Detecting code alteration by creating a temporary memory bottleneck

  • Authors:
  • Ryan W. Gardner;Sujata Garera;Aviel D. Rubin

  • Affiliations:
  • Department of Computer Science, Johns Hopkins University, Baltimore, MD;Department of Computer Science, Johns Hopkins University, Baltimore, MD;Department of Computer Science, Johns Hopkins University, Baltimore, MD

  • Venue:
  • IEEE Transactions on Information Forensics and Security - Special issue on electronic voting
  • Year:
  • 2009

Quantified Score

Hi-index 0.00

Visualization

Abstract

We develop a new technique whereby a poll worker can determine whether the software executing on electronic voting machines on election day has been altered from its factory version. Our generalized approach allows a human, using a known challenge-response pair, to detect attacks that involve modification or replacement of software on a computer based on the time it takes the computer to provide a correct response to a challenge. We exploit the large difference between main memory access times and cache memory access or CPU clock cycle times to significantly increase the time required to compute the right response when the software has been changed.