Today arbitrary synthetic DNA can be ordered online and delivered within several days. In order to regulate both intentional and unintentional generation of dangerous substances, most synthetic gene providers screen DNA orders. A weakness in the Screening Framework Guidance for Providers of Synthetic Double-Stranded DNA allows screening protocols based on this guidance to be circumvented using a generic obfuscation procedure inspired by early malware obfuscation techniques. Furthermore, accessibility and automation of the synthetic gene engineering workflow, combined with insufficient cybersecurity controls, allow malware to interfere with biological processes within the victim's lab, closing the loop with the possibility of an exploit written into a DNA molecule presented by Ney et al. in USENIX Security'17. Here we present an end-to-end cyberbiological attack, in which unwitting biologists may be tricked into generating dangerous substances within their labs. Consequently, despite common biosecurity assumptions, the attacker does not need to have physical contact with the generated substance. The most challenging part of the attack, decoding of the obfuscated DNA, is executed within living cells while using primitive biological operations commonly employed by biologists during in-vivo gene editing. This attack scenario underlines the need to harden the synthetic DNA supply chain with protections against cyberbiological threats. To address these threats we propose an improved screening protocol that takes into account in-vivo gene editing.
翻译:今天,可以在线订购任意合成DNA,并在数天内交付。为了管制蓄意和无意生成危险物质,大多数合成基因提供者都对DNA订单进行筛选。《合成双层脱氧核糖核酸供应商筛选框架指南》的一个弱点是,根据这一指南,可以使用早期恶意软件模糊技术启发的通用模糊程序绕过筛选程序。此外,合成基因工程工作流程的可获取性和自动化,加上网络安全控制不足,允许恶意软件干扰受害者实验室内的生物过程,关闭循环圈圈,有可能将Ney等人在USENIX Security'17中展示的DNA分子进行开发。这里我们介绍了一个终端到终端网络生物攻击,其中不知情的生物学家可能会被骗到在实验室内产生危险物质。因此,尽管存在共同的生物安保假设,但攻击者不需要与生成的物质有物理接触。攻击、分解的DNA最具有挑战性的部分是,在生物细胞细胞内执行,同时使用生物学家通常使用的原始生物操作来进行DNA分子分子分子分子分子分子分子分子分子分子分子分子分子分子分子在网络上进行基因威胁的筛选。