Genetic similarity of biological samples to counter bio-hacking of DNA-sequencing functionality

@article{Islam2019GeneticSO,
  title={Genetic similarity of biological samples to counter bio-hacking of DNA-sequencing functionality},
  author={Mohd Siblee Islam and Stepan Ivanov and Eric Robson and Tr{\'i}ona Marie Dooley-Cullinane and Lee Coffey and Kevin Doolin and Sasitharan Balasubramaniam},
  journal={Scientific Reports},
  year={2019},
  volume={9}
}
We present the work towards strengthening the security of DNA-sequencing functionality of future bioinformatics systems against bio-computing attacks. Recent research has shown how using common tools, a perpetrator can synthesize biological material, which upon DNA-analysis opens a cyber-backdoor for the perpetrator to hijack control of a computational resource from the DNA-sequencing pipeline. As DNA analysis finds its way into practical everyday applications, the threat of bio-hacking… 

Using deep learning to detect digitally encoded DNA trigger for Trojan malware in Bio-Cyber attacks

Deep Learning can be used to successfully detect and identify the trigger encoded data, in order to protect a DNA sequencing pipeline from Trojan attacks, and shows nearly up to 100% accuracy in detection in such a novel Trojan attack scenario.

Predicting Biosecurity Threats: Deployment and Detection of Biological Weapons

Two topic areas, understanding the different potential targets a biological weapon could be designed to attack, how the weapon would be deployed against these targets, and the available strategies to detect the creation and deployment of an illegal biological weapon are discussed.

New Active Defense Technology under the Background of Power Information Network Security

The research of active defense technology under the background of power information network security is put forward, the defects of firewall technology and intrusion trap technology in passive network security defense technology are expounded, and the pitfalls of activedefense new technology are introduced.

References

SHOWING 1-10 OF 28 REFERENCES

Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More

It is demonstrated, for the first time, the synthesis of DNA which gives an attacker arbitrary remote code execution when sequenced and processed, and a broad framework and guidelines to safeguard security and privacy in DNA synthesis, sequencing, and processing are developed.

Long-term persistence of bacterial DNA

Information Theory of DNA Shotgun Sequencing

For a simple statistical model of the DNA sequence and the read process, it is shown that the answer admits a critical phenomenon in the asymptotic limit of long DNA sequences: if the read length is below a threshold, reconstruction is impossible no matter how many reads are observed, and if theread length is above the threshold, having enough reads to cover theDNA sequence is sufficient to reconstruct.

Wavelet Analysis in Current Cancer Genome Research: A Survey

  • Tao MengAhmed T. Soliman P. Iyengar
  • Biology
    IEEE/ACM Transactions on Computational Biology and Bioinformatics
  • 2013
A survey of howWavelet analysis has been applied to cancer bioinformatics questions is provided and several approaches of representing the biological sequence data numerically and methods of using wavelet analysis on the numerical sequences are discussed.

Development of a screening system for DNA damage and repair of potential carcinogens based on dual luciferase assay in human HepG2 cell.

The dual luciferase assay described in this study is rapid, convenient, stable and standard for DNA damage and repair measurement and should be a valued tool in molecular epidemiology studies.

Duplication-correcting codes for data storage in the DNA of living organisms

This paper provides error-correcting codes for errors caused by tandem duplications, which create a copy of a block of the sequence and insert it in a tandem manner, i.e., next to the original, and studies codes for correcting tandem duplication of length up to a given constant k.

Long-Term Stability and Integrity of Plasmid-Based DNA Data Storage

Results indicate that plasmid DNA data storage can be useful for long-term archival storage to recover the source text in a reproducible and accountable manner.

On DNA numerical representations for genomic similarity computation

An experimental study of the characteristics of nine of the most frequently-used DNA numeric representations to evaluate the behavior of each representation when used to measure the similarity of a given pair of DNA sequences.

A Memory-Access Validation Scheme against Payload Injection Attacks

A memory-access validation scheme that manages information on spurious data at the granularity of the cache line size and a validation unit that answers queries from other components in the processor so that spurious data can be blocked before control flow diversion.

Inferring the Number of Contributors to Mixed DNA Profiles

A probabilistic mixture algorithm that takes into account not just the number and magnitude of the alleles at a locus, but also their frequency of occurrence allows the determination of likelihood ratios of different hypotheses concerning the number of contributors to a specific mixture.