Increased cyber-biosecurity for DNA synthesis thumbnail

Increased cyber-biosecurity for DNA synthesis

Fig. 1: Malicious DNA injection performed by a remote cyber-criminal.

References

  1. 1.

    Berry, D. J. Hist. Technol. 35, 374–404 (2019).

    Article 

    Google Scholar
     

  2. 2.

    U. S. Department of Health Human Services. Screening framework guidance for providers of synthetic double-stranded DNA. https://www.phe.gov/Preparedness/legal/guidance/syndna/Pages/default.aspx (2010).

  3. 3.

    US National Institutes of Health. NIH guidelines for research involving recombinant or synthetic nucleic acid molecules. https://osp.od.nih.gov/wp-content/uploads/2019_NIH_Guidelines.htm (2019).

  4. 4.

    World Economic Forum. Biosecurity innovation and risk reduction: a global framework for accessible, safe and secure DNA synthesis. https://www.weforum.org/reports/biosecurity-innovation-and-risk-reduction-a-global-framework-for-accessible-safe-and-secure-dna-synthesis-582d582cd4 (2020).

  5. 5.

    IASB. The IASB code of conduct for best practices in gene synthesis. http://op.bna.com.s3.amazonaws.com/hl.nsf/r%3FOpen%3Djaqo-7xqpnr (2009).

  6. 6.

    Harmonized screening protocol, I.G.S. v2.0. https://genesynthesisconsortium.org/wp-content/uploads/IGSCHarmonizedProtocol11-21-17.pdf (2017).

  7. 7.

    Murch, R. & DiEuliis, D. Front. Bioeng. Biotechnol. 7, 235 (2019).

  8. 8.

    Cui, Y., Xu, J., Cheng, M., Liao, X. & Peng, S. Interdiscip. Sci. 10, 455–465 (2018).

    CAS 
    Article 

    Google Scholar
     

  9. 9.

    Wang, L. et al. Sci. Rep. 5, 17517 (2015).

    CAS 
    Article 

    Google Scholar
     

  10. 10.

    Scarfone, K. & Mell, P. Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication 800-94 Rev. 1 (draft) (National Institute of Standards and Technology, 2012).

  11. 11.

    Kwon, D. et al. A survey of deep learning-based network anomaly detection. Cluster Comput. 22, 949–961 (2019).

    Article 

    Google Scholar
     

  12. 12.

    Ahmed, M., Mahmood, A. N. & Hu, J. J. Netw. Comput. Appl. 60, 19–31 (2016).

    Article 

    Google Scholar
     

  13. 13.

    Adam, L. et al. Nat. Biotechnol. 29, 208–210 (2011).

    CAS 
    Article 

    Google Scholar
     

  14. 14.

    Tucker, J. B. Issues Sci. Technol. 26, 23–32 (2010).


    Google Scholar
     

  15. 15.

    Raisaro, J.L. et al. MedCo: enabling privacy-conscious exploration of distributed clinical and genomic data. in 4th International Workshop on Genome Privacy and Security (GenoPri’17) (2017).

  16. 16.

    West, R. & Gronvall, G. K. Nat. Biotechnol. 38, 1021 (2020).

    CAS 
    Article 

    Google Scholar
     

Download references

Author information

Affiliations

  1. Software and Information Systems Engineering, Ben-Gurion University of the Negev, Be’er Sheva, Israel

    Rami Puzis & Yuval Elovici

  2. Cyber Security Research Center, Ben-Gurion University of the Negev, Be’er Sheva, Israel

    Rami Puzis, Dor Farbiash, Oleg Brodt & Yuval Elovici

  3. Jusidman Science Center for Youth, Ben-Gurion University of the Negev, Be’er Sheva, Israel

    Dor Farbiash

  4. Telekom Innovation Labs, Ben-Gurion University of the Negev, Be’er Sheva, Israel

    Oleg Brodt

  5. Zvi Meitar Institute for Legal Implications of Emerging Technologies, IDC Herzliya, Herzliya, Israel

    Dov Greenbaum

  6. Harry Radzyner School of Law, IDC Herzliya, Herzliya, Israel

    Dov Greenbaum

  7. Molecular Biophysics and Biochemistry, Yale University, New Haven, CT, USA

    Dov Greenbaum

Corresponding author

Correspondence to
Dov Greenbaum.

Ethics declarations

Competing interests

The authors declare no competing interests.

About this article

Verify currency and authenticity via CrossMark

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *