Princeton group hacks Diebold voting machine

September 14, 2006

Abstract from the Center for Information Technology Policy at Princeton University on breaking the security of a Diebold voting machine, should we make a collection and send them a Smartmatic machine? You can watch the video showing the hacking:. Who was it that said Venezuela had the safest voting system in the world? Ignorance is bliss indeed!

Security Analysis of the Diebold AccuVote-TS Voting Machine

Ariel J. Feldman, J. Alex Halderman, and Edward W. Felten

Abstract   This paper presents a fully independent
security study of a Diebold AccuVote-TS voting machine, including its
hardware and software. We obtained the machine from a private party.
Analysis of the machine, in light of real election procedures, shows
that it is vulnerable to extremely serious attacks. For example, an
attacker who gets physical access to a machine or its removable memory
card for as little as one minute could install malicious code;
malicious code on a machine could steal votes undetectably, modifying
all records, logs, and counters to be consistent with the fraudulent
vote count it creates. An attacker could also create malicious code
that spreads automatically and silently from machine to machine during
normal election activities ó a voting-machine virus. We have
constructed working demonstrations of these attacks in our
lab. Mitigating these threats will require changes to the voting
machine’s hardware and software and the adoption of more rigorous
election procedures.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: