E-voting Attacks and Countermeasures

被引:1
|
作者
Ibn Ziad, M. Tarek [1 ]
Al-Anwar, Amr [1 ]
Alkabani, Yousra [1 ]
El-Kharashi, M. Watheq [1 ]
Bedour, Hassan [1 ]
机构
[1] Ain Shams Univ, Dept Comp & Syst Engn, Cairo 11517, Egypt
来源
2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA) | 2014年
关键词
E-voting; hardware spyware; hardware Trojan; security; HARDWARE TROJAN DETECTION;
D O I
10.1109/WAINA.2014.53
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic voting (e-voting) systems have been in use since the 1960s. E-voting offers many advantages compared to other voting techniques. However, it also introduces many security challenges. As it may contain malicious back-doors that can affect system dependability. In this work, we present one of e-voting challenges where the hardware Trojan tampers results totally. We implement an e-voting machine as a case study on Xilinx FPGA board. Then, we inject a hardware Trojan to tamper voting results. The attack depends mainly on the unused bits. We provide a protection technique and show its overhead. Furthermore, we introduce other attacks and protection scenarios. We compare between our selected protection techniques and others techniques. Finally, we illustrate that our chosen protection technique incurs negligible power overhead, whereas the average area and delay overheads are 4% and 10%, respectively.
引用
收藏
页码:269 / 274
页数:6
相关论文
共 50 条
  • [1] Kleptographic attacks on e-voting schemes
    Gogolewski, Marcin
    Klonowski, Marek
    Kubiak, Przemyslaw
    Kutylowski, Miroslaw
    Lauks, Anna
    Zagorski, Filip
    EMERGING TRENDS IN INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 2006, 3995 : 494 - 508
  • [2] Clash Attacks on the Verifiability of E-Voting Systems
    Kuesters, Ralf
    Truderung, Tomasz
    Vogt, Andreas
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 395 - 409
  • [3] E-voting
    Teske, N
    NEW REPUBLIC, 1999, 221 (17) : 5 - +
  • [4] E-voting
    Kramer, Mark
    COMPUTER, 2008, 41 (04) : 5 - 6
  • [5] E-Voting with Blockchain: An E-Voting Protocol with Decentralisation and Voter Privacy
    Hardwick, Freya Sheer
    Gioulis, Apostolos
    Akram, Raja Naeem
    Markantonakis, Konstantinos
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1561 - 1567
  • [6] Electronic Voting (E-Voting) in Indonesia: Reflection On E-Voting Practices in Some Countries
    Fanida, Eva Hany
    Manda, Darman
    Mandagi, Marthinus
    PROCEEDINGS OF THE 1ST INTERNATIONAL CONFERENCE ON SOCIAL SCIENCES (ICSS 2018), 2018, 226 : 150 - 155
  • [7] E-voting security
    Dill, DL
    Rubin, AD
    IEEE SECURITY & PRIVACY, 2004, 2 (01) : 22 - 23
  • [8] E-voting - Reply
    不详
    DR DOBBS JOURNAL, 2004, 29 (06): : 8 - 8
  • [9] Prospects for e-voting
    Ryan, P
    Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005, : 501 - 501
  • [10] Risks of e-voting
    Bishop, Matt
    Wagner, David
    COMMUNICATIONS OF THE ACM, 2007, 50 (11) : 120 - 120