1 Raindrop

Gunnar Peterson's loosely coupled thoughts on distributed systems, security, and software that runs on them.

Recent Posts

  • Security Champions Guide to Web Application Security
  • Security > 140 Conversation with Pamela Dingle on Identity
  • 6 Things I Learned from Robert Garigue
  • The Curious Case of API Security
  • Security Capability Engineering
  • Ought implies can
  • Security > 140 Chat with T. Rob Wyatt on MQ and Middleware Security
  • Privilege User Management Bubble?
  • The part where security products solve the problem
  • Four Often Overlooked Factors to Give Your Security Team a Fighting Chance

Blogroll

  • Adding Simplicity - An Engineering Mantra
  • Adventures of an Eternal Optimist
  • Andy Steingruebl
  • Andy Thurai
  • Anton Chuvakin
  • Beyond the Beyond
  • cat slave diary
  • Ceci n'est pas un Bob
  • ConnectID
  • Cryptosmith
  • Emergent Chaos: Musings from Adam Shostack on security, privacy, and economics
  • Enterprise Integration Patterns: Gregor's Ramblings
  • Financial Cryptography
  • infosec daily: blogs
  • Jack Daniel
  • James Kobielus
  • James McGovern
  • John Hagel
  • Justice League [Cigital]
  • Kim Cameron's Identity Weblog
  • Krypted - Charles Edge's Notes from the Field
  • Lenny Zeltser
  • Light Blue Touchpaper
  • Mark O'Neill
  • Off by On
  • ongoing
  • Patrick Harding
  • Perilocity
  • Pushing String
  • Rational Survivability
  • rdist: setuid just for you
  • RedMonk
  • RiskAnalys.is
  • Rudy Rucker
  • Software For All Seasons
  • Spire Security Viewpoint
  • TaoSecurity
  • The New School of Information Security
  • Windley's Technometria
  • zenpundit
Blog powered by Typepad

Digital Elections Risks

Following up on a previous post, on Blaine Burnham's risk assessment of digital elections that "put the very fabric of the country at risk"

<risk assessment process>
"Hey, Sven ya got the risk/reward ratio spreadsheet done on those digital elections yet?"
"Ya sure, Ole, says here we can save at least 14 bucks, that's green in my book!"
"Ya betcha, well let's run with it Sven!"
</risk assessment process>

Of course, as Burnham stated in his address at Usenix security a few years ago, in computer security we basically only have two working mechanisms (which aint enough but that's another story). One is the reference monitor, and the other is crypto. A reference monitor would be a kinda useful thing to have in an election, right? After all it is

tamperproof, always-used, and small enough to be fully-tested and analyzed module that controls all software access to data objects or devices

Thats not too much to ask, is it? An audit trail? But apparently it is too much to ask:

"I'm on the Virginia state commission charged with making recommendations around voting systems, and we watched the Princeton video as part of our most recent meeting. The reaction from the election officials was amusing and scary: "if this is so real, why don't you hack a real election instead of this pretend stuff in the lab". Pointing out that it would (most likely) be a felony, and people like Rubin, Felten, and others are trying to help security not go to jail didn't seem to impress them. Also pointing out that the Rubin & Felten examples used out-of-date code because vendors won't share anything up-to-date doesn't seem to impress them. [This in response to Diebold's claim that they were looking at old code, and the problems are all "fixed".]

I frankly don't think anything is going to impress the election officials (and some of the elected officials) short of incontrovertible evidence of a DRE meltdown - and of course, we know that there could well be a failure (and may have been failures) that are unproveable thanks to the nature of software.

P.S. One of the elected officials on the commision insisted that Felten couldn't possibly have done his demo exploit without source code, because "everyone" knows you can't do an exploit without the
source. Unfortunately, the level of education that needs to be provided to someone like that is more than I can provide in a Q&A format. I tried giving as an example that around 50% of the Microsoft updates are due to flaws found by people without source, but he wouldn't buy it.... (he was using a Windows laptop, but doesn't seem to understand where the fixes come from)."

-Jeremy Epstein

And of course, why worry about software flaws when you can worry about hardware as well? Ed Felten:

Machines with flawed boards were normally identified when they “froze” on election day. When personal computers crash, they often manage to reboot themselves, but the Diebold machines don’t reboot themselves on a crash, so any kind of general system crash will make the system freeze. So the bug was usually identified when a voting machine crashed. Mystery crashes typically don’t happen at random times but are concerntrated at certain stages of the machine’s use, because the detailed technical conditions that trigger the crash are more likely to happen at some times than at others. ... Were votes ever actually corrupted? We’ll never know. If we had a voter-verified paper audit trail, we could compare it to the records kept by the crashed machines. But with only the electronic records to go on, it’s probably impossible to tell.

The good news is that all of the affected motherboards have now been replaced. The bad news is that Diebold knew about these problems in March 2004, and yet they allowed thousands of affected machines to be used in the November 2004 election.

Have a great super Tuesday! If you see any reference monitors say "hi" for me.

November 02, 2006 in Diebold, Election, Security | Permalink | Comments (1)

Blaine Burnham on Election Risks

Everyone's favorite election judge, Avi Rubin's work on crippling vulnerabilities in Diebbold reminded me of Usenix security 2000, and what Blaine Burnham said in his speech (he was talking about Internet voting, but the same concepts apply):

So we're putting money at risk. With ecommerce were putting large money at risk, but if Coca-Cola lost its secret formula today, we'd be out Coca-Cola. It's not the end of the world, its just Coca-Cola, for crying out loud. And on a given day taste tests can't tell 'em apart anyway. With remote surgery, with invasive medicine, we're putting people at risk. The game is changing. And with Internet voting we're putting the very fabric of the country at risk...because of this changing threat model and because of what we are putting at risk, the game is no longer a game. We have to get extraordinarily serious about what we are doing.

Blaine Burnham also said in his talk that "Las Vegas is the monument to the failure of high school mathematics teachers." Hopefully this election won't be the monument to the failure of computer security.

October 19, 2006 in Assurance, Election, Politics, Risk Management, Security | Permalink | Comments (0)

My Photo

SOS: Service Oriented Security

  • The Curious Case of API Security
  • Getting OWASP Top Ten Right with Dynamic Authorization
  • Top 10 API Security Considerations
  • Mobile AppSec Triathlon
  • Measure Your Margin of Safety
  • Top 10 Security Considerations for Internet of Things
  • Security Checklists
  • Cloud Security: The Federated Identity Factor
  • Dark Reading IAM
  • API Gateway Secuirty
  • Directions in Incident Detection and Response
  • Security > 140
  • Open Group Security Architecture
  • Reference Monitor for the Internet of Things
  • Don't Trust. And Verify.

Archives

  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015

More...

Subscribe to this blog's feed