Security analysis of India's electronic voting machines

  • Authors:
  • Scott Wolchok;Eric Wustrow;J. Alex Halderman;Hari K. Prasad;Arun Kankipati;Sai Krishna Sakhamuri;Vasavya Yagati;Rop Gonggrijp

  • Affiliations:
  • The University of Michigan, Ann Arbor, MI, USA;The University of Michigan, Ann Arbor, MI, USA;The University of Michigan, Ann Arbor, MI, USA;Netindia, (P) Ltd., Hyderabad, India;Netindia, (P) Ltd., Hyderabad, India;Netindia, (P) Ltd., Hyderabad, India;Netindia, (P) Ltd., Hyderabad, India;None, Amsterdam, Netherlands

  • Venue:
  • Proceedings of the 17th ACM conference on Computer and communications security
  • Year:
  • 2010

Quantified Score

Hi-index 0.00

Visualization

Abstract

Elections in India are conducted almost exclusively using electronic voting machines developed over the past two decades by a pair of government-owned companies. These devices, known in India as EVMs, have been praised for their simple design, ease of use, and reliability, but recently they have also been criticized following widespread reports of election irregularities. Despite this criticism, many details of the machines' design have never been publicly disclosed, and they have not been subjected to a rigorous, independent security evaluation. In this paper, we present a security analysis of a real Indian EVM obtained from an anonymous source. We describe the machine's design and operation in detail, and we evaluate its security in light of relevant election procedures. We conclude that in spite of the machines' simplicity and minimal software trusted computing base, they are vulnerable to serious attacks that can alter election results and violate the secrecy of the ballot. We demonstrate two attacks, implemented using custom hardware, which could be carried out by dishonest election insiders or other criminals with only brief physical access to the machines. This case study carries important lessons for Indian elections and for electronic voting security more generally.