Tampere University of Technology

TUTCRIS Research Portal

Genetic similarity of biological samples to counter bio-hacking of DNA-sequencing functionality

Research output: Contribution to journalArticleScientificpeer-review

Standard

Genetic similarity of biological samples to counter bio-hacking of DNA-sequencing functionality. / Islam, Mohd Siblee; Ivanov, Stepan; Robson, Eric; Dooley-Cullinane, Tríona; Coffey, Lee; Doolin, Kevin; Balasubramaniam, Sasitharan.

In: Scientific Reports, Vol. 9, No. 1, 8684, 01.12.2019.

Research output: Contribution to journalArticleScientificpeer-review

Harvard

Islam, MS, Ivanov, S, Robson, E, Dooley-Cullinane, T, Coffey, L, Doolin, K & Balasubramaniam, S 2019, 'Genetic similarity of biological samples to counter bio-hacking of DNA-sequencing functionality' Scientific Reports, vol. 9, no. 1, 8684. https://doi.org/10.1038/s41598-019-44995-6

APA

Islam, M. S., Ivanov, S., Robson, E., Dooley-Cullinane, T., Coffey, L., Doolin, K., & Balasubramaniam, S. (2019). Genetic similarity of biological samples to counter bio-hacking of DNA-sequencing functionality. Scientific Reports, 9(1), [8684]. https://doi.org/10.1038/s41598-019-44995-6

Vancouver

Islam MS, Ivanov S, Robson E, Dooley-Cullinane T, Coffey L, Doolin K et al. Genetic similarity of biological samples to counter bio-hacking of DNA-sequencing functionality. Scientific Reports. 2019 Dec 1;9(1). 8684. https://doi.org/10.1038/s41598-019-44995-6

Author

Islam, Mohd Siblee ; Ivanov, Stepan ; Robson, Eric ; Dooley-Cullinane, Tríona ; Coffey, Lee ; Doolin, Kevin ; Balasubramaniam, Sasitharan. / Genetic similarity of biological samples to counter bio-hacking of DNA-sequencing functionality. In: Scientific Reports. 2019 ; Vol. 9, No. 1.

Bibtex - Download

@article{631e44f71cb544918a251c03f09717e5,
title = "Genetic similarity of biological samples to counter bio-hacking of DNA-sequencing functionality",
abstract = "We present the work towards strengthening the security of DNA-sequencing functionality of future bioinformatics systems against bio-computing attacks. Recent research has shown how using common tools, a perpetrator can synthesize biological material, which upon DNA-analysis opens a cyber-backdoor for the perpetrator to hijack control of a computational resource from the DNA-sequencing pipeline. As DNA analysis finds its way into practical everyday applications, the threat of bio-hacking increases. Our wetlab experiments establish that malicious DNA can be synthesized and inserted into E. coli, a common contaminant. Based on that, we propose a new attack, where a hacker to reach the target hides the DNA with malicious code on common surfaces (e.g., lab coat, bench, rubber glove). We demonstrated that the threat of bio-hacking can be mitigated using dedicated input control techniques similar to those used to counter conventional injection attacks. This article proposes to use genetic similarity of biological samples to identify material that has been generated for bio-hacking. We considered freely available genetic data from 506 mammary, lymphocyte and erythrocyte samples that have a bio-hacking code inserted. During the evaluation we were able to detect up to 95{\%} of malicious DNAs confirming suitability of our method.",
author = "Islam, {Mohd Siblee} and Stepan Ivanov and Eric Robson and Tr{\'i}ona Dooley-Cullinane and Lee Coffey and Kevin Doolin and Sasitharan Balasubramaniam",
year = "2019",
month = "12",
day = "1",
doi = "10.1038/s41598-019-44995-6",
language = "English",
volume = "9",
journal = "Scientific Reports",
issn = "2045-2322",
publisher = "Nature Publishing Group",
number = "1",

}

RIS (suitable for import to EndNote) - Download

TY - JOUR

T1 - Genetic similarity of biological samples to counter bio-hacking of DNA-sequencing functionality

AU - Islam, Mohd Siblee

AU - Ivanov, Stepan

AU - Robson, Eric

AU - Dooley-Cullinane, Tríona

AU - Coffey, Lee

AU - Doolin, Kevin

AU - Balasubramaniam, Sasitharan

PY - 2019/12/1

Y1 - 2019/12/1

N2 - We present the work towards strengthening the security of DNA-sequencing functionality of future bioinformatics systems against bio-computing attacks. Recent research has shown how using common tools, a perpetrator can synthesize biological material, which upon DNA-analysis opens a cyber-backdoor for the perpetrator to hijack control of a computational resource from the DNA-sequencing pipeline. As DNA analysis finds its way into practical everyday applications, the threat of bio-hacking increases. Our wetlab experiments establish that malicious DNA can be synthesized and inserted into E. coli, a common contaminant. Based on that, we propose a new attack, where a hacker to reach the target hides the DNA with malicious code on common surfaces (e.g., lab coat, bench, rubber glove). We demonstrated that the threat of bio-hacking can be mitigated using dedicated input control techniques similar to those used to counter conventional injection attacks. This article proposes to use genetic similarity of biological samples to identify material that has been generated for bio-hacking. We considered freely available genetic data from 506 mammary, lymphocyte and erythrocyte samples that have a bio-hacking code inserted. During the evaluation we were able to detect up to 95% of malicious DNAs confirming suitability of our method.

AB - We present the work towards strengthening the security of DNA-sequencing functionality of future bioinformatics systems against bio-computing attacks. Recent research has shown how using common tools, a perpetrator can synthesize biological material, which upon DNA-analysis opens a cyber-backdoor for the perpetrator to hijack control of a computational resource from the DNA-sequencing pipeline. As DNA analysis finds its way into practical everyday applications, the threat of bio-hacking increases. Our wetlab experiments establish that malicious DNA can be synthesized and inserted into E. coli, a common contaminant. Based on that, we propose a new attack, where a hacker to reach the target hides the DNA with malicious code on common surfaces (e.g., lab coat, bench, rubber glove). We demonstrated that the threat of bio-hacking can be mitigated using dedicated input control techniques similar to those used to counter conventional injection attacks. This article proposes to use genetic similarity of biological samples to identify material that has been generated for bio-hacking. We considered freely available genetic data from 506 mammary, lymphocyte and erythrocyte samples that have a bio-hacking code inserted. During the evaluation we were able to detect up to 95% of malicious DNAs confirming suitability of our method.

U2 - 10.1038/s41598-019-44995-6

DO - 10.1038/s41598-019-44995-6

M3 - Article

VL - 9

JO - Scientific Reports

JF - Scientific Reports

SN - 2045-2322

IS - 1

M1 - 8684

ER -