E-Voting Attacks and Countermeasures

Electronic voting (e-voting) systems have been inuse since the 1960s. E-voting offers many advantages compared to other voting techniques. However, it also introduces many security challenges. As it may contain malicious back-doors that can affect system dependability. In this work, we present one o...

Full description

Saved in:
Bibliographic Details
Published in:2014 28th International Conference on Advanced Information Networking and Applications Workshops pp. 269 - 274
Main Authors: Tarek Ibn Ziad, M., Al-Anwar, Amr, Alkabani, Yousra, El-Kharashi, M. Watheq, Bedour, Hassan
Format: Conference Proceeding
Language:English
Published: IEEE 01-05-2014
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Electronic voting (e-voting) systems have been inuse since the 1960s. E-voting offers many advantages compared to other voting techniques. However, it also introduces many security challenges. As it may contain malicious back-doors that can affect system dependability. In this work, we present one of e-voting challenges where the hardware Trojan tampers results totally. We implement an e-voting machine as a case study on XilinxFPGA board. Then, we inject a hardware Trojan to tamper voting results. The attack depends mainly on the unused bits. We provide a protection technique and show its overhead. Furthermore, we introduce other attacks and protection scenarios. We compare between our selected protection techniques and others techniques. Finally, we illustrate that our chosen protection technique incurs negligible power overhead, whereas the average area and delay overheads are 4% and 10%, respectively.
DOI:10.1109/WAINA.2014.53