{"id":16049,"date":"2019-08-10T10:45:28","date_gmt":"2019-08-10T18:45:28","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/08\/10\/news-9792\/"},"modified":"2019-08-10T10:45:28","modified_gmt":"2019-08-10T18:45:28","slug":"news-9792","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/08\/10\/news-9792\/","title":{"rendered":"Hackers Take on Darpa&#8217;s $10 Million Voting Machine"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d4e13c9cd01ff000804cba3\/master\/pass\/security_defcon_voting-2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Sat, 10 Aug 2019 01:16:00 +0000<\/strong><\/p>\n<p><span class=\"lede\">For the last <\/span>two years, hackers have come to <a href=\"https:\/\/www.wired.com\/story\/defcon-election-threat-funding\">the Voting Village at the DefCon<\/a> security conference in Las Vegas to tear down voting machines and analyze them for vulnerabilities. But this year\u2019s Village features a fancy new target: a prototype secure voting machine created through a $10 million project at the Defense Advanced Research Projects Agency. You know it better as <a href=\"http:\/\/www.wired.com\/tag\/darpa\">Darpa<\/a>, the government&#x27;s mad science wing.<\/p>\n<p>Announced in March, the initiative aims to develop an open source voting platform built on secure hardware. The Oregon-based verifiable systems firm Galois is designing the voting system. And Darpa wants you to know: its endgame goes way beyond securing the vote. The agency hopes to use voting machines as a model system for developing a secure hardware platform\u2014meaning that the group is designing all the chips that go into a computer from the ground up, and isn\u2019t using proprietary components from companies like Intel or AMD.<\/p>\n<p class=\"paywall\">\u201cThe goal of the program is to develop these tools to provide security against hardware vulnerabilities,\u201d says Linton Salmon, the project\u2019s program manager at Darpa. \u201cOur goal is to protect against remote attacks.\u201d<\/p>\n<p class=\"paywall\">Other voting machines in the Village are complete, deployed products that attendees can take apart and analyze. But the Darpa machines are prototypes, currently running on virtualized versions of the hardware platforms they will eventually use. A basic user interface is currently being provided by the secure voting firm Voting Works.<\/p>\n<p>&quot;We want people to find things.&quot;<\/p>\n<p name=\"inset-left\" class=\"inset-left-component__el\">Dan Zimmerman, Galois<\/p>\n<p class=\"paywall\">To vote using the system, you go up to a touchscreen, make your picks (<em>Which Is The Best <em>Star Wars<\/em> Movie<\/em>; <em>Are Hot Dogs Sandwiches<\/em>), confirm your selections, and then send them to print out. Your selections appear along with a QR code in the upper right-hand corner of the page. Next, you feed your printed votes into a secure ballot box\u2014currently part of a filing cabinet frankensteined to some printer components. The ballot box scans the document as you insert it, and uses the QR code to perform a cryptographic validity check. If the paper doesn\u2019t pass the test, either by being fraudulent or from a different election, the scanner will reject the paper and won\u2019t record the vote.<\/p>\n<p class=\"paywall\">Currently all of the components that a voter would interact with are bare bones prototypes that don\u2019t provide much to hack. At the 2020 village, Darpa plans to have a more complete system for attendees to assess. But hackers can still probe the secure hardware infrastructure and attempt to find flaws in its layers of protection against hardware-based attacks, everything from complicated strikes <a href=\"https:\/\/www.wired.com\/story\/meltdown-spectre-bug-collision-intel-chip-flaw-discovery\">speculative execution attacks<\/a> and <a href=\"https:\/\/www.wired.com\/story\/rowhammer-ecc-memory-data-hack\">Rowhammer<\/a> to more common flaws like buffer overflows.<\/p>\n<p class=\"paywall\">Participants sitting down to assess the system on Friday told WIRED that it seems promising. And creating an open source secure hardware platform that anyone can incorporate into their products has the potential, beyond voting machines, to have a major impact on Internet of Things security overall.<\/p>\n<p class=\"paywall\">\u201cAll of this is here for people to poke at,\u201d says Dan Zimmerman, principal researcher at Galois. \u201cI don\u2019t think anyone has found any bugs or issues yet, but we want people to find things. We\u2019re going to make a small board solely for the purpose of letting people test the secure hardware in their homes and classrooms and we\u2019ll release that.\u201d<\/p>\n<p class=\"paywall\">There\u2019s also already a code repository on <a href=\"http:\/\/www.securehardware.org\" target=\"_blank\">securehardware.org<\/a> that hackers can analyze from afar. And the group has even embedded sample vulnerabilities in the code so researchers can see how the hardware platform works to minimize the threat that they pose and look for flaws in these defenses.<\/p>\n<p class=\"paywall\">\u201cThere\u2019s a terrible software vulnerability in there,\u201d says Dan Wallach, a security researcher at Rice University in Houston, Texas. \u201cI know because I wrote it. It\u2019s a web server that anyone can connect to and read\/write arbitrary memory. That\u2019s so bad. But the idea is that even with that in there, an attacker still won\u2019t be able to get to things like crypto keys or anything really. All they would be able to do right now is crash the system.\u201d<\/p>\n<p class=\"paywall\">Darpa and Galois hope that Defcon attendees will find bugs and have defense suggestions throughout the weekend, and that the larger community will have input as well. The system will also travel to a series of universities over the next two years for vetting by a range of academics.<\/p>\n<p class=\"paywall\">The point of the Voting Village has always been to find flaws in the hopes of making voting machines safer. But Darpa&#x27;s prototype may be the first time those discoveries are actually welcome.<\/p>\n<p class=\"paywall\"><em>All images Roger Kisby\/Redux Pictures.<\/em><\/p>\n<p class=\"related-cne-video-component__dek\">Jonna Mendez, former CIA Chief of Disguise, takes a look at spy scenes from a variety of television shows and movies and breaks down how accurate they really are.<\/p>\n<p><a href=\"https:\/\/www.wired.com\/story\/darpa-voting-machine-defcon-voting-village-hackers\" target=\"bwo\" >https:\/\/www.wired.com\/category\/security\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/media.wired.com\/photos\/5d4e13c9cd01ff000804cba3\/master\/pass\/security_defcon_voting-2.jpg\"\/><\/p>\n<p><strong>Credit to Author: Lily Hay Newman| Date: Sat, 10 Aug 2019 01:16:00 +0000<\/strong><\/p>\n<p>At this year&#8217;s Defcon hacking conference, Darpa brought the beginnings of what it hopes will be impervious hardware.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10607],"tags":[714,21357],"class_list":["post-16049","post","type-post","status-publish","format-standard","hentry","category-security","category-wired","tag-security","tag-security-security-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16049","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16049"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16049\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16049"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16049"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16049"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}