TY - GEN
T1 - Trojan bio-hacking of DNA-sequencing pipeline
AU - Islam, M. S.
AU - Ivanov, S.
AU - Doolin, K.
AU - Coffey, L.
AU - Dooley-Cullinane, T. M.
AU - Berry, D.
AU - Balasubramaniam, S.
N1 - Funding Information:
This work was supported by Science Foundation Ireland through the SFI VistaMilk (16/RC/3835) and CONNECT (13/RC/2077) research centres.
Publisher Copyright:
© 2019 Association for Computing Machinery.
PY - 2019/9/25
Y1 - 2019/9/25
N2 - The article focuses on the information security risks that arise from the use of dubious software as part of a DNA-sequencing pipeline. We show how the perpetrator can use a biologically engineered sample that contains the remote machine’s IP address and port number to trigger Trojan spyware previously dormant, and create a connection to the remote machine. The spyware is then used to either steal sensitive data processed by the pipeline (e.g. DNA-sample of crime suspect) or manipulate its control-flow (e.g. via opening a backdoor). To avoid detection the spyware can accept and expect required payload in fragments, which are also hidden inside the sample in a distributed manner. We show how the adversary can use cryptographic tools such as encryption and steganography to make such detection even harder while limiting the footprint that either identifies the attacker or makes the trigger-sample substantially different from its biological species. Therefore, we prove the viability of the attack and further stress the need to account for attacks being launched from the physical, rather than cyber-world. Furthermore, DNA sequencing error can hinder the successful delivery of a payload, hence the success of such attacks. We estimate the success rates for different sequencing error rates, where the calculated results are also verified with corresponding results from simulations.
AB - The article focuses on the information security risks that arise from the use of dubious software as part of a DNA-sequencing pipeline. We show how the perpetrator can use a biologically engineered sample that contains the remote machine’s IP address and port number to trigger Trojan spyware previously dormant, and create a connection to the remote machine. The spyware is then used to either steal sensitive data processed by the pipeline (e.g. DNA-sample of crime suspect) or manipulate its control-flow (e.g. via opening a backdoor). To avoid detection the spyware can accept and expect required payload in fragments, which are also hidden inside the sample in a distributed manner. We show how the adversary can use cryptographic tools such as encryption and steganography to make such detection even harder while limiting the footprint that either identifies the attacker or makes the trigger-sample substantially different from its biological species. Therefore, we prove the viability of the attack and further stress the need to account for attacks being launched from the physical, rather than cyber-world. Furthermore, DNA sequencing error can hinder the successful delivery of a payload, hence the success of such attacks. We estimate the success rates for different sequencing error rates, where the calculated results are also verified with corresponding results from simulations.
KW - Bio-Hacking
KW - DNA-Sequencing Pipeline
KW - Encryption
KW - Steganography
UR - http://www.scopus.com/inward/record.url?scp=85073783641&partnerID=8YFLogxK
U2 - 10.1145/3345312.3345474
DO - 10.1145/3345312.3345474
M3 - Conference contribution
AN - SCOPUS:85073783641
T3 - Proceedings of the 6th ACM International Conference on Nanoscale Computing and Communication, NANOCOM 2019
BT - Proceedings of the 6th ACM International Conference on Nanoscale Computing and Communication, NANOCOM 2019
PB - Association for Computing Machinery (ACM)
T2 - 6th ACM International Conference on Nanoscale Computing and Communication, NANOCOM 2019
Y2 - 25 September 2019 through 27 September 2019
ER -