siv-org / siv

Secure Internet Voting protocol
https://siv.org
Other
12 stars 6 forks source link

2nd Device Malware Verification Check can be defeated by rerouting the QR code to another malicious site (or other non-legit check websites) #231

Open dsernst opened 1 month ago

dsernst commented 1 month ago

Reported by Drew Springall (@aaspring) yesterday at DEF CON (~24 hours before submissions close):

2nd Device Malware Verification Check can be defeated by rerouting the QR code to another malicious site (or other non-legit check websites).

See paper https://aaspring.com/ccs2014/ivoting-paper.pdf on similar attack against Estonia, especially Figure 4 on page 4.

dsernst commented 1 month ago

Possible mitigations:

  1. Have voter confirm 2nd device loads correct domain (eg siv.org, or .gov) [election admin could potentially provide that reminder in separate channel if available]
  2. If civic election, with invites via postal, provide QR code to load second device check UI on paper itself [with 2nd device anti-malware codes embedded in QR code], then that webpage would do another QR photo snap to get the private vote data from the first device.
arianabuilds commented 2 weeks ago

Entry Summary for HACK SIV @ DEF CON 2024

Thanks again for participating! This submission earned $566.89 from SIV and $284.93 from the Public Vote, for a total of $851.82.

Here's what we noted in our evaluation:

What's interesting about this submission

What takes away from it

Issue to track getting paid: https://github.com/siv-org/hack.siv.org/issues/7