Regulatory Failures with Ballot Marking Devices
This talk analyzes the security and integrity risks associated with Ballot Marking Devices (BMDs) in modern election systems. It highlights how the reliance on proprietary barcode and QR code schemes creates an opaque, non-verifiable audit trail that is susceptible to manipulation. The speaker argues that human-readable text on ballots is a necessary but insufficient security control, emphasizing the need for software independence and contestability in voting infrastructure.
The Invisible Failure: Why Your Ballot Marking Device Audit Trail is Security Theater
TLDR: Ballot Marking Devices (BMDs) often rely on proprietary barcode or QR code schemes to store voter selections, creating a critical disconnect between what a voter sees and what the machine records. This research highlights how these opaque, non-verifiable data structures undermine election integrity by rendering standard audits ineffective. Security researchers and auditors must push for software independence and contestability, as human-readable text alone is insufficient when the machine-tabulated "ballot of record" remains hidden in proprietary code.
Election integrity relies on the fundamental principle that the record of a vote must be verifiable by the voter and auditable by the public. When we look at the current deployment of Ballot Marking Devices (BMDs) across various jurisdictions, we see a recurring technical failure: the reliance on proprietary, machine-readable data structures—specifically barcodes and QR codes—that act as the primary record of the vote. This is not just a theoretical concern; it is a systemic vulnerability in the chain of custody for digital ballots.
The Disconnect Between Human and Machine
At the core of the issue is the "ballot of record." When a voter uses a BMD, they interact with a touchscreen to make their selections. The device then prints a paper ballot. In many systems, this paper contains both human-readable text and a machine-readable barcode or QR code. The critical flaw is that the optical scanner used for tabulation often ignores the human-readable text entirely, relying instead on the encoded data.
If the barcode is manipulated or if the software responsible for generating that barcode contains a logic error, the voter has no way to verify that their intent matches the machine's interpretation. This creates a scenario where the "ballot of record" is effectively invisible to the human eye. We are essentially asking voters to trust a black box that prints a receipt they cannot decode, while the machine-readable portion remains the only data point that actually counts toward the final tally.
The Failure of Proprietary Encoding
The technical implementation of these barcodes varies by vendor, but the underlying risk remains consistent. These systems often use proprietary, undocumented encoding schemes. From a security research perspective, this is a classic case of security through obscurity. Without access to the specification for how a specific vendor encodes a ballot, an independent auditor cannot verify the integrity of the data being read by the scanner.
Consider the OWASP Top 10 category for Broken Access Control or Security Misconfiguration. While these are web-centric, the principle applies here: when you rely on proprietary, closed-source logic to handle sensitive data, you lose the ability to perform meaningful security validation. If a researcher cannot audit the code that maps a voter's selection to a specific barcode, they cannot prove that the system is free from backdoors or logic flaws.
Why Human-Readable Text is Not Enough
Many vendors argue that because the paper ballot includes human-readable text, the system is inherently verifiable. This is a dangerous oversimplification. Research into voter behavior consistently shows that voters rarely review the printed summary, and even when they do, they often spend only a few seconds on it. If the barcode is the authoritative record, the human-readable text is merely a secondary artifact, not a true verification mechanism.
Furthermore, if a discrepancy is found during a manual recount, the legal framework in many jurisdictions is ill-equipped to handle it. If the barcode and the human-readable text disagree, which one is the "ballot of record"? If the law does not explicitly define this, the recount process becomes a legal battleground rather than a technical verification. We have seen this play out in various CVE-related election system disclosures, where the lack of transparency in the tabulation process made it impossible to determine the true intent of the voter.
The Path to Contestability
For those of us in the security community, the goal is to move toward systems that prioritize software independence. A system is software-independent if an undetected change or error in its software cannot cause an undetectable change or error in the election outcome. This requires that the paper ballot be the primary, authoritative record, and that the tabulation process be fully transparent and auditable.
Defenders and election officials must demand that BMDs provide a clear, auditable trail that does not rely on proprietary, machine-readable formats. This means moving away from barcodes as the primary source of truth and ensuring that any machine-readable data is fully documented and open to public inspection. If a system cannot be audited by an independent third party, it should not be used to record votes.
What Comes Next
We need to stop treating election infrastructure as a proprietary product and start treating it as a critical public utility that requires the same level of scrutiny as any other high-stakes system. The next time you see a BMD in the wild, look at the paper it produces. Ask yourself: if I were an attacker, how would I manipulate the barcode to alter the outcome while keeping the human-readable text intact? The answer to that question is where the real work begins. We must continue to challenge the status quo and demand transparency in the systems that underpin our democratic processes. The technology is only as good as our ability to verify it, and right now, we are failing that test.
Vulnerability Classes
Target Technologies
All Tags
Up Next From This Conference

The Fortress Island of Voting System Physical Security

It's Not Safe Yet: Online Voting in Practice

Is End-to-End Verifiability a Magic Bullet for Internet Voting?
Similar Talks

Hacking Apple's USB-C Port Controller

Unmasking the Snitch Puck: The Creepy IoT Surveillance Tech in the School Bathroom

