爱吃甜食是缺乏什么| 法令纹上的痣代表什么| 听调不听宣什么意思| 4月15日是什么星座| 王者风范是什么意思| 锚什么意思| 17年属什么生肖| 血小板下降是什么原因| ap医学上是什么意思| 鹤顶红是什么| 中班小朋友应该学什么| 心率过缓有什么危害| 减肥可以吃什么主食| 神经衰弱吃什么药好| cua是什么意思| 今年七夕节是什么时候| 色戒讲的什么| h 是什么意思| 痛经是什么原因引起的| 粉蒸肉的粉是什么粉| 朋友搬家送什么礼物好| 格桑花是什么意思| bacardi是什么酒| 耳朵尖的人什么命| 风平浪静是什么生肖| 颐养天年是什么意思| 中途疲软吃什么药| nothomme什么牌子| 补钙过量有什么害处| 什么叫两会| evian是什么品牌| 长期尿黄可能是什么病| pagani是什么车| 刚怀孕吃什么最好最营养| 卵巢囊性结构是什么| 南瓜是什么颜色| 什么方法睡觉快速入睡| 我还能做什么| 什么是风热感冒| 1997年7月1日属什么生肖| 尿频去药店买什么药| 月经期间吃什么食物最好| 胃气胀是什么原因怎么解决| 男属狗配什么属相最好| 不畏将来不念过往什么意思| 12月16号是什么星座| 经常喝苏打水有什么好处和坏处| 子宫粘连是什么原因引起的| 胃泌素17是什么检查| 3月27日什么星座| 什么马奔腾| 过敏性鼻炎吃什么水果好| 怀孕血糖高有什么症状| 轻歌曼舞是什么意思| 相宜的意思是什么| 甘油三酯高说明什么| 人丹是什么药| 宫颈炎有什么症状表现| 什么是因果| 国籍填什么| 游戏hp是什么意思| 仓鼠吃什么食物| 喉炎是什么原因引起的| 流金铄石是什么意思| 春节的习俗是什么| 蜻蜓点水是什么行为| 肚子痛什么原因| 致意是什么意思| 眼睛一直眨是什么原因| 中国的国花是什么| 胶质瘤是什么病| 老想睡觉是什么原因| 二八佳人是什么意思| 助产是干什么的| pci是什么意思| 唇红是什么原因| 什么叫台风| 小便有点红是什么原因| 什么是传染性软疣| 胃胀吃什么药效果最好| 耳朵后面有痣代表什么| 吃什么对头发有好处| 对口升学什么意思| 小孩指甲有白点是什么原因| 放疗后吃什么恢复的快| 泉州有什么特产| 洗礼是什么意思| snr是什么意思| 坐蜡什么意思| 吃什么清肝火最快| 胸闷出汗是什么原因| 一个既一个旦念什么| 喝酒头疼是什么原因| 卵巢早衰吃什么药| 肠镜前一天可以吃什么| 什么叫双飞| 驻马店以前叫什么名字| 钵钵鸡是什么| 宝五行属性是什么| 儿童正常体温在什么范围| 高考什么时候恢复的| 螨虫怕什么| 清明上河图描绘的是什么季节的景象| 什么是酮体| 尿常规粘液丝高是什么意思| 六月飞雪是什么意思| 什么是再生纤维| 手指甲上有白点是什么原因| bpd是胎儿的什么意思| 狭隘是什么意思| 甲状腺3类是什么意思| 怀孕为什么会肚子痛| hi是什么意思| 灵芝孢子粉治什么病| 痘痘破了涂什么药膏| a21和以纯什么关系| 乌龟和鳖有什么区别| 嘚瑟是什么意思| 上镜是什么意思| 希望孩子成为什么样的人| 精益求精的意思是什么| 肠胃炎吃什么食物| 西洋参不适合什么人吃| 什么是混合痔| 孕妇梦见摘桃子是什么意思| 小孩铅过高有什么症状| 来月经拉肚子是什么原因| 女人出虚汗失眠吃什么药| 孕妇口腔溃疡能用什么药| 乌鸡不能和什么一起吃| 血尿是什么原因引起的| 肛门疼是什么原因| wpw综合症是什么意思| 为什么叫西瓜| 什么是慈悲| g6pd是检查什么的| 上海话小赤佬是什么意思| 为什么遗精| 风湿性关节炎什么症状| 鹿的部首是什么| 身上有白点是什么原因| 凶宅是什么意思| 为什么去香港还要通行证| 左肾结石的症状是什么| 看肺应该挂什么科| 6月18号是什么日子| 猪润是什么| 姜不能和什么一起吃| sg是什么意思| 尿黄是什么原因男性| 小便刺痛什么原因| black什么颜色| m样症状是什么| 如期而至是什么意思| 月经期间可以吃什么水果| 贱人的意思是什么意思| 阴茎进入阴道是什么感觉| 为什么抽烟会恶心想吐| 出阁是什么意思| 娇兰属于什么档次| gm是什么牌子| 黄疸高吃什么药| 潜能是什么意思| 三百多分能上什么大学| 墨染是什么意思| 舌苔白厚腻吃什么药见效快| 什么的毛主席| 吃洋葱对身体有什么好处| 小金人车标是什么车| 念旧的人是什么样的人| 月柱华盖是什么意思| 耳朵旁边长痘痘是什么原因| 什么叫双规| 做梦梦到小孩子是什么意思| claire是什么意思| 小孩老是发烧什么原因| allan英文名什么意思| 什么心什么心| 羽五行属什么| 洁白丸治什么类型胃病| 墨鱼是什么鱼| 黄痰黄鼻涕吃什么药| 康字五行属什么| 福瑞祥和是什么意思| 人皇是什么意思| 血脂高吃什么药好| 盗汗挂什么科| py什么意思| 静脉曲张是什么引起的| 一个火一个斤念什么| 破涕为笑什么意思| 发烧吃什么食物最好| 米粉是什么做的| 为什么手臂上有很多很小的点| 近亲结婚生的孩子会得什么病| 面试穿什么衣服比较合适| idc是什么意思| 肠易激综合征是什么原因造成的| 骨折是什么感觉| 什么是鼻窦炎| 计抛是什么意思| 什么是生辰八字| 蹦蹦跳跳是什么生肖| 怀孕第一个月有什么反应| 脚为什么会抽筋| 梦见浇花是什么意思| 脑血栓是什么原因引起的| 鲤鱼吃什么食物| 肝早期硬化身体有什么症状| 嫁衣是什么意思| 本能反应是什么意思| 低血糖有什么症状| 狮子被称为什么| 甘耳朵旁什么字| 怀孕吃辣对胎儿有什么影响| 血小板计数是什么意思| 蟑螂怕什么| 什么叫结节| 双子座女和什么星座最配| 桃子又什么又什么填空| 孩子嗓子有痰吃什么药| 走南闯北是什么生肖| 挂钟挂在客厅什么位置好| 5月24日什么星座| 过敏性咽炎吃什么药| 芜湖有什么特产| 辩证什么意思| 全科医学科是什么科| 重症医学科是干什么的| 唇腺活检主要是看什么| 娃娃流鼻血是什么原因| 暑假让孩子学点什么好| 点读笔什么牌子好| 怀孕第一天有什么症状| 什么的态度| falcon是什么牌子| 宫颈管短是什么意思| who是什么组织| 男士脸黑用什么能美白| 终端是什么意思| 什么是心率| 为什么蚊子总是咬我| 萝卜喝醉了会变成什么| 为什么嘴巴会臭| 脱口秀是什么| 吃什么会流产| 阑尾切除后有什么影响和后遗症| 食道炎用什么药最好| 高位截瘫是什么意思| 为什么会得卵巢肿瘤| 贡品是什么意思| 溦是什么意思| 西晋之后是什么朝代| 化疗是什么| 海葡萄是什么| h型高血压是什么意思| 急性鼻窦炎吃什么药| 乌龟都吃什么| 跟泰迪很像的狗叫什么| adidas是什么牌子| 鸽子拉绿稀便是什么病| 盗汗和自汗有什么区别| 胃湿热吃什么中成药| 电饭锅内胆什么材质好| 百度
Tech

合肥舰生成战斗力周期缩短 舰长被赞一身英雄气

百度 土地资源的紧缺,内城住宅建设用地愈发稀缺,近十年来二环土地出让寥寥无几,已经到了濒临绝版的地步。
shutterstock_1046168680

For years security professionals and election integrity activists have been pushing voting machine vendors to build more secure and verifiable election systems, so voters and candidates can be assured election outcomes haven’t been manipulated.

Now they might finally get this thanks to a new $10 million contract the Defense Department’s Defense Advanced Research Projects Agency (DARPA) has launched to design and build a secure voting system that it hopes will be impervious to hacking.

Videos by VICE

The first-of-its-kind system will be designed by an Oregon-based firm called Galois, a longtime government contractor with experience in designing secure and verifiable systems. The system will use fully open source voting software, instead of the closed, proprietary software currently used in the vast majority of voting machines, which no one outside of voting machine testing labs can examine. More importantly, it will be built on secure open source hardware, made from secure designs and techniques developed over the last year as part of a special program at DARPA. The voting system will also be designed to create fully verifiable and transparent results so that voters don’t have to blindly trust that the machines and election officials delivered correct results.

But DARPA and Galois won’t be asking people to blindly trust that their voting systems are secure—as voting machine vendors currently do. Instead they’ll be publishing source code for the software online and bring prototypes of the systems to the Def Con Voting Village this summer and next, so that hackers and researchers will be able to freely examine the systems themselves and conduct penetration tests to gauge their security. They’ll also be working with a number of university teams over the next year to have them examine the systems in formal test environments.

“Def Con is great, but [hackers there] will not give us as much technical details as we want [about problems they find in the systems],” Linton Salmon, program manager in DARPA’s Microsystems Technology Office who is overseeing the project, said in a phone call. “Universities will give us more information. But we won’t have as many people or as high visibility when we do it with universities.”

The systems Galois designs won’t be available for sale. But the prototypes it creates will be available for existing voting machine vendors or others to freely adopt and customize without costly licensing fees or the millions of dollars it would take to research and develop a secure system from scratch.

“We will not have a voting system that we can deploy. That’s not what we do,” said Salmon. “We will show a methodology that could be used by others to build a voting system that is completely secure.”

Joe Kiniry is the principal scientist at Galois who is leading the project at his company. Kiniry has been involved in efforts to secure elections for years as part of a separate company he runs called Free & Fair. He’s consulted with foreign governments about their election systems, and his company has been working with states in the US to design robust post-election audits. But the idea to create a secure voting system didn’t come from Kiniry; it came from DARPA.

“DARPA was searching for a sexy demonstration for the [secure hardware] program. What could you put on secure hardware that people would care about and understand?” Kiniry said.

They needed a project that would be unclassified so DARPA could talk about it publicly.

“We wanted something where there could be a lot of people who could look at this in an open way and critique it and find problems,” said Salmon.

The project will leverage the hefty resources of DARPA and its considerable security experience, and if it works, it could help solve a pressing national problem around election security and integrity.

“If we were to build a fake radar system, it could demonstrate secure hardware, but it wouldn’t be useful to anybody. [DARPA] love the fact that we’re building a demonstrator that might actually be useful to the world,” Kiniry said.

Kiniry said Galois will design two basic voting machine types. The first will be a ballot-marking device that uses a touch-screen for voters to make their selections. That system won’t tabulate votes. Instead it will print out a paper ballot marked with the voter’s choices, so voters can review them before depositing them into an optical-scan machine that tabulates the votes. Galois will bring this system to Def Con this year.

Many current ballot-marking systems on the market today have been criticized by security professionals because they print bar codes on the ballot that the scanner can read instead of the human-readable portion voters review. Someone could subvert the bar code to say one thing, while the human-readable portion says something else. Kiniry said they’re aiming to design their system without barcodes.

The optical-scan system will print a receipt with a cryptographic representation of the voter’s choices. After the election, the cryptographic values for all ballots will be published on a web site, where voters can verify that their ballot and votes are among them.

“That receipt does not permit you to prove anything about how you voted, but does permit you to prove that the system accurately captured your intent and your vote is in the final tally,” Kiniry said.

Members of the public will also be able to use the cryptographic values to independently tally the votes to verify the election results so that tabulating the votes isn’t a closed process solely in the hands of election officials.

“Any organization [interested in verifying the election results] that hires a moderately smart software engineer [can] write their own tabulator,” Kiniry said. “We fully expect that Common Cause, League of Women Voters and the [political parties] will all have their own tabulators and verifiers.”

The second system Galois plans to build is an optical-scan system that reads paper ballots marked by voters by hand. They’ll bring that system to Def Con next year.

*

The voting system project grew out of a larger DARPA program focused on developing secure hardware. That program, called System Security Integrated Through Hardware and Firmware or SSITH, was launched in 2017 and is aimed at developing secure hardware, and design tools to build that hardware, so that hardware would be impervious to most of the software attacks prevalent today.

Currently most security is focused on software protections for operating systems, browsers, and other programs.

“This is only the beginning. This is a problem that is so big that one DARPA program isn’t going to solve even 20 percent of the problem.”

“In general, software has been the way people try to solve the problems because software is adaptable,” Salmon noted. There are some hardware security solutions already, he said, “but they don’t go far enough and … require too much power and performance….We want to fix this in hardware, and then no matter what [vulnerabilities] you have in software, [attackers] would not be able to [exploit] them.”

The basic problem, he said, is that most hardware is gullible and has no way of distinguishing between acceptable and unacceptable behavior. If an attacker’s exploit tells the machine to do something malicious, the hardware complies without making judgments about whether it should do this.

“I’m trying to change that and make hardware part of the solution to security rather than a bystander,” said Salmon. “This is only the beginning. This is a problem that is so big that one DARPA program isn’t going to solve even 20 percent of the problem.”

In a voting system, this means the hardware would prevent, for example, someone entering a voting booth and slipping a malicious memory card into the system and tricking the system into recording 20 votes for one vote cast, as researchers have shown could be done with some voting systems.

“Our goal is to make this so that the hardware is blocked against all of these various types of attack from the external world. If this is successful, and if the software put on top is equally successful, then it means people can’t hack in and … alter votes. It would also mean that the person who votes would get some verification that they did vote and all of that would be done in a manner that hackers couldn’t change,” Salmon said.

The DARPA secure hardware program involves six teams from several universities as well as Lockheed Martin. Each team was tasked with creating three secure CPU designs. Galois, which is part of the SSITH project, plans to build its voting system on top of the secure hardware designed by these teams, and will create a prototype for each CPU design.

“It’s normal, open source voting system software, which just happens to be running on top of those secure CPUs,” said Kiniry. “Our contention is… that a normal voting system running on COTS [commercial off-the-shelf hardware] will be hacked. A normal voting system running on the secure hardware will probably not be hacked.”

Not only are teams developing secure CPUs but to best take advantage of what a secure CPU offers, they’re developing new versions of open source C-compilers so they can recompile the entire software stack on a system—the operating system, the kernel, all the libraries and all the user software that’s written in C.

“So it really is a powerful software play and hardware play,” Kiniry said.

The program isn’t about re-architecting new CPUs, but proving that existing hardware can be modified to be made secure, thereby avoiding the need to re-design hardware from scratch.

“Galois and DARPA have just stepped up and filled a vacuum of leadership at the federal level to address the well-documented vulnerabilities in US voting machines that constitute a national security crisis.”

But even so, the secure designs are expected to change how new CPUs are architected going forward.

Joe Fitzpatrick, a noted hardware security expert who trains professionals on hardware hacking and security, calls the DARPA secure hardware project a lofty goal that will be great if it succeeds.

“I can’t tell if they truly are architecting a new CPU that is truly resistant to all these [attacks]. But if they designed a new CPU that was able to understand and determine malicious or correct operations from the software, that’s not trivial. That would be pretty amazing,” said Fitzpatrick.

Peiter “Mudge” Zatko, a former program manager at DARPA and noted security professional who has testified to Congress on security issues, said this and other DARPA projects are beneficial because they usually spawn new solutions. But he cautions that CPUs modified for security won’t solve all security problems.

“We should [also] work towards building processors that have more security principles inherent in them,” he told Motherboard.

Susan Greenhalgh, policy director for the National Election Defense Coalition, an election integrity group, hopes the systems Galois and DARPA are building will finally change the status quo of insecure voting.

“The [current systems are] woefully equipped and too prosaic to drive the quantum changes needed to face the nation-state actors that are threatening our democracy,” she told Motherboard. “Galois and DARPA have just stepped up and filled a vacuum of leadership at the federal level to address the well-documented vulnerabilities in US voting machines that constitute a national security crisis.”

观音土为什么能吃 特警力量第二部叫什么 扩心病是什么病 天年是什么意思 孕妇缺维生素D对胎儿有什么影响
肛裂挂号挂什么科 不到长城非好汉的下一句是什么 生理期是什么 ldlc是什么意思 lsa是什么意思
舌头上长泡是什么原因 kipling是什么牌子 产后42天复查挂什么科 念旧的人属于什么性格 肉苁蓉与什么搭配好
阴虚吃什么食物补得快 碳水化合物对人体有什么作用 十指不沾阳春水什么意思 什么是膜性肾病 嘴角开裂是什么原因
丝瓜为什么会苦dayuxmw.com 毛主席女儿为什么姓李hcv9jop2ns7r.cn 低密度脂蛋白高吃什么药hcv8jop1ns7r.cn 319是什么意思hcv7jop9ns3r.cn 经期不能吃什么药hcv8jop5ns7r.cn
甘肃有什么好吃的hcv7jop7ns3r.cn 白带多是什么原因引起的bysq.com 3月29日是什么星座hcv9jop2ns6r.cn 月经前便秘是什么原因liaochangning.com 高血压吃什么药效果好hcv8jop4ns1r.cn
猫肉为什么不能吃hcv8jop7ns7r.cn dx是什么药hcv8jop3ns5r.cn 小腹胀痛什么原因hcv8jop3ns8r.cn 免漆板是什么板材hcv9jop1ns8r.cn 九七年属什么生肖creativexi.com
口腔有异味是什么原因引起的hcv7jop6ns7r.cn 磷高吃什么药hcv9jop5ns2r.cn 黄芪泡水有什么好处hcv7jop6ns3r.cn 灵魂伴侣是指什么意思hcv9jop0ns2r.cn 乳腺增生结节吃什么药效果好hcv8jop9ns8r.cn
百度