Skip to main content

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • Correspondence
  • Published:

Increased cyber-biosecurity for DNA synthesis

This is a preview of subscription content, access via your institution

Access options

Buy this article

Prices may be subject to local taxes which are calculated during checkout

Fig. 1: Malicious DNA injection performed by a remote cyber-criminal.

References

  1. Berry, D. J. Hist. Technol. 35, 374–404 (2019).

    Article  Google Scholar 

  2. U. S. Department of Health Human Services. Screening framework guidance for providers of synthetic double-stranded DNA. https://www.phe.gov/Preparedness/legal/guidance/syndna/Pages/default.aspx (2010).

  3. US National Institutes of Health. NIH guidelines for research involving recombinant or synthetic nucleic acid molecules. https://osp.od.nih.gov/wp-content/uploads/2019_NIH_Guidelines.htm (2019).

  4. World Economic Forum. Biosecurity innovation and risk reduction: a global framework for accessible, safe and secure DNA synthesis. https://www.weforum.org/reports/biosecurity-innovation-and-risk-reduction-a-global-framework-for-accessible-safe-and-secure-dna-synthesis-582d582cd4 (2020).

  5. IASB. The IASB code of conduct for best practices in gene synthesis. http://op.bna.com.s3.amazonaws.com/hl.nsf/r%3FOpen%3Djaqo-7xqpnr (2009).

  6. Harmonized screening protocol, I.G.S. v2.0. https://genesynthesisconsortium.org/wp-content/uploads/IGSCHarmonizedProtocol11-21-17.pdf (2017).

  7. Murch, R. & DiEuliis, D. Front. Bioeng. Biotechnol. 7, 235 (2019).

  8. Cui, Y., Xu, J., Cheng, M., Liao, X. & Peng, S. Interdiscip. Sci. 10, 455–465 (2018).

    Article  CAS  Google Scholar 

  9. Wang, L. et al. Sci. Rep. 5, 17517 (2015).

    Article  CAS  Google Scholar 

  10. Scarfone, K. & Mell, P. Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication 800-94 Rev. 1 (draft) (National Institute of Standards and Technology, 2012).

  11. Kwon, D. et al. A survey of deep learning-based network anomaly detection. Cluster Comput. 22, 949–961 (2019).

    Article  Google Scholar 

  12. Ahmed, M., Mahmood, A. N. & Hu, J. J. Netw. Comput. Appl. 60, 19–31 (2016).

    Article  Google Scholar 

  13. Adam, L. et al. Nat. Biotechnol. 29, 208–210 (2011).

    Article  CAS  Google Scholar 

  14. Tucker, J. B. Issues Sci. Technol. 26, 23–32 (2010).

    Google Scholar 

  15. Raisaro, J.L. et al. MedCo: enabling privacy-conscious exploration of distributed clinical and genomic data. in 4th International Workshop on Genome Privacy and Security (GenoPri’17) (2017).

  16. West, R. & Gronvall, G. K. Nat. Biotechnol. 38, 1021 (2020).

    Article  CAS  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dov Greenbaum.

Ethics declarations

Competing interests

The authors declare no competing interests.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Puzis, R., Farbiash, D., Brodt, O. et al. Increased cyber-biosecurity for DNA synthesis. Nat Biotechnol 38, 1379–1381 (2020). https://doi.org/10.1038/s41587-020-00761-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1038/s41587-020-00761-y

Search

Quick links

Nature Briefing AI and Robotics

Sign up for the Nature Briefing: AI and Robotics newsletter — what matters in AI and robotics research, free to your inbox weekly.

Get the most important science stories of the day, free in your inbox. Sign up for Nature Briefing: AI and Robotics