Skip to main content
Log in

Increased cyber-biosecurity for DNA synthesis

  • Correspondence
  • Published:

From Nature Biotechnology

View current issue Submit your manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1: Malicious DNA injection performed by a remote cyber-criminal.

References

  1. Berry, D. J. Hist. Technol. 35, 374–404 (2019).

    Article  Google Scholar 

  2. U. S. Department of Health Human Services. Screening framework guidance for providers of synthetic double-stranded DNA. https://www.phe.gov/Preparedness/legal/guidance/syndna/Pages/default.aspx (2010).

  3. US National Institutes of Health. NIH guidelines for research involving recombinant or synthetic nucleic acid molecules. https://osp.od.nih.gov/wp-content/uploads/2019_NIH_Guidelines.htm (2019).

  4. World Economic Forum. Biosecurity innovation and risk reduction: a global framework for accessible, safe and secure DNA synthesis. https://www.weforum.org/reports/biosecurity-innovation-and-risk-reduction-a-global-framework-for-accessible-safe-and-secure-dna-synthesis-582d582cd4 (2020).

  5. IASB. The IASB code of conduct for best practices in gene synthesis. http://op.bna.com.s3.amazonaws.com/hl.nsf/r%3FOpen%3Djaqo-7xqpnr (2009).

  6. Harmonized screening protocol, I.G.S. v2.0. https://genesynthesisconsortium.org/wp-content/uploads/IGSCHarmonizedProtocol11-21-17.pdf (2017).

  7. Murch, R. & DiEuliis, D. Front. Bioeng. Biotechnol. 7, 235 (2019).

  8. Cui, Y., Xu, J., Cheng, M., Liao, X. & Peng, S. Interdiscip. Sci. 10, 455–465 (2018).

    Article  CAS  Google Scholar 

  9. Wang, L. et al. Sci. Rep. 5, 17517 (2015).

    Article  CAS  Google Scholar 

  10. Scarfone, K. & Mell, P. Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication 800-94 Rev. 1 (draft) (National Institute of Standards and Technology, 2012).

  11. Kwon, D. et al. A survey of deep learning-based network anomaly detection. Cluster Comput. 22, 949–961 (2019).

    Article  Google Scholar 

  12. Ahmed, M., Mahmood, A. N. & Hu, J. J. Netw. Comput. Appl. 60, 19–31 (2016).

    Article  Google Scholar 

  13. Adam, L. et al. Nat. Biotechnol. 29, 208–210 (2011).

    Article  CAS  Google Scholar 

  14. Tucker, J. B. Issues Sci. Technol. 26, 23–32 (2010).

    Google Scholar 

  15. Raisaro, J.L. et al. MedCo: enabling privacy-conscious exploration of distributed clinical and genomic data. in 4th International Workshop on Genome Privacy and Security (GenoPri’17) (2017).

  16. West, R. & Gronvall, G. K. Nat. Biotechnol. 38, 1021 (2020).

    Article  CAS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dov Greenbaum.

Ethics declarations

Competing interests

The authors declare no competing interests.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Puzis, R., Farbiash, D., Brodt, O. et al. Increased cyber-biosecurity for DNA synthesis. Nat Biotechnol 38, 1379–1381 (2020). https://doi.org/10.1038/s41587-020-00761-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1038/s41587-020-00761-y

  • Springer Nature America, Inc.

Navigation