Dr. Dobb's is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


Channels ▼
RSS

Embedded Systems

Root the Vote: The Hard and the Soft


Can It Be That Bad?

Pulling off a successful vote-fraud attack on electronic voting machines requires considerable skill, which means it won't happen immediately. In fact, I'd be surprised if any of these attacks occur in the next two election cycles, if only because reverse engineering requires both time and testing on a reasonably stable inventory of machines. We haven't deployed enough machines for long enough to make an attack practical.

However, even an "unsuccessful" attack will be devastating if it's widespread enough. An attack that simply crashes a district's voting machines could invalidate an entire local election. Consider the history of PC viruses. The earliest ones displayed amusing (at least, to the creator) messages; subsequent ones either crashed the PC or deleted files; and nowadays, viruses tend to install silent keyloggers or enlist the PC into a botnet. Because the results have economic value, programmers working for money, rather than artistic effect, produce the most recent viruses.

We won't see many amateur voting-machine attacks, except on the local level for relatively small elections. We will see national-scale attacks produced by teams with national-level resources, simply because the stakes are so high and the result is so attractive. Whether those teams work abroad or within our borders remains to be seen.

In reality, we probably won't see those attacks unless we're very, very lucky. We might, possibly, detect an attack after the fact, but the current security surrounding electronic voting machines makes even that fairly unlikely.

Remember: They're smarter, have better resources, and display more motivation than anyone you can hire.


Related Reading


More Insights






Currently we allow the following HTML tags in comments:

Single tags

These tags can be used alone and don't need an ending tag.

<br> Defines a single line break

<hr> Defines a horizontal line

Matching tags

These require an ending tag - e.g. <i>italic text</i>

<a> Defines an anchor

<b> Defines bold text

<big> Defines big text

<blockquote> Defines a long quotation

<caption> Defines a table caption

<cite> Defines a citation

<code> Defines computer code text

<em> Defines emphasized text

<fieldset> Defines a border around elements in a form

<h1> This is heading 1

<h2> This is heading 2

<h3> This is heading 3

<h4> This is heading 4

<h5> This is heading 5

<h6> This is heading 6

<i> Defines italic text

<p> Defines a paragraph

<pre> Defines preformatted text

<q> Defines a short quotation

<samp> Defines sample computer code text

<small> Defines small text

<span> Defines a section in a document

<s> Defines strikethrough text

<strike> Defines strikethrough text

<strong> Defines strong text

<sub> Defines subscripted text

<sup> Defines superscripted text

<u> Defines underlined text

Dr. Dobb's encourages readers to engage in spirited, healthy debate, including taking us to task. However, Dr. Dobb's moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing or spam. Dr. Dobb's further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | View the list of supported HTML tags you can use to style comments. | Please read our commenting policy.