Lecture 5 - Security Procedures
Lecture 5 - Security Procedures
g Democracyy
Lecture 5 | Securityy Procedures
J. Alex Halderman
University of Michigan
5.1 Voter Registration Securing Digital Democracy
Voter Registration
5.1 Voter Registration Securing Digital Democracy
Voter Enfranchisement
A th ti ti
Authentication
https://www.sos.ca.gov/elections/register‐to‐vote/app‐pdf/english‐blank.pdf
5.1 Voter Registration Securing Digital Democracy
5.1 Voter Registration Securing Digital Democracy
Voter
V t Registration
R i t ti Databases
D t b (VRDs)
(VRD )
Voter Enfranchisement
A th ti ti
Authentication
Security Privacy
5.1 Voter Registration Securing Digital Democracy
5.1 Voter Registration Securing Digital Democracy
5.1 Voter Registration Securing Digital Democracy
5.1 Voter Registration Securing Digital Democracy
5.1 Voter Registration Securing Digital Democracy
5.1 Voter Registration Securing Digital Democracy
5.1 Voter Registration Securing Digital Democracy
5.1 Voter Registration Securing Digital Democracy
5.2 Voter Authentication Securing Digital Democracy
Voter Authentication
5.2 Voter Authentication Securing Digital Democracy
Image by Joe Hall (Flickr user joebeone), licensed under a Creative Commons Attribution
license, http://www.flickr.com/photos/joebeone/292549434/
5.2 Voter Authentication Securing Digital Democracy
VoterID?
Voter
E f
Enfranchisement
hi t
Authentication
5.2 Voter Authentication Securing Digital Democracy
5.2 Voter Authentication Securing Digital Democracy
Image by Flickr user isafmedia, licensed under a Creative Commons Attribution 2.0 Generic license.
http://www.flickr.com/photos/isafmedia/5007269322/in/photostream/
5.2 Voter Authentication Securing Digital Democracy
Looking Ahead
Ahead…
5.3 Guarding Against Tampering Securing Digital Democracy
http://www.cs.princeton.edu/~appel/voting/SealsOnVotingMachines.pdf
5.3 Guarding Against Tampering Securing Digital Democracy
Tamper‐Evident Seals
http://www.cs.princeton.edu/~appel/voting/SealsOnVotingMachines.pdf
5.3 Guarding Against Tampering Securing Digital Democracy
Results
l for
f 244 Seals
l
Mean Median
Defeat
f time ffor 1.4 mins 43 secs
one person
Cost of $78 $5
tools/supplies
Cost per seal $0.62 $0.09
attacked
Time to devise 2.3 hrs 12 mins
successful attack
http://www.cs.princeton.edu/~appel/voting/SealsOnVotingMachines.pdf
5.3 Guarding Against Tampering Securing Digital Democracy
Cup
Seal
http://www.cs.princeton.edu/~appel/voting/SealsOnVotingMachines.pdf
5.3 Guarding Against Tampering Securing Digital Democracy
Padlock
Seal
http://www.cs.princeton.edu/~appel/voting/SealsOnVotingMachines.pdf
5.3 Guarding Against Tampering Securing Digital Democracy
Tape
p
Seals
http://www.cs.princeton.edu/~appel/voting/SealsOnVotingMachines.pdf
5.3 Guarding Against Tampering Securing Digital Democracy
New
N idea:
id “Anti‐evidence”
“A i id ”
192380 192380
‐‐‐‐‐‐
secret secret
erased
5.4 Field Testing Securing Digital Democracy
Field Testing
5.4 Field Testing Securing Digital Democracy
“Zero”
Zero
Tape
5.4 Field Testing Securing Digital Democracy
Parallel
Testing What if problems are found?
5.4 Field Testing Securing Digital Democracy
https://www.usenix.org/conference/evtwote12/automated‐analysis‐election‐audit‐logs
5.4 Field Testing Securing Digital Democracy
Human Factors
5.4 Field Testing Securing Digital Democracy
Tracking Problems
Securing g Digital
g Democracyy
Lecture 5 | Securityy Procedures
J. Alex Halderman
University of Michigan