Rapid improvement in DNA sequencing has sparked a proliferation of medical and genetic tests that promise to reveal everything from one’s ancestry to fitness levels to microorganisms that live in your gut.
A new study from University of Washington researchers that analyzed the security hygiene of common, open-source DNA processing programs finds evidence of poor computer security practices used throughout the field .
In the study, which will be presented Aug. 17 in Vancouver, B.C., at the 26th USENIX Security Symposium, the team also demonstrated for the first time that it is possible — though still challenging — to compromise a computer system with a malicious computer code stored in synthetic DNA. When that DNA is analyzed, the code can become executable malware that attacks the computer system running the software.
So far, the researchers stress, there’s no evidence of malicious attacks on DNA synthesizing, sequencing and processing services. But their analysis of software used throughout that pipeline found known security gaps that could allow unauthorized parties to gain control of computer systems — potentially giving them access to personal information or even the ability to manipulate DNA results.
“One of the big things we try to do in the computer security community is to avoid a situation where we say, ‘Oh shoot, adversaries are here and knocking on our door and we’re not prepared,’” said co-author Tadayoshi Kohno, professor at the UW’s Paul G. Allen School of Computer Science & Engineering.
“Instead, we’d rather say, ‘Hey, if you continue on your current trajectory, adversaries might show up in 10 years. So let’s start a conversation now about how to improve your security before it becomes an issue,’” said Kohno, whose previous research has provoked high-profile discussions about vulnerabilities in emerging technologies, such as internet-connected automobiles and implantable medical devices.
“We don’t want to alarm people or make patients worry about genetic testing, which can yield incredibly valuable information,” said co-author and Allen School associate professor Luis Ceze. “We do want to give people a heads up that as these molecular and electronic worlds get closer together, there are potential interactions that we haven’t really had to contemplate before.”
In the new paper, researchers from the UW Security and Privacy Research Lab and UW Molecular Information Systems Lab offer recommendations to strengthen computer security and privacy protections in DNA synthesis, sequencing and processing.
The research team identified several different ways that a nefarious person could compromise a DNA sequencing and processing stream. To start, they demonstrated a technique that is scientifically fascinating — though arguably not the first thing an adversary might attempt, the researchers say.
“It remains to be seen how useful this would be, but we wondered whether under semi-realistic circumstances it would be possible to use biological molecules to infect a computer through normal DNA processing,” said co-author and Allen School doctoral student Peter Ney.
DNA is, at its heart, a system that encodes information in sequences of nucleotides. Through trial and error, the team found a way to include executable code — similar to computer worms that occasionally wreak havoc on the internet — in synthetic DNA strands.
To create optimal conditions for an adversary, they introduced a known security vulnerability into a software program that’s used to analyze and search for patterns in the raw files that emerge from DNA sequencing.
When that particular DNA strand is processed, the malicious exploit can gain control of the computer that’s running the program — potentially allowing the adversary to look at personal information, alter test results or even peer into a company’s intellectual property.
“To be clear, there are lots of challenges involved,” said co-author Lee Organick, a research scientist in the Molecular Information Systems Lab. “Even if someone wanted to do this maliciously, it might not work. But we found it is possible.”
In what might prove to be a more target-rich area for an adversary to exploit, the research team also discovered known security gaps in many open-source software programs used to analyze DNA sequencing data.
Some were written in unsafe languages known to be vulnerable to attacks, in part because they were first crafted by small research groups who likely weren’t expecting much, if any, adversarial pressure. But as the cost of DNA sequencing has plummeted over the last decade, open-source programs have been adopted more widely in medical- and consumer-focused applications.
Researchers at the UW Molecular Information Systems Lab are working to create next-generation archival storage systems by encoding digital data in strands of synthetic DNA. Although their system relies on DNA sequencing, it does not suffer from the security vulnerabilities identified in the present research, in part because the MISL team has anticipated those issues and because their system doesn’t rely on typical bioinformatics tools.
Recommendations to address vulnerabilities elsewhere in the DNA sequencing pipeline include: following best practices for secure software, incorporating adversarial thinking when setting up processes, monitoring who has control of the physical DNA samples, verifying sources of DNA samples before they are processed and developing ways to detect malicious executable code in DNA.
“There is some really low-hanging fruit out there that people could address just by running standard software analysis tools that will point out security problems and recommend fixes,” said co-author Karl Koscher, a research scientist in the UW Security and Privacy Lab. “There are certain functions that are known to be risky to use, and there are ways to rewrite your programs to avoid using them. That would be a good initial step.”
The Latest on: DNA cybersecurity
- Amazon Prime Day 2019 Breaks Records; Other Merchants Benefiton July 20, 2019 at 4:17 am
LifeStraw personal water filters, Instant Pots, and DNA kits were the top-selling items ... In the future, Prime Day will likely become more like Black Friday and Cyber Monday as other merchants learn ... […]
- Forsyth Tech offers girls robotics, cybersecurity campon July 17, 2019 at 3:06 pm
For one week, Forsyth Technical Community College offers a Girls GenCyber Robotics/Cybersecurity camp. Programming drones, extracting DNA and building and programming robots are just a few of the ... […]
- Amazon Prime Day bigger than Black Friday, Cyber Monday combinedon July 17, 2019 at 1:26 pm
The company said sales from its two-day shopping event surpassed its sales for last year's Black Friday and Cyber Monday combined ... In the United States, Instant Pots and DNA kits were the ... […]
- Amazon Prime Day 23andMe Deals (2019): Best DNA Test Kit Deals Revealed by Deal Stripeon July 15, 2019 at 4:58 pm
Amazon’s sales during Prime Day 2018 outperformed the previous Cyber Monday and Black Friday sales for the ... Deals researchers at Deal Stripe review 23andMe DNA test deals across the web in addition ... […]
- Direct-to-consumer DNA testing service exposed customers' data online: reporton July 11, 2019 at 4:19 am
DNA-testing service Vitagene Inc. left thousands of consumers ... executive vice president of strategic innovation at cybersecurity firm Cynergistek told Fierce Healthcare. The data privacy incident ... […]
- DNA-testing service left thousands of customers' records vulnerable online for yearson July 10, 2019 at 12:53 pm
DNA-testing service Vitagene shut down external access to more than 3,000 user files that were left exposed online for years, according to Bloomberg. Vitagene had made the files accessible to the ... […]
- CyberSaint Releases Governance Dashboards That Enable CEOs to Clearly Communicate Cybersecurity Posture to the Board of Directorson July 9, 2019 at 3:30 am
CyberStrong Governance Dashboards Present Cybersecurity Risk and Compliance Posture in Business ... Based in Boston, Massachusetts, the CyberSaint team’s intellectual DNA winds deeply through the ... […]
- Technological Theft: China's J-20 Stealth Fighter Has American DNAon July 9, 2019 at 12:44 am
There’s a reason for this: In 2007, Lockheed Martin dealt with something of a cyber Ocean’s 11 when Chinese hackers stole technical documents related to the development of the F-35. ... […]
- UK businesses face one cyber-attack every 50 secondson July 8, 2019 at 4:26 pm
In addition, people should be regularly reviewing their personal cyber-security score and continuously act to improve it," he said. "The message here is clear: it's not about checking boxes. It's ... […]
- At-home ancestry DNA kits may make it easier for enemies to target you, the Navy's top officer sayson July 8, 2019 at 10:01 am
Paul Rosenzweig, a cybersecurity expert with R Street Institute who served as President George W. Bush's Department of Homeland Security deputy assistant secretary for policy, said people must treat ... […]
via Google News and Bing News