Skip to main content

Researchers At The University Of Washington Have Found A Way To Infect DNA Strands With Malicious Code While DNA Sequencing


A big revolution in genomic sciences is taking place currently as the researchers are looking to find new ways to store data using DNA and improve the existing techniques of DNA sequencing. As a result, the biological and electronic worlds are beginning to influence each
other.
A recent study has went one step further and tried to underline the security risks involved in these process. The researchers have shown that hackers can use DNA to write malicious code and affect the machine reading it.
The research was carried out at the University of Washington. For the first time, it was shown that when a gene sequencer analyzes the malicious code encoded in the physical strands of DNA, the resulting data turns into a program that corrupts gene-sequencing software.
In a paper, the researchers have outlined their technique. They started their security analyses from the first step of the DNA processing, i.e., DNA strands in a tube. They experimentally evaluated that after sequencing and post-processing, the generated file was used as an input into a vulnerable program. After that, the file yielded an open socket for remote control.
It should be noted that the exploit created by the researchers didn’t target any specific program used by biologists; rather it targeted a modified program with known vulnerability.
“As these molecular and electronic worlds get closer together, there are potential interactions that we haven’t really had to contemplate before,” said Luis Ceze, a co-author of the study.
Talking about the applications, an existing DNA strand can be contaminated using a malicious DNA. In another scenario, as different DNA samples are often sequenced together, errors in a sequencing process could cause the malicious data in a DNA to end up in other people’s data.
In present scenario, without a doubt, the possibility of this sci-fi hacking attack is distant. However, it’s important to take a note of such future possibilities and introduce necessary security mechanisms.

Comments

WHAT'S HOT

Learn How To Download Videos From Popular Platforms Such As YouTube, Facebook, Twitter, Instagram And Any Others

Having trouble downloading that video your crush shared on Instagram or one of those adorable cat videos on YouTube? Refer our guide to learn how to download videos from popular platforms such as YouTube, Facebook, Twitter, Instagram and many others.

Microsoft Has Released The First Windows 10 Build 16353 For Insiders

As Fall Creators Update is nearing its release, Skip Ahead was announced last month. It enables fast ring users to continue receiving new features, though the RS_PRERELEASE

The First Ubuntu 17.10 Beta Release Is Finally Here-Download 7 Different Flavors Here

Following the tradition, the first Beta release hasn’t witnessed the participation of default Ubuntu release, which will now ship with GNOME desktop environment. This brings us to the

Apple Has Confirmed The LTE Issues With Its New Watch Series 3

Before the product starts shipping on Friday, Apple has confirmed the existence of LTE issues with its new Apple Watch Series 3. Reviewers noted the wearable has