E-voting Attacks and Countermeasures

被引:1
作者
Ibn Ziad, M. Tarek [1 ]
Al-Anwar, Amr [1 ]
Alkabani, Yousra [1 ]
El-Kharashi, M. Watheq [1 ]
Bedour, Hassan [1 ]
机构
[1] Ain Shams Univ, Dept Comp & Syst Engn, Cairo 11517, Egypt
来源
2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA) | 2014年
关键词
E-voting; hardware spyware; hardware Trojan; security; HARDWARE TROJAN DETECTION;
D O I
10.1109/WAINA.2014.53
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic voting (e-voting) systems have been in use since the 1960s. E-voting offers many advantages compared to other voting techniques. However, it also introduces many security challenges. As it may contain malicious back-doors that can affect system dependability. In this work, we present one of e-voting challenges where the hardware Trojan tampers results totally. We implement an e-voting machine as a case study on Xilinx FPGA board. Then, we inject a hardware Trojan to tamper voting results. The attack depends mainly on the unused bits. We provide a protection technique and show its overhead. Furthermore, we introduce other attacks and protection scenarios. We compare between our selected protection techniques and others techniques. Finally, we illustrate that our chosen protection technique incurs negligible power overhead, whereas the average area and delay overheads are 4% and 10%, respectively.
引用
收藏
页码:269 / 274
页数:6
相关论文
共 29 条
[1]  
Al-Anwar A., 2013, EL COMM PHOT C SIECP, P1
[2]  
Al-Anwar A., 2013, 16 EUROMICRO C DIG S
[3]  
Alam Muhammad Raisul, 2008, 2008 11th International Conference on Computer and Information Technology (ICCIT), P264, DOI 10.1109/ICCITECHN.2008.4803028
[4]  
Alkabani Y. M., 2007, 16 USENIX SEC S USEN
[5]  
Banga M., 2008, P 18 ACM GREAT LAK S, P363, DOI [DOI 10.1145/1366110.1366196, 10.1145/13661101366196]
[6]   VITAMIN: Voltage Inversion Technique to Ascertain Malicious Insertions in ICs [J].
Banga, Mainak ;
Hsiao, Michael S. .
2009 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2009, :104-107
[7]   A Novel Sustained Vector Technique for the Detection of Hardware Trojans [J].
Banga, Mainak ;
Hsiao, Michael S. .
22ND INTERNATIONAL CONFERENCE ON VLSI DESIGN HELD JOINTLY WITH 8TH INTERNATIONAL CONFERENCE ON EMBEDDED SYSTEMS, PROCEEDINGS, 2009, :327-332
[8]   Preventing IC Piracy Using Reconfigurable Logic Barriers [J].
Baumgarten, Alex ;
Tyagi, Akhilesh ;
Zambreno, Joseph .
IEEE DESIGN & TEST OF COMPUTERS, 2010, 27 (01) :66-75
[9]  
Beaumont M, 2012, DES AUT TEST EUROPE, P1000
[10]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654