Professional Documents
Culture Documents
Lecture 8 - Internet Voting
Lecture 8 - Internet Voting
Lecture 8 - Internet Voting
g Democracyy
Lecture 8 | Internet Voting?
g
J. Alex Halderman
University of Michigan
8.1 A Bad Idea Securing Digital Democracy
A Bad Idea
8.1 A Bad Idea Securing Digital Democracy
8.1 A Bad Idea Securing Digital Democracy
Estonia
Pilot Projects
in the U.S.
Limited to overseas
absentee voters.
voters
8.1 A Bad Idea Securing Digital Democracy
Potential Attackers?
Traditional Fraudsters
O li F
Online Fraudsters
d t
“Hacktivists”
ki i
Foreign States
8.2 Client‐side Threats Securing Digital Democracy
Client‐side Threats
8.1 A Bad Idea Securing Digital Democracy
Results
A: 1000
B: 999
Coercion
8.2 Client‐side Threats Securing Digital Democracy
8.2 Client‐side Threats Securing Digital Democracy
Coercion
Credential Theft
8.2 Client‐side Threats Securing Digital Democracy
8.2 Client‐side Threats Securing Digital Democracy
Coercion
Credential Theft
Imposter Sites
8.2 Client‐side Threats Securing Digital Democracy
http://www.hyphenet.com/blog/2011/09/19/adobe‐flash‐player‐paid‐ads‐on‐yahoo‐bing‐link‐to‐malware‐again/
8.2 Client‐side Threats Securing Digital Democracy
Coercion
Credential Theft
Imposter Sites
Malware
8.2 Client‐side Threats Securing Digital Democracy
8.2 Client‐side Threats Securing Digital Democracy
B
B
8.2 Client‐side Threats Securing Digital Democracy
Coercion
C d ti l Theft
Credential Th ft
Imposter Sites
Malware
Botnets
8.2 Client‐side Threats Securing Digital Democracy
Botnets
Botnets
Botnets
Server‐side Threats
8.3 Server‐side Threats Securing Digital Democracy
Denial of Service
Results
A: 1000
B: 999
8.3 Server‐side Threats Securing Digital Democracy
Distributed Denial
Denial‐‐of
of‐‐Service
(DDoS
DDoS)) Attack
Denial of Service
Results
A: 1000
B: 999
Insider Attacks
8.3 Server‐side Threats Securing Digital Democracy
Denial of Service
Results
A: 1000
B: 999
Insider Attacks
Remote Intrusion
8.3 Server‐side Threats Securing Digital Democracy
Ad
Advanced
d Persistent
P i t t Threats
Th t
8.3 Server‐side Threats Securing Digital Democracy
Denial of Service
Results
A: 1000
B: 999 Insider Attacks
Remote Intrusion
State‐Sponsored Attacks
8.3 Server‐side Threats Securing Digital Democracy
Source: http://ebiquity.umbc.edu/blogger/2010/09/23/is‐stuxnet‐a‐cyber‐weapon‐aimed‐at‐an‐iranian‐nuclear‐site/
8.3 Server‐side Threats Securing Digital Democracy
vs.
vs
vs.
vs
Washington D.C.
Washington, DC
8.4 Washington, D.C. Securing Digital Democracy
http://www.dcboee.org/pdf_files/nr_588.pdf
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
Recruit
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
Surveil
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
Attack!
8.4 Washington, D.C. Securing Digital Democracy
8.4 Washington, D.C. Securing Digital Democracy
J. Alex Halderman
University of Michigan