of
    Indian EVM
            By
       Hari Prasad
History Of EVMs
Evms are introduced by ECI in the year 1982

EVM design defined by ECI and developed &
manufactured by ECIL & BEL respectively.

ECIL uses H8 series MCU of Renesas chip &
BEL uses Pic MCU of Microchip.

Design improvements done after 1989 & 2006

Used Nation wide from 2004
EVM origin
Binary of the source code(binary) given to the Chip
Vendor for fusing into chip permanently

OTP/Mask chips are delivered to the Manufacturer thru
supply chain

EVMs manufactured delivered to district electoral offices

A functional test before a non-techie certifies the
integrity of EVM

EVM records are maintained at manufacturer end

ECI assumes EVMs delivered are authentic machines
EVM stocks-2009
Design Motivation
World’s largest democracy

  Last election:
    400M votes cast on 1.4M machines

Unique constraints

  Cost

  Power

  Environmental Conditions

  Voter Illiteracy
Ballot Unit
Battery
Display unit
What ECI claimed...


    EVMS
What ECI claimed...

“Perfect”

            EVMS
What ECI claimed...

“Perfect”          “Tamperproof”

            EVMS
What ECI claimed...

“Perfect”          “Tamperproof”

            EVMS
                    “Infallible”
What ECI claimed...

 “Perfect”           “Tamperproof”

              EVMS
“No need to           “Infallible”
  improve”
Doubts... and a Public Challenge

 After surprising 2009 election results, major
 parties raised doubts…

 ECI issued public challenge: Demonstrate
 tampering on a real machine at ECI headquarters

 9/09: Hari Prasad and team accepts challenge,
 only to be halted after 10 mins examining the
 machine
   Explanation: Intellectual property concerns!


 New ECI rules: Must show “Normal Tampering”
  !   ! ! (i.e., without opening the machine)
Our Analysis

Feb 2010: Anonymous source approaches
Hari, provides access to a machine

Feb.-April: Very little sleep

April 29, 2010: Release our findings on web
and Indian TV
Inside the black box
Inside the black box
Inside the black box
Inside the black box
Inside the black box
Inside the black box
Inside the black box
Classes of vulnerabilities


  Dishonest look-Alikes

  Tampering internal state

  Insider attacks & secret software
Protections & Seals
Dishonest Look-Alikes
Tampering internal state
Insiders& Secret Software
???
?
Voters have no other choice but
        to trust EVMs...
What Present EVMs lack:
Transparency
    - ECI doesn’t own the source code
    - ECI never checked the source code
    - 3-4 junior engineers only know what’s in the Code as per
        Prof. Indiresan
    - EVM stocks never made Public
Verifiability
    -   Firmware burnt outside India
    -   Deliberately designed to prevent reading out Code
    -   Even ECI cannot verify the authenticity
    -   No scientific process to verify components inside EVM
Questions Un-Answered
 Why are we using a generic chip instead of
 an ASIC ?

 Did all CEOs respond with EVM stocks to
 ECI ?

 Are all Master stock registers of EVMs
 Intact ?

 Why was randomization software allowed to
 be developed locally ?
Reactions
Summer 2010..

    Buzz in the media & Political circles

    ECI publicly denies any problems:
    ! ! Machines still “practically tamperproof”

    Behind the scenes, ECI not happy….

! ! Launches police investigation charging that
  ! EVM used for study is stolen
!"#$%&'()"'$*
Result......



???
Result......




Detained for 8 days :-)
What is needed ?
Transparency addressed:
   Open standards to be adopted
   EVM life cycle to be made public
   EVM design to be kept always open for ethical hacking
Verifiability needs:
   VVPAT (Voter verifiable paper audit trail)
   Precinct optical scan voting machines
   Cryptographic voting
   Open source Authentication tool to verify the program code
   at all functional states, be developed under certification of
   NIC similar to SCOSTA
   Verification tools to be made available to everyone
Conclusion
ECI should encourage/invite proposals from
technical experts across the country to propose a
tamper proof designs.

Let develop a transparent voting system that
meets needs and challenges of India

ECI should constitute a new body of experts from
all sections to vet the designs proposed

ECI should be the sole owner of all technologies
involved in Election process

Weitere ähnliche Inhalte

Ähnlich wie nullcon 2011 - Security Analysis of India’s electronic voting machines: Memoirs of a whistleblower

Prototyping of Indian Electronic Voting Machine
Prototyping of Indian Electronic Voting MachinePrototyping of Indian Electronic Voting Machine
Prototyping of Indian Electronic Voting MachineIJERDJOURNAL
 
IRJET- Biometric based Electronic Voting Machine (EVM) using Arduino IDE
IRJET-  	  Biometric based Electronic Voting Machine (EVM) using Arduino IDEIRJET-  	  Biometric based Electronic Voting Machine (EVM) using Arduino IDE
IRJET- Biometric based Electronic Voting Machine (EVM) using Arduino IDEIRJET Journal
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET Journal
 
An AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOAn AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOYogeshIJTSRD
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerProduct of Things
 
Fingerprint for security system
Fingerprint for security systemFingerprint for security system
Fingerprint for security systemvishnuchiluka
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerIOSR Journals
 
Efficacious electronic voting using biometry
Efficacious electronic voting using biometryEfficacious electronic voting using biometry
Efficacious electronic voting using biometryIAEME Publication
 
Hack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the UserHack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the UserNew Horizons Bulgaria
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system securityAdeel Javaid
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting SystemIJMTST Journal
 
Global wireless e-voting
Global wireless e-votingGlobal wireless e-voting
Global wireless e-votingPREMKUMAR
 
Market Potential of Home Automation
Market Potential of Home AutomationMarket Potential of Home Automation
Market Potential of Home AutomationDinna Dsouza
 
Footprinting _ By Mujmmil Shaikh
Footprinting _ By Mujmmil ShaikhFootprinting _ By Mujmmil Shaikh
Footprinting _ By Mujmmil ShaikhMujmmil Shaikh
 
CIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl Martin
CIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl MartinCIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl Martin
CIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl MartinCloudIDSummit
 
We Deserver Better _ Gus Lagman
We Deserver Better _ Gus LagmanWe Deserver Better _ Gus Lagman
We Deserver Better _ Gus LagmanMark Joaquin Ruiz
 
The Year the Internet Fell Apart
The Year the Internet Fell ApartThe Year the Internet Fell Apart
The Year the Internet Fell ApartIBM Security
 

Ähnlich wie nullcon 2011 - Security Analysis of India’s electronic voting machines: Memoirs of a whistleblower (20)

Prototyping of Indian Electronic Voting Machine
Prototyping of Indian Electronic Voting MachinePrototyping of Indian Electronic Voting Machine
Prototyping of Indian Electronic Voting Machine
 
IRJET- Biometric based Electronic Voting Machine (EVM) using Arduino IDE
IRJET-  	  Biometric based Electronic Voting Machine (EVM) using Arduino IDEIRJET-  	  Biometric based Electronic Voting Machine (EVM) using Arduino IDE
IRJET- Biometric based Electronic Voting Machine (EVM) using Arduino IDE
 
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
IRJET - Real Time Face Recognition in Electronic Voting System using RFID and...
 
An AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLOAn AI Based ATM Intelligent Security System using Open CV and YOLO
An AI Based ATM Intelligent Security System using Open CV and YOLO
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
Fingerprint for security system
Fingerprint for security systemFingerprint for security system
Fingerprint for security system
 
J010125765
J010125765J010125765
J010125765
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
 
Efficacious electronic voting using biometry
Efficacious electronic voting using biometryEfficacious electronic voting using biometry
Efficacious electronic voting using biometry
 
Hack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the UserHack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the User
 
Electronic voting system security
Electronic voting system securityElectronic voting system security
Electronic voting system security
 
Captiosus Voting System
Captiosus Voting SystemCaptiosus Voting System
Captiosus Voting System
 
Global wireless e-voting
Global wireless e-votingGlobal wireless e-voting
Global wireless e-voting
 
Market Potential of Home Automation
Market Potential of Home AutomationMarket Potential of Home Automation
Market Potential of Home Automation
 
Footprinting _ By Mujmmil Shaikh
Footprinting _ By Mujmmil ShaikhFootprinting _ By Mujmmil Shaikh
Footprinting _ By Mujmmil Shaikh
 
CIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl Martin
CIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl MartinCIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl Martin
CIS 2015- Wearable Technology: The Identity Slice of the IoT Pie- Karl Martin
 
We Deserver Better _ Gus Lagman
We Deserver Better _ Gus LagmanWe Deserver Better _ Gus Lagman
We Deserver Better _ Gus Lagman
 
Ai e-accountability
Ai e-accountabilityAi e-accountability
Ai e-accountability
 
EVM.pptx
EVM.pptxEVM.pptx
EVM.pptx
 
The Year the Internet Fell Apart
The Year the Internet Fell ApartThe Year the Internet Fell Apart
The Year the Internet Fell Apart
 

Mehr von n|u - The Open Security Community

Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...n|u - The Open Security Community
 

Mehr von n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Kürzlich hochgeladen

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Kürzlich hochgeladen (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

nullcon 2011 - Security Analysis of India’s electronic voting machines: Memoirs of a whistleblower

  • 2. Security Analysis of Indian EVM By Hari Prasad
  • 3. History Of EVMs Evms are introduced by ECI in the year 1982 EVM design defined by ECI and developed & manufactured by ECIL & BEL respectively. ECIL uses H8 series MCU of Renesas chip & BEL uses Pic MCU of Microchip. Design improvements done after 1989 & 2006 Used Nation wide from 2004
  • 4. EVM origin Binary of the source code(binary) given to the Chip Vendor for fusing into chip permanently OTP/Mask chips are delivered to the Manufacturer thru supply chain EVMs manufactured delivered to district electoral offices A functional test before a non-techie certifies the integrity of EVM EVM records are maintained at manufacturer end ECI assumes EVMs delivered are authentic machines
  • 6. Design Motivation World’s largest democracy Last election: 400M votes cast on 1.4M machines Unique constraints Cost Power Environmental Conditions Voter Illiteracy
  • 7.
  • 13. What ECI claimed... “Perfect” “Tamperproof” EVMS
  • 14. What ECI claimed... “Perfect” “Tamperproof” EVMS “Infallible”
  • 15. What ECI claimed... “Perfect” “Tamperproof” EVMS “No need to “Infallible” improve”
  • 16. Doubts... and a Public Challenge After surprising 2009 election results, major parties raised doubts… ECI issued public challenge: Demonstrate tampering on a real machine at ECI headquarters 9/09: Hari Prasad and team accepts challenge, only to be halted after 10 mins examining the machine Explanation: Intellectual property concerns! New ECI rules: Must show “Normal Tampering” ! ! ! (i.e., without opening the machine)
  • 17. Our Analysis Feb 2010: Anonymous source approaches Hari, provides access to a machine Feb.-April: Very little sleep April 29, 2010: Release our findings on web and Indian TV
  • 25. Classes of vulnerabilities Dishonest look-Alikes Tampering internal state Insider attacks & secret software
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 41. ???
  • 42. ? Voters have no other choice but to trust EVMs...
  • 43. What Present EVMs lack: Transparency - ECI doesn’t own the source code - ECI never checked the source code - 3-4 junior engineers only know what’s in the Code as per Prof. Indiresan - EVM stocks never made Public Verifiability - Firmware burnt outside India - Deliberately designed to prevent reading out Code - Even ECI cannot verify the authenticity - No scientific process to verify components inside EVM
  • 44. Questions Un-Answered Why are we using a generic chip instead of an ASIC ? Did all CEOs respond with EVM stocks to ECI ? Are all Master stock registers of EVMs Intact ? Why was randomization software allowed to be developed locally ?
  • 46. Summer 2010.. Buzz in the media & Political circles ECI publicly denies any problems: ! ! Machines still “practically tamperproof” Behind the scenes, ECI not happy…. ! ! Launches police investigation charging that ! EVM used for study is stolen
  • 50. What is needed ? Transparency addressed: Open standards to be adopted EVM life cycle to be made public EVM design to be kept always open for ethical hacking Verifiability needs: VVPAT (Voter verifiable paper audit trail) Precinct optical scan voting machines Cryptographic voting Open source Authentication tool to verify the program code at all functional states, be developed under certification of NIC similar to SCOSTA Verification tools to be made available to everyone
  • 51. Conclusion ECI should encourage/invite proposals from technical experts across the country to propose a tamper proof designs. Let develop a transparent voting system that meets needs and challenges of India ECI should constitute a new body of experts from all sections to vet the designs proposed ECI should be the sole owner of all technologies involved in Election process

Hinweis der Redaktion

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. Motivation behind simple design: several unique constraints must function under\nIndia world’s largest, EV nationwide since 2004\nAlmost 1.5M machines, cost must be low ($200USD)\nIn many rural parts of India, power is unreliable. \nThese machines must also operate in extremes of temperature and humidity, and survive hazards such as dust, pollution and apparently fungus. \nLiteracy rate 66%\nFinally, there is the problem of Booth capture, a form of attack on paper ballots, where a group of criminals take over a polling place by force, and manually stuff the ballot box until the police show up.\n\n
  7. So these design constraints lead to a very simple voting machine. We performed a security analysis of this voting machine. There are two units, joined by a 5m cable. On the left is the ballot unit that voters use to cast their ballot. On the right is the control unit, which totals the votes and displays the results after the election. \n\n
  8. On the ballot unit, a voter simply presses a button next to their desired candidate to cast a vote. An arrow lights up next to the button, indicating the vote has been counted. As elections typically only have one race, the ballot is a list of candidate names, and associated symbol. The symbol helps illiterate voters choose their candidate. \n\n
  9. Here we see the Control Unit, which keeps track of the votes and displays the results after an election. A series of elaborate plastic doors guards different buttons, used at various times before, during and after an election. For example, at the end of the election, a worker presses the “Result” button…\n\n
  10. Which causes the machine to output the election results on the display. The poll worker holds up the machine for everyone to see in a public tallying session, as it iterates through its output. In this case, the control unit shows candidate 1 received 7 votes. The machine will go on to show the votes for candidate 2, and so on\n\n
  11. The EC maintains that the machines are perfectly secure. Here are some of the things they’ve been saying about them…\n\n
  12. The EC maintains that the machines are perfectly secure. Here are some of the things they’ve been saying about them…\n\n
  13. The EC maintains that the machines are perfectly secure. Here are some of the things they’ve been saying about them…\n\n
  14. The EC maintains that the machines are perfectly secure. Here are some of the things they’ve been saying about them…\n\n
  15. The EC maintains that the machines are perfectly secure. Here are some of the things they’ve been saying about them…\n\n
  16. \n
  17. After being turned away by the election commission, Hari was approached by an anonymous source, in February of this year. The source was also concerned about the security of these machines, and gave Hari access to a machine to study on his own, under the condition of anonymity.\n\n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. The smaller board is called the display board. This board outputs the results of the election, on 6 7-segment LED digit displays. It is connected to the main board by a 15-pin ribbon cable, and is itself completely stateless. The main board drives a multiplexed signal to the LEDs to illuminate them directly.\n\n\n
  24. \n
  25. The physical security is protected by simple seals. Seen here in images from a voting official training video, the seals are made out of nothing more than wax, and bits of twine. In the lower panel, we see the screw holes are covered by ink-jet printed stickers.\n\n
  26. \n
  27. We called the larger board of the two boards, the main board. The processor on the main board is an 8-bit microcontroller manufactured by Renesas, running at 8.8MHz. The microcontroller contains the election firmware in an on-chip masked ROM. Also on the board, is a pair of EEPROM chips. These chips store redundant copies \n
  28. An attacker could replace any component of the machine with a dishonest, including the entire control unit itself. \n\nWe prototyped a simpler attack device, which replaces the display board inside the control unit. \n\n\n
  29. An attacker could replace any component of the machine with a dishonest, including the entire control unit itself. \n\nWe prototyped a simpler attack device, which replaces the display board inside the control unit. \n\n\n
  30. \n
  31. \n
  32. \n
  33. We were able to analyze the data format stored on these EEPROM chips on the main board.\n\n
  34. We found the data format is very simple—it contains an array of one-byte records, each encoding the candidate number for a single vote. These records are stored in the order in which the votes were cast, giving an attacker a way to violate ballot secrecy.\n\nWe can rewrite the votes by wiring directly to the memory chips, but we decided to try to miniaturize this attack and see whether it could be made into a \n
  35. We created this miniature attack device, which we nicknamed it “Clippy”. \n\n
  36. Clippy attaches directly to the memory chips inside the machine, with the power on, and rewrites the votes.\n\n
  37. It takes only a couple of seconds to change the votes…then the green LED lights up to indicate that it’s “done.”\n\n
  38. The knob on top allows an attacker to choose which candidate he would like to win. \n\nAlternatively, setting the knob to position 0, allows him to read out the one-byte records of votes, and copy them to a laptop. Later, the attacker can correlate the \nOur attack device clips directly to each EEPROM chip, and reprograms the contents. The microcontroller on the main board is held in reset with a single jumper during the attack. Our device, which is powered completely from the machine, uses a PIC microcontroller to talk I2C to the EEPROM chips. \n\nBecause of the machine’s simplicity, we were able to build Clippy inexpensively—it would cost just a few dollars to make in quantity. It’s also discreet--small enough to fit in a shirt pocket.\n\nClippy could be used by dishonest insiders to steal votes, or by outsider criminals to perform an electronic form of booth capture. The software inside the control unit prevents more than 5 votes per minute from being recorded, but, since Clippy directly rewrite the vote storage memory, it can bypass this software rate limit and cast thousands \n
  39. \n
  40. Our previous two attacks focused on modifying state and hardware after the electronic voting machine had been deployed. Our final attack looks at how an insider might tamper with the results of an election by modifying the internal vote-counting _software_.\n\n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. \n
  50. \n