{"id":211577,"date":"2017-08-14T11:47:54","date_gmt":"2017-08-14T15:47:54","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/researchers-hack-a-computer-using-dna-techworm\/"},"modified":"2017-08-14T11:47:54","modified_gmt":"2017-08-14T15:47:54","slug":"researchers-hack-a-computer-using-dna-techworm","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/dna\/researchers-hack-a-computer-using-dna-techworm\/","title":{"rendered":"Researchers hack a computer using DNA &#8211; Techworm"},"content":{"rendered":"<p><p>    With each passing day, hackers are using innovative ways to    breach cyber security systems. One such inventive method of    hacking a computer is via DNA.  <\/p>\n<p>    Researchers at the University of Washington claims to have    successfully injected a malware program into a DNA sample and    use it to hack into a computer that analyzes the sequence of    that DNA. In other words, so that when a gene sequencer    analyzes it the resulting data becomes a program that corrupts    gene-sequencing software and takes control of the underlying    computer.  <\/p>\n<p>    The team also explained its work in a more readable essay on    its website that provides suggestions to tighten computer    security and privacy protections in DNA synthesis, sequencing,    and processing.  <\/p>\n<p>    One of the big things we try to do in the computer    security community is to avoid a situation where we say, Oh    shoot, adversaries are here and knocking on our door and were    not prepared,' co-author Tadayoshi Kohno, a professor at    UWs Paul G. Allen School of Computer Science and Engineering,    said in a statement. Instead, wed rather say, Hey, if    you continue on your current trajectory, adversaries might show    up in 10 years. So lets start a conversation now about how to    improve your security before it becomes an issue.'  <\/p>\n<p>    The researchers through trial and error successfully proved    that it is possible to infect a computer with a malware that    was coded into a strand of DNA and which when inserted into the    gene-sequencing process, could allow an attacker to gain    control of that system.  <\/p>\n<p>    To assess whether this is theoretically possible, we    included a known security vulnerability in a DNA processing    program, they wrote. We then designed and created a    synthetic DNA strand that contained malicious computer code    encoded in the bases of the DNA strand. When this physical    strand was sequenced and processed by the vulnerable program it    gave remote control of the computer doing the processing. That    is, we were able to remotely exploit and gain full control over    a computer using adversarial synthetic DNA.  <\/p>\n<p>    Should we be worried with this finding at this point of time?    Well, not really. We dont want to alarm people or make    patients worry about genetic testing, which can yield    incredibly valuable information, said author and Allen    School Associate Professor Luis Ceze. We do want to give    people a heads up that as these molecular and electronic worlds    get closer together, there are potential interactions that we    havent really had to contemplate before.  <\/p>\n<p>    However, the finding is been considered as a significant    breakthrough in the growing overlap between the digital and the    biological world. As sequencing becomes cheaper and more    popular, there are chances of more DNA-encoded cyberthreats.  <\/p>\n<p>    The researchers asserted that, It is time to improve the    state of DNA security. We encourage the DNA sequencing    community to proactively address computer security risks before    any adversaries manifest.  <\/p>\n<p>    The researchers plan to discuss their findings at the USENIX    Security Symposium in Vancouver during a presentation on August    17.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>The rest is here:<br \/>\n<a target=\"_blank\" href=\"https:\/\/www.techworm.net\/2017\/08\/researchers-hack-computer-using-dna.html\" title=\"Researchers hack a computer using DNA - Techworm\">Researchers hack a computer using DNA - Techworm<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> With each passing day, hackers are using innovative ways to breach cyber security systems.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/dna\/researchers-hack-a-computer-using-dna-techworm\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-211577","post","type-post","status-publish","format-standard","hentry","category-dna"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211577"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=211577"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211577\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=211577"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=211577"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=211577"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}