Will Vote-by-App Ever Be Safe?
Even with strong security measures, Internet voting is still vulnerable to abuse from state-sponsored actors and malicious insiders.
The push for online voting has been happening for years, but now that a major pandemic has hit the US, there is more incentive than ever for states and counties to try out online and mobile voting services. This summer, Delaware and West Virginia will allow online voting in their primaries, and New Jersey is also testing it in a municipal election. The Utah GOP recently used mobile voting in a virtual state convention. Other states and counties are likely to follow.
These solutions are far from perfect; to call them "experimental" is putting it nicely. Most of the current providers are new companies with relatively small development teams. Multiple researchers like MIT and Trail of Bits have found vulnerabilities in the voting app created by Voatz. It's also concerning that the app developer appears to be antagonistic to the security community about such vulnerability research. And let's not forget what happened to Shadow Inc.'s IowaReporterApp during the Iowa Democratic presidential caucus this past February.
The inherent vulnerability of app-based voting is a serious cause for concern, but governments and political parties are likely to pursue them anyway. So, let's take a closer look at where the problems are.
What Attacks Are Most Likely?
Mobile voting apps could face a variety of attacks, but some of the most likely scenarios are credential brute-forcing, injection, man-in-the-middle, and distributed denial-of-service attacks. Weak user credentials are a common problem, and we can expect attackers to target this in a mobile voting app. Password spraying, credential stuffing, and dictionary attacks are all likely. In a 2018 security report, Voatz was cited for allowing voters to use PINs to secure their accounts.
Injection attacks such as SQLi are particularly worrisome because the integrity of data may be at risk. Under the right circumstances, it could be difficult to track this type of data manipulation to increase, change, or delete votes. Russia used this attack in the 2016 election, and we can expect more attacks in future elections.
Man-in-the-middle (MitM) attacks could attempt to steal credentials and data or alter information. These can exploit client-side vulnerabilities, insufficient server-side security, or weaknesses in an API itself. A study last year found that 8% of the top mobile apps are vulnerable to MitM attacks, and another 45% use weak encryption.
Denial-of-service (DoS) is also to be expected, as this attack has occurred frequently in recent elections, including the 2018 US midterms and UK Labour Party.
A Security Checklist
In order for a voting app to be considered secure, it will have to check off a number of critical security boxes:
Authentication: Voting apps will have to require multiple points of verification, potentially including driver's license number, Social Security number, mailing address, and registered cellphone number. "Selfies" are another possibility to consider.
User Credentials & User Management: Strong password requirements, secure password recovery, and multifactor authentication are all essential. SMS-based MFA is far less secure, so app-based solutions like Google Authenticator, Microsoft Authenticator, or Authenticator (iOS) are preferable. Secure credential storage using salted hashes with a strong algorithm is also critical to protect that data at rest.
Input Validation: All user input received through the app should be handled as malicious. It must be properly sanitized, with strict whitelisting. This will assist in protecting the app from many vulnerabilities while also helping to ensure proper voter registration and vote tallies.
Encryption: Robust end-to-end encryption that protects data from entry point to storage or exit point is necessary. But some hashing or encryption algorithms are insufficient to the threat (for example, LinkedIn's 2012 breach due to SHA-1), so strong hashing and encryption algorithms must be used. Key management is also critical.
Data Integrity: Stored data should be protected from manipulation, both from outside attackers and malicious insiders. Secure cloud storage and encryption is critical, but it's also important to use digital signatures and timestamping to have a clear record of any changes.
Certificate Pinning: This is essential to protecting the mobile app from MitM attacks.
API Security: APIs should implement contemporary best practices for concerns such as transport security, load balancing, and availability. Every API function should be designed with careful consideration around authentication and authorization. Auditability and audit trail integrity must also be assured. Web application firewalls are good for additional protection, and checks should also be performed for issues present in the OWASP Top 10
Persistent Challenges
Remote voting faces a number of fundamental challenges. The most obvious of these is usability. No matter how simple the app interface is, voters will still get confused and make mistakes. How do you troubleshoot this on Election Day? What if people aren't able to vote because of it? The app's ease of use is further complicated by the need for robust cybersecurity. Even basic security measures such as user authentication, password requirements, password recovery, MFA, and so on, will be difficult to properly implement because of how they will affect the user experience.
Data integrity is another problem. Digital voting creates many points of failure along the way, from technical errors in processing and storage to malicious insiders and outsider attacks, all of which must be accounted for. The stakes are high, as there is no paper record to audit the votes.
Lastly, nonrepudiation is a risk. What if a voter claims the voting app made a mistake? Or someone else (spouse, friend) voted for them? Or that they accidentally submitted the wrong candidate? Voting apps will have to be able to prove the person voted the way the vote was received, beyond any shadow of a doubt. The apps will also require rigorous security testing and analysis, and a defense-in-depth approach. However, even with strong security measures in place, these apps could still be vulnerable to abuse, particularly from state-sponsored actors and malicious insiders.
Related Content:
Learn from industry experts in a setting that is conducive to interaction and conversation about how to prepare for that "really bad day" in cybersecurity. Click for more information and to register.
About the Author
You May Also Like
The State of Attack Surface Management (ASM), Featuring Forrester
Nov 15, 2024Applying the Principle of Least Privilege to the Cloud
Nov 18, 2024The Right Way to Use Artificial Intelligence and Machine Learning in Incident Response
Nov 20, 2024Safeguarding GitHub Data to Fuel Web Innovation
Nov 21, 2024