Kuboid
Open Luck·Kuboid.in

A NY Legal Challenge to the ExpressVote XL's Use of Barcodes

DEFCONConference263 views20:545 months ago

This talk examines the security and integrity implications of using barcode-based ballot tabulation systems in electronic voting machines. It highlights how reliance on proprietary software and barcode scanning creates a lack of transparency and auditability, potentially violating election laws that require voter-verifiable paper ballots. The speaker discusses the legal challenges and the impact of vendor influence on election administration and public trust.

Why Barcode-Based Voting Systems Fail the Auditability Test

TLDR: Electronic voting machines like the ExpressVote XL rely on proprietary software to interpret barcodes, creating a critical failure point where the voter-verified text and the machine-tabulated data can diverge. This lack of transparency makes traditional audits impossible because the machine is essentially auditing its own opaque internal logic. Security researchers and election integrity advocates must push for voter-controlled, hand-marked paper ballots to eliminate this single point of failure.

Election security is often treated as a black box, but the mechanical reality of how votes are cast and counted is far more fragile than most people realize. When we talk about voting machines, we are usually discussing a complex stack of proprietary hardware and software that is shielded from the kind of rigorous, public scrutiny that we apply to any other critical infrastructure. The core issue with systems like the ExpressVote XL is not just the potential for a software bug, but the fundamental design choice to prioritize machine efficiency over verifiable, human-readable audit trails.

The Barcode Problem

At the heart of the controversy is the use of barcodes to store voter intent. When a voter uses an ExpressVote XL, they make their selections on a screen, and the machine prints a summary card. This card contains both human-readable text and a barcode that the scanner uses to tabulate the vote. From a security perspective, this is a classic case of data inconsistency. If the barcode does not match the human-readable text, the machine will count the barcode, not what the voter saw and verified.

This creates a scenario where the system is inherently non-auditable. If an adversary or a software glitch alters the barcode, the voter has no way of knowing their vote was changed because they cannot decode the barcode themselves. The machine is the only entity that can interpret the data it is counting. This violates the basic principle of OWASP’s security design principles, specifically the need for complete mediation and open design. When the system is closed and the data is machine-only, you lose the ability to perform a meaningful recount.

The Illusion of Transparency

Vendor claims about the security of these machines often rely on the idea that they are "auditable" because they produce a paper record. However, this is a semantic trick. A record is only useful if it can be verified by a human without relying on the machine that created it. In the case of the ExpressVote XL, the paper record is a summary card that is designed to be read by a scanner, not a human.

This is a recurring theme in election security research, where vendors prioritize throughput and ease of use for election officials over the security requirements of the voters. By forcing voters to use a machine-marked ballot, the system removes the voter from the loop of direct control. If the machine fails, the entire process stops. There is no fallback to a hand-marked paper ballot because the system is designed to be a closed, all-in-one solution.

The Real-World Impact on Pentesters

For those of us in the security community, this is a reminder that the most dangerous vulnerabilities are often the ones baked into the architecture. If you were to perform a penetration test on a voting system, you would likely find that the attack surface is not just the network interface or the physical ports, but the entire trust model.

The impact of an exploit here is not just data exfiltration or service disruption. It is the total loss of public trust in the democratic process. When a system is designed so that it cannot be independently verified, it is impossible to prove that an election was secure. This is why the focus of the security community has shifted toward Voter Verified Paper Audit Trails (VVPAT). A VVPAT ensures that the voter has a physical, human-readable record of their vote that is stored securely and can be used for a manual recount.

Why Vendors Fight Change

The resistance to moving away from barcode-based systems is largely driven by the business model of the vendors. These companies have invested heavily in proprietary hardware and software, and they have a vested interest in maintaining their market share. They often use their political connections to lobby against legislation that would require hand-marked paper ballots.

This is a classic example of vendor capture, where the entities responsible for overseeing the security of the election become dependent on the vendors for technical expertise and equipment. This dependency makes it incredibly difficult to implement even the most basic security improvements. The goal for researchers and developers should be to continue documenting these failures and to provide the technical evidence needed to force a shift toward more transparent, verifiable systems.

What Comes Next

The fight for secure elections is not going to be won by a single exploit or a single bug bounty report. It requires a sustained effort to demand transparency and accountability from the vendors and the election officials who buy their products. If you are a researcher, look for opportunities to participate in public testing and to support organizations that are working to improve election security.

The next time you see a voting machine, ask yourself: can I verify my vote without trusting the machine? If the answer is no, then the system is not secure. We need to move toward a future where the technology supports the voter, not the other way around. The current reliance on proprietary, barcode-based systems is a failure of design that we can no longer afford to ignore. Keep digging into the technical details, keep challenging the vendors, and keep pushing for systems that are built on the principle of verifiable trust.

Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in