Securing the Future of Biotechnology: A Study of Emerging Bio-Cyber Security Threats to DNA-Information Systems
暂无分享,去创建一个
[1] B. Faircloth,et al. Not All Sequence Tags Are Created Equal: Designing and Validating Sequence Identification Tags Robust to Indels , 2012, PloS one.
[2] Ana Delgado,et al. DIYbio: Making things and making futures , 2013 .
[3] E. Hovig,et al. Sample-Index Misassignment Impacts Tumour Exome Sequencing , 2018, Scientific Reports.
[4] Dan Frumkin,et al. Authentication of forensic DNA samples. , 2010, Forensic science international. Genetics.
[5] I. Weissman,et al. Index switching causes “spreading-of-signal” among multiplexed samples in Illumina HiSeq 4000 DNA sequencing , 2017, bioRxiv.
[6] Emiliano De Cristofaro,et al. Countering GATTACA: efficient and secure testing of fully-sequenced human genomes , 2011, CCS '11.
[7] L. Rieseberg,et al. A novel post hoc method for detecting index switching finds no evidence for increased switching on the Illumina HiSeq X , 2017, bioRxiv.
[8] Siva Sai Yerubandi,et al. Differential Power Analysis , 2002 .
[9] Yossi Farjoun,et al. Characterization and remediation of sample index swaps by non-redundant dual indexing on massively parallel sequencing platforms , 2017, BMC Genomics.
[10] M. Singer,et al. Asilomar conference on recombinant DNA molecules. , 1975, Science.
[11] S. Nelson,et al. Resolving Individuals Contributing Trace Amounts of DNA to Highly Complex Mixtures Using High-Density SNP Genotyping Microarrays , 2008, PLoS genetics.
[12] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[13] Somesh Jha,et al. Privacy in Pharmacogenetics: An End-to-End Case Study of Personalized Warfarin Dosing , 2014, USENIX Security Symposium.
[14] A. Ramsay,et al. Expression of Mouse Interleukin-4 by a Recombinant Ectromelia Virus Suppresses Cytolytic Lymphocyte Responses and Overcomes Genetic Resistance to Mousepox , 2001, Journal of Virology.
[15] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[16] A. Paul,et al. Chemical Synthesis of Poliovirus cDNA: Generation of Infectious Virus in the Absence of Natural Template , 2002, Science.
[17] Luis Ceze,et al. Computer Security Risks of Distant Relative Matching in Consumer Genetic Databases , 2018, ArXiv.
[18] Luis Ceze,et al. A DNA-Based Archival Storage System , 2016, ASPLOS.
[19] Xiaoqian Jiang,et al. Big Data Privacy in Biomedical Research , 2020, IEEE Transactions on Big Data.
[20] Luis Ceze,et al. Exploiting Index Cross-Talk to Modify Variant Calls , 2018, bioRxiv.
[21] Gregory D. Koblentz. Biosecurity Reconsidered: Calibrating Biological Threats and Responses , 2010, International Security.
[22] Haixu Tang,et al. Learning your identity and disease from research papers: information leaks in genome wide association study , 2009, CCS.
[23] Gabor T. Marth,et al. A global reference for human genetic variation , 2015, Nature.
[24] M. Rowicka,et al. Strategies for Achieving High Sequencing Accuracy for Low Diversity Samples and Avoiding Sample Bleeding Using Illumina Platform , 2015, PloS one.
[25] John C Marioni,et al. Detection and removal of barcode swapping in single-cell RNA-seq data , 2017, Nature Communications.
[26] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[27] G. Ginsburg,et al. Personalized medicine: revolutionizing drug discovery and patient care. , 2001, Trends in biotechnology.
[28] Alan M. Kwong,et al. A reference panel of 64,976 haplotypes for genotype imputation , 2015, Nature Genetics.
[29] T. C. Marshall,et al. Statistical confidence for likelihood‐based paternity inference in natural populations , 1998, Molecular ecology.
[30] Yaniv Erlich,et al. Routes for breaching and protecting genetic privacy , 2013, Nature Reviews Genetics.
[31] Thomas H Segall-Shapiro,et al. Creation of a Bacterial Cell Controlled by a Chemically Synthesized Genome , 2010, Science.
[32] Adam Molyneaux,et al. Privacy-Preserving Processing of Raw Genomic Data , 2013, DPM/SETOP.
[33] Rickard Sandberg,et al. Computational correction of index switching in multiplexed sequencing libraries , 2018, Nature Methods.
[34] Cyrus Rashtchian,et al. Random access in large-scale DNA data storage , 2018, Nature Biotechnology.
[35] A. One,et al. Smashing The Stack For Fun And Profit , 1996 .
[36] Erika Check Hayden,et al. The automated lab , 2014, Nature.
[37] E. Wright,et al. Quality filtering of Illumina index reads mitigates sample cross-talk , 2016, BMC Genomics.
[38] Luis Ceze,et al. Computer Security, Privacy, and DNA Sequencing: Compromising Computers with Synthesized DNA, Privacy Leaks, and More , 2017, USENIX Security Symposium.
[39] A. Roses. Pharmacogenetics and the practice of medicine , 2000, Nature.
[40] Bo Peng,et al. Large-Scale Privacy-Preserving Mapping of Human Genomic Sequences on Hybrid Clouds , 2012, NDSS.
[41] P. Bayer,et al. openSNP–A Crowdsourced Web Resource for Personal Genomics , 2014, PloS one.
[42] Arvind Narayanan,et al. Identification of Anonymous DNA Using Genealogical Triangulation , 2019, bioRxiv.
[43] C. Rotimi,et al. Genetic Variants Associated with Complex Human Diseases Show Wide Variation across Multiple Populations , 2009, Public Health Genomics.
[44] T. H. Allegri. The Code of Federal Regulations , 1986 .
[45] Francesco Vezzi,et al. Estimating the rate of index hopping on the Illumina HiSeq X platform , 2017, bioRxiv.
[46] G. Church,et al. Next-Generation Digital Information Storage in DNA , 2012, Science.
[47] Shane A. McCarthy,et al. Reference-based phasing using the Haplotype Reference Consortium panel , 2016, Nature Genetics.
[48] Michael T. Goodrich,et al. The Mastermind Attack on Genomic Data , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[49] Zhongming Zhao,et al. Neighboring-nucleotide effects on single nucleotide polymorphisms: a study of 2.6 million polymorphisms across the human genome. , 2002, Genome research.
[50] U. Stenzel,et al. Targeted high-throughput sequencing of tagged nucleic acid samples , 2007, Nucleic acids research.
[51] Zhicong Huang,et al. A privacy-preserving solution for compressed storage and selective retrieval of genomic data , 2016, Genome research.
[52] B. Faircloth,et al. Primer3—new capabilities and interfaces , 2012, Nucleic acids research.
[53] Emiliano De Cristofaro,et al. Systematizing Genome Privacy Research: A Privacy-Enhancing Technologies Perspective , 2017, Proc. Priv. Enhancing Technol..
[54] Paul T. Groth,et al. The ENCODE (ENCyclopedia Of DNA Elements) Project , 2004, Science.
[55] Matthias Meyer,et al. Illumina sequencing library preparation for highly multiplexed target capture and sequencing. , 2010, Cold Spring Harbor protocols.
[56] Stefan Katzenbeisser,et al. Privacy-Preserving Whole Genome Sequence Processing through Proxy-Aided ORAM , 2014, WPES.
[57] Hovav Shacham,et al. Too LeJIT to Quit: Extending JIT Spraying to ARM , 2015, NDSS.
[58] Jean-Pierre Hubaux,et al. Addressing the concerns of the lacks family: quantification of kin genomic privacy , 2013, CCS.
[59] D J Reeder,et al. Impact of DNA typing on standards and practice in the forensic community. , 1999, Archives of pathology & laboratory medicine.
[60] Michael K. Slevin,et al. Unique, dual-indexed sequencing adapters with UMIs effectively eliminate index cross-talk and significantly improve sensitivity of massively parallel sequencing , 2018, BMC Genomics.
[61] Drew Endy,et al. DNA synthesis and biological security , 2007, Nature Biotechnology.
[62] Dawei Li,et al. The sequence and de novo assembly of the giant panda genome , 2010, Nature.
[63] Doug Szajda,et al. Toward a Practical Data Privacy Scheme for a Distributed Implementation of the Smith-Waterman Genome Sequence Comparison Algorithm , 2006, NDSS.
[64] J. Marchini,et al. Genotype imputation for genome-wide association studies , 2010, Nature Reviews Genetics.
[65] Catherine Taylor Clelland,et al. Hiding messages in DNA microdots , 1999, Nature.
[66] Martin Kircher,et al. Double indexing overcomes inaccuracies in multiplex sequencing on the Illumina platform , 2011, Nucleic acids research.
[67] David E. Swayne,et al. Characterization of the Reconstructed 1918 Spanish Influenza Pandemic Virus , 2005, Science.
[68] Stephen E. Fienberg,et al. Privacy Preserving GWAS Data Sharing , 2011, 2011 IEEE 11th International Conference on Data Mining Workshops.
[69] Gurpur Rakesh D. Prabhu,et al. The dawn of unmanned analytical laboratories , 2017 .
[70] Wenliang Du,et al. Secure and private sequence comparisons , 2003, WPES '03.
[71] Chris Fallin,et al. Flipping bits in memory without accessing them: An experimental study of DRAM disturbance errors , 2014, 2014 ACM/IEEE 41st International Symposium on Computer Architecture (ISCA).
[72] R. Knight,et al. Error-correcting barcoded primers for pyrosequencing hundreds of samples in multiplex , 2008, Nature Methods.
[73] Eran Halperin,et al. Identifying Personal Genomes by Surname Inference , 2013, Science.
[74] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[75] Yaniv Erlich,et al. Identity inference of genomic data using long-range familial searches , 2018, Science.
[76] Jean-Pierre Hubaux,et al. Protecting and evaluating genomic privacy in medical tests and personalized medicine , 2013, WPES.
[77] John M. Butler,et al. Forensic DNA Typing: Biology, Technology, and Genetics of STR Markers , 2001 .
[78] Carl A. Gunter,et al. Privacy in the Genomic Era , 2014, ACM Comput. Surv..
[79] Mete Akgün,et al. Privacy preserving processing of genomic data: A survey , 2015, J. Biomed. Informatics.
[80] Joshua Mason,et al. English shellcode , 2009, CCS.
[81] Vitaly Shmatikov,et al. Towards Practical Privacy for Genomic Computation , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[82] Xintao Wu,et al. An overview of human genetic privacy , 2017, Annals of the New York Academy of Sciences.
[83] Ewan Birney,et al. Towards practical, high-capacity, low-maintenance information storage in synthesized DNA , 2013, Nature.