Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

Increased cyber-biosecurity for DNA synthesis

This is a preview of subscription content

Access options

Rent or Buy article

Get time limited or full article access on ReadCube.

from$8.99

All prices are NET prices.

Fig. 1: Malicious DNA injection performed by a remote cyber-criminal.

References

  1. 1.

    Berry, D. J. Hist. Technol. 35, 374–404 (2019).

    Article  Google Scholar 

  2. 2.

    U. S. Department of Health Human Services. Screening framework guidance for providers of synthetic double-stranded DNA. https://www.phe.gov/Preparedness/legal/guidance/syndna/Pages/default.aspx (2010).

  3. 3.

    US National Institutes of Health. NIH guidelines for research involving recombinant or synthetic nucleic acid molecules. https://osp.od.nih.gov/wp-content/uploads/2019_NIH_Guidelines.htm (2019).

  4. 4.

    World Economic Forum. Biosecurity innovation and risk reduction: a global framework for accessible, safe and secure DNA synthesis. https://www.weforum.org/reports/biosecurity-innovation-and-risk-reduction-a-global-framework-for-accessible-safe-and-secure-dna-synthesis-582d582cd4 (2020).

  5. 5.

    IASB. The IASB code of conduct for best practices in gene synthesis. http://op.bna.com.s3.amazonaws.com/hl.nsf/r%3FOpen%3Djaqo-7xqpnr (2009).

  6. 6.

    Harmonized screening protocol, I.G.S. v2.0. https://genesynthesisconsortium.org/wp-content/uploads/IGSCHarmonizedProtocol11-21-17.pdf (2017).

  7. 7.

    Murch, R. & DiEuliis, D. Front. Bioeng. Biotechnol. 7, 235 (2019).

  8. 8.

    Cui, Y., Xu, J., Cheng, M., Liao, X. & Peng, S. Interdiscip. Sci. 10, 455–465 (2018).

    CAS  Article  Google Scholar 

  9. 9.

    Wang, L. et al. Sci. Rep. 5, 17517 (2015).

    CAS  Article  Google Scholar 

  10. 10.

    Scarfone, K. & Mell, P. Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication 800-94 Rev. 1 (draft) (National Institute of Standards and Technology, 2012).

  11. 11.

    Kwon, D. et al. A survey of deep learning-based network anomaly detection. Cluster Comput. 22, 949–961 (2019).

    Article  Google Scholar 

  12. 12.

    Ahmed, M., Mahmood, A. N. & Hu, J. J. Netw. Comput. Appl. 60, 19–31 (2016).

    Article  Google Scholar 

  13. 13.

    Adam, L. et al. Nat. Biotechnol. 29, 208–210 (2011).

    CAS  Article  Google Scholar 

  14. 14.

    Tucker, J. B. Issues Sci. Technol. 26, 23–32 (2010).

    Google Scholar 

  15. 15.

    Raisaro, J.L. et al. MedCo: enabling privacy-conscious exploration of distributed clinical and genomic data. in 4th International Workshop on Genome Privacy and Security (GenoPri’17) (2017).

  16. 16.

    West, R. & Gronvall, G. K. Nat. Biotechnol. 38, 1021 (2020).

    CAS  Article  Google Scholar 

Download references

Author information

Affiliations

Authors

Corresponding author

Correspondence to Dov Greenbaum.

Ethics declarations

Competing interests

The authors declare no competing interests.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Puzis, R., Farbiash, D., Brodt, O. et al. Increased cyber-biosecurity for DNA synthesis. Nat Biotechnol 38, 1379–1381 (2020). https://doi.org/10.1038/s41587-020-00761-y

Download citation

Search

Quick links