Securing the Future of Biotechnology: A Study of Emerging Bio-Cyber Security Threats to DNA-Information Systems

Securing the Future of Biotechnology: A Study of Emerging Bio-Cyber Security Threats to DNA-Information Systems

[1]  B. Faircloth,et al.  Not All Sequence Tags Are Created Equal: Designing and Validating Sequence Identification Tags Robust to Indels , 2012, PloS one.

[2]  Ana Delgado,et al.  DIYbio: Making things and making futures , 2013 .

[3]  E. Hovig,et al.  Sample-Index Misassignment Impacts Tumour Exome Sequencing , 2018, Scientific Reports.

[4]  Dan Frumkin,et al.  Authentication of forensic DNA samples. , 2010, Forensic science international. Genetics.

[5]  I. Weissman,et al.  Index switching causes “spreading-of-signal” among multiplexed samples in Illumina HiSeq 4000 DNA sequencing , 2017, bioRxiv.

[6]  Emiliano De Cristofaro,et al.  Countering GATTACA: efficient and secure testing of fully-sequenced human genomes , 2011, CCS '11.

[7]  L. Rieseberg,et al.  A novel post hoc method for detecting index switching finds no evidence for increased switching on the Illumina HiSeq X , 2017, bioRxiv.

[8]  Siva Sai Yerubandi,et al.  Differential Power Analysis , 2002 .

[9]  Yossi Farjoun,et al.  Characterization and remediation of sample index swaps by non-redundant dual indexing on massively parallel sequencing platforms , 2017, BMC Genomics.

[10]  M. Singer,et al.  Asilomar conference on recombinant DNA molecules. , 1975, Science.

[11]  S. Nelson,et al.  Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.

[12]  Paul C. Kocher,et al.  Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.

[13]  Somesh Jha,et al.  Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing , 2014, USENIX Security Symposium.

[14]  A. Ramsay,et al.  Expression of Mouse Interleukin-4 by a Recombinant Ectromelia Virus Suppresses Cytolytic Lymphocyte Responses and Overcomes Genetic Resistance to Mousepox , 2001, Journal of Virology.

[15]  Matti Valovirta,et al.  Experimental Security Analysis of a Modern Automobile , 2011 .

[16]  A. Paul,et al.  Chemical Synthesis of Poliovirus cDNA: Generation of Infectious Virus in the Absence of Natural Template , 2002, Science.

[17]  Luis Ceze,et al.  Computer Security Risks of Distant Relative Matching in Consumer Genetic Databases , 2018, ArXiv.

[18]  Luis Ceze,et al.  A DNA-Based Archival Storage System , 2016, ASPLOS.

[19]  Xiaoqian Jiang,et al.  Big Data Privacy in Biomedical Research , 2020, IEEE Transactions on Big Data.

[20]  Luis Ceze,et al.  Exploiting Index Cross-Talk to Modify Variant Calls , 2018, bioRxiv.

[21]  Gregory D. Koblentz Biosecurity Reconsidered: Calibrating Biological Threats and Responses , 2010, International Security.

[22]  Haixu Tang,et al.  Learning your identity and disease from research papers: information leaks in genome wide association study , 2009, CCS.

[23]  Gabor T. Marth,et al.  A global reference for human genetic variation , 2015, Nature.

[24]  M. Rowicka,et al.  Strategies for Achieving High Sequencing Accuracy for Low Diversity Samples and Avoiding Sample Bleeding Using Illumina Platform , 2015, PloS one.

[25]  John C Marioni,et al.  Detection and removal of barcode swapping in single-cell RNA-seq data , 2017, Nature Communications.

[26]  Richard J. Lipton,et al.  On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.

[27]  G. Ginsburg,et al.  Personalized medicine: revolutionizing drug discovery and patient care. , 2001, Trends in biotechnology.

[28]  Alan M. Kwong,et al.  A reference panel of 64,976 haplotypes for genotype imputation , 2015, Nature Genetics.

[29]  T. C. Marshall,et al.  Statistical confidence for likelihood‐based paternity inference in natural populations , 1998, Molecular ecology.

[30]  Yaniv Erlich,et al.  Routes for breaching and protecting genetic privacy , 2013, Nature Reviews Genetics.

[31]  Thomas H Segall-Shapiro,et al.  Creation of a Bacterial Cell Controlled by a Chemically Synthesized Genome , 2010, Science.

[32]  Adam Molyneaux,et al.  Privacy-Preserving Processing of Raw Genomic Data , 2013, DPM/SETOP.

[33]  Rickard Sandberg,et al.  Computational correction of index switching in multiplexed sequencing libraries , 2018, Nature Methods.

[34]  Cyrus Rashtchian,et al.  Random access in large-scale DNA data storage , 2018, Nature Biotechnology.

[35]  A. One,et al.  Smashing The Stack For Fun And Profit , 1996 .

[36]  Erika Check Hayden,et al.  The automated lab , 2014, Nature.

[37]  E. Wright,et al.  Quality filtering of Illumina index reads mitigates sample cross-talk , 2016, BMC Genomics.

[38]  Luis Ceze,et al.  Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More , 2017, USENIX Security Symposium.

[39]  A. Roses Pharmacogenetics and the practice of medicine , 2000, Nature.

[40]  Bo Peng,et al.  Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds , 2012, NDSS.

[41]  P. Bayer,et al.  openSNP–A Crowdsourced Web Resource for Personal Genomics , 2014, PloS one.

[42]  Arvind Narayanan,et al.  Identification of Anonymous DNA Using Genealogical Triangulation , 2019, bioRxiv.

[43]  C. Rotimi,et al.  Genetic Variants Associated with Complex Human Diseases Show Wide Variation across Multiple Populations , 2009, Public Health Genomics.

[44]  T. H. Allegri The Code of Federal Regulations , 1986 .

[45]  Francesco Vezzi,et al.  Estimating the rate of index hopping on the Illumina HiSeq X platform , 2017, bioRxiv.

[46]  G. Church,et al.  Next-Generation Digital Information Storage in DNA , 2012, Science.

[47]  Shane A. McCarthy,et al.  Reference-based phasing using the Haplotype Reference Consortium panel , 2016, Nature Genetics.

[48]  Michael T. Goodrich,et al.  The Mastermind Attack on Genomic Data , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[49]  Zhongming Zhao,et al.  Neighboring-nucleotide effects on single nucleotide polymorphisms: a study of 2.6 million polymorphisms across the human genome. , 2002, Genome research.

[50]  U. Stenzel,et al.  Targeted high-throughput sequencing of tagged nucleic acid samples , 2007, Nucleic acids research.

[51]  Zhicong Huang,et al.  A privacy-preserving solution for compressed storage and selective retrieval of genomic data , 2016, Genome research.

[52]  B. Faircloth,et al.  Primer3—new capabilities and interfaces , 2012, Nucleic acids research.

[53]  Emiliano De Cristofaro,et al.  Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective , 2017, Proc. Priv. Enhancing Technol..

[54]  Paul T. Groth,et al.  The ENCODE (ENCyclopedia Of DNA Elements) Project , 2004, Science.

[55]  Matthias Meyer,et al.  Illumina sequencing library preparation for highly multiplexed target capture and sequencing. , 2010, Cold Spring Harbor protocols.

[56]  Stefan Katzenbeisser,et al.  Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM , 2014, WPES.

[57]  Hovav Shacham,et al.  Too LeJIT to Quit: Extending JIT Spraying to ARM , 2015, NDSS.

[58]  Jean-Pierre Hubaux,et al.  Addressing the concerns of the lacks family: quantification of kin genomic privacy , 2013, CCS.

[59]  D J Reeder,et al.  Impact of DNA typing on standards and practice in the forensic community. , 1999, Archives of pathology & laboratory medicine.

[60]  Michael K. Slevin,et al.  Unique, dual-indexed sequencing adapters with UMIs effectively eliminate index cross-talk and significantly improve sensitivity of massively parallel sequencing , 2018, BMC Genomics.

[61]  Drew Endy,et al.  DNA synthesis and biological security , 2007, Nature Biotechnology.

[62]  Dawei Li,et al.  The sequence and de novo assembly of the giant panda genome , 2010, Nature.

[63]  Doug Szajda,et al.  Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm , 2006, NDSS.

[64]  J. Marchini,et al.  Genotype imputation for genome-wide association studies , 2010, Nature Reviews Genetics.

[65]  Catherine Taylor Clelland,et al.  Hiding messages in DNA microdots , 1999, Nature.

[66]  Martin Kircher,et al.  Double indexing overcomes inaccuracies in multiplex sequencing on the Illumina platform , 2011, Nucleic acids research.

[67]  David E. Swayne,et al.  Characterization of the Reconstructed 1918 Spanish Influenza Pandemic Virus , 2005, Science.

[68]  Stephen E. Fienberg,et al.  Privacy Preserving GWAS Data Sharing , 2011, 2011 IEEE 11th International Conference on Data Mining Workshops.

[69]  Gurpur Rakesh D. Prabhu,et al.  The dawn of unmanned analytical laboratories , 2017 .

[70]  Wenliang Du,et al.  Secure and private sequence comparisons , 2003, WPES '03.

[71]  Chris Fallin,et al.  Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).

[72]  R. Knight,et al.  Error-correcting barcoded primers for pyrosequencing hundreds of samples in multiplex , 2008, Nature Methods.

[73]  Eran Halperin,et al.  Identifying Personal Genomes by Surname Inference , 2013, Science.

[74]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[75]  Yaniv Erlich,et al.  Identity inference of genomic data using long-range familial searches , 2018, Science.

[76]  Jean-Pierre Hubaux,et al.  Protecting and evaluating genomic privacy in medical tests and personalized medicine , 2013, WPES.

[77]  John M. Butler,et al.  Forensic DNA Typing: Biology, Technology, and Genetics of STR Markers , 2001 .

[78]  Carl A. Gunter,et al.  Privacy in the Genomic Era , 2014, ACM Comput. Surv..

[79]  Mete Akgün,et al.  Privacy preserving processing of genomic data: A survey , 2015, J. Biomed. Informatics.

[80]  Joshua Mason,et al.  English shellcode , 2009, CCS.

[81]  Vitaly Shmatikov,et al.  Towards Practical Privacy for Genomic Computation , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[82]  Xintao Wu,et al.  An overview of human genetic privacy , 2017, Annals of the New York Academy of Sciences.

[83]  Ewan Birney,et al.  Towards practical, high-capacity, low-maintenance information storage in synthesized DNA , 2013, Nature.