{"id":211963,"date":"2017-08-16T17:47:41","date_gmt":"2017-08-16T21:47:41","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/researchers-hacked-into-dna-and-encoded-it-with-malware-futurism\/"},"modified":"2017-08-16T17:47:41","modified_gmt":"2017-08-16T21:47:41","slug":"researchers-hacked-into-dna-and-encoded-it-with-malware-futurism","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/dna\/researchers-hacked-into-dna-and-encoded-it-with-malware-futurism\/","title":{"rendered":"Researchers Hacked Into DNA and Encoded it With Malware &#8211; Futurism"},"content":{"rendered":"<p><p>In BriefA group of biohackers at the University of Washington found away to sequence gene bases to implant malware through a laboratorycomputer. Though still in its early stages, they have invented asci-fi device of biopunk ingenuity.      Welcome to the World of Biohacking    <\/p>\n<p>    Biologists pay scrupulous attention to DNA synthesis, not just out    of a need for precision, but also as a precaution. Scientists    dont want to create or spread a dangerous stretch of genetic    code that, with a little bit of criminal ingenuity, could be    used to make a toxin or an infectious disease. But recently, a    group of biohackers has found a way to cross biology with the    digital by resequencing DNA, not to infect humans or    animals, but computers.  <\/p>\n<p>    A group of researchers from the University of Washington has    shown that, for the first time, its possible to encode malicious software into    physical strands of DNA. And so, when a gene sequencer    performs an analysis, the output transforms into a program    which corrupts gene-sequencing software to gain control of an    entire computer.  <\/p>\n<p>    This is a far cry from a criminal implementation. Researchers    agree that this new method could be integrated into real-world    applications once DNA sequencing grows more powerful and    ubiquitous.  <\/p>\n<p>    We know that if an adversary has control over the data a    computer is processing, it can potentially take over that    computer, said Tadayoshi Kohno, Computer Science Professor at    the University of Washington in an interview with WIRED,    noting the similarity to traditional hacker attacks. That    means when youre looking at the security of computational    biology systems, youre not only thinking about the network    connectivity and the USB drive and the user at the keyboard but    also the information stored in the DNA theyre sequencing. Its    about considering a different class of threat, he added.  <\/p>\n<\/p>\n<p>    While, currently, this feels more like an alternate take on    Neal Stephensons Snow    Crashthan an imminent cyber threat, the means for    disseminating this bio-delivered code are already coming into    being. University labs, for one, are employing increasingly    centralized services for students and professors working with    college-owned (and expensive) gene sequencing equipment. And as    other, non-academic environs like corporations, medical    facilities, and government-run facilities follow suit, this    DNA-malware delivery trick will become feasible. Additionally,    the DNA-malware delivery will come from outside sources, which    could provide the perfect window for malware insertion.  <\/p>\n<p>    Called an exploit by hackers, this specific kind of computer    attack is known as a buffer overflow which fills the space in    a computers memory allocated for the gene sequence and then    spills out into other parts of the computers memory until it    can plant its own commands.  <\/p>\n<p>    So far, challenges to the process like squeezing the    code into a few hundred DNA bases and the tendency of redundant    base patterns to cause DNA to fold into itself  have limited    the digital translation to a mere 37% success rate. Clearly,    DNA-hacking is still only a reality for readers of biopunk    sci-fi, but wed be naive to dismiss it as the next    generations problem (or boon). After all, Seth Shipman of a    Harvard team recently encoded a video in a DNA sample. Once    perfected, DNA storage could replace magnetic encoding in flash    memory because DNA maintains its structure for much longer.  <\/p>\n<p>    DNA coding and bio-exploitation might sound like fiction today,    but, like the cell phones origins in Star Trek canon, its    only a matter of doing.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>View post:<br \/>\n<a target=\"_blank\" href=\"https:\/\/futurism.com\/researchers-hacked-into-dna-and-encoded-it-with-malware\/\" title=\"Researchers Hacked Into DNA and Encoded it With Malware - Futurism\">Researchers Hacked Into DNA and Encoded it With Malware - Futurism<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> In BriefA group of biohackers at the University of Washington found away to sequence gene bases to implant malware through a laboratorycomputer. Though still in its early stages, they have invented asci-fi device of biopunk ingenuity. Welcome to the World of Biohacking Biologists pay scrupulous attention to DNA synthesis, not just out of a need for precision, but also as a precaution.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/transhuman-news-blog\/dna\/researchers-hacked-into-dna-and-encoded-it-with-malware-futurism\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-211963","post","type-post","status-publish","format-standard","hentry","category-dna"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211963"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=211963"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/211963\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=211963"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=211963"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=211963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}