Enlarge / This data could potentially contain malware.
With everyone from academics to Microsoft looking at the prospect of storing data using DNA, it was probably inevitable that someone would start looking at the security implications. Apparently, they're worse than most people might have expected. It turns out it's possible to encode computer malware in DNAand use it to attack vulnerabilities on the computer that analyzes the sequence of that DNA.
The researchers didn't find an actual vulnerability in DNA analysis softwareinstead, they specifically made a version of some software with an exploitable vulnerability to show that the risk is more than hypothetical. Still, an audit of some open source DNA analysis software shows that the academics who have been writing it haven't been paying much attention to security best practices.
DNA sequencing involves determining the precise order of the bases that make up a DNA strand. While the process that generates the sequence is generally some combination of biology and/or chemistry, once it's read, the sequence is typically stored as an ASCII string of As, Ts, Cs, and Gs. If handled improperly, that chunk of data could exploit vulnerable software to get it to execute arbitrary code. And DNA sequences tend to see a lot of software, which find overlapping sequences, align it to known genomes, look for key differences, and more.
To see whether this threat was more than hypothetical, the researchers started with a really simple exploit: store more data than a chunk of memory was intended to hold, and redirect program execution to the excess. In this case, said excess contained an exploit that would use a feature of the bash shell to connect into a remote server that the researchers controlled. If it worked, the server would then have full shell access to the machine running the DNA analysis software.
Actually implementing that in DNA, however, turned out to be challenging. DNA with Gs and Cs forms a stronger double-helix. Too many of them, and the strand won't open up easily for sequencing. Too few, and it'll pop open when you don't want it to. Repetitive DNA can form complex structures that get in the way of all the enzymes we normally use to manipulate DNA. The computer code they wanted to use, however, had lots of long runs of the same character, which made for a repetitive sequence that was very low in Gs and Cs. The company they were ordering DNA from couldn't even synthesize it.
In the end, they had to completely redesign their malware so that its translation into nucleic acids produced a DNA strand that could be synthesized and sequenced. The latter created another hurdle. The most common method of sequencing is currently limited to reading a few hundred bases at a time. Since each base has two bits of information, that means the malware has to be incredibly compact. That limits what can be done, and it explains why all this particular payload did was open up a remote connection.
Then, there was the matter of getting the malware executed. Since this was a proof of concept, the researchers made it easy on themselves: the modified an existing tool to create an exploitable vulnerability. They also made some changes to the system's configuration to make the execution of random memory locations easier (made the stack executable and turned off memory address randomization). While that makes the test environment less realistic, the goal was simply to demonstrate that DNA-delivered malware was possible.
With everything in place, they ordered some DNA online then sent it off to a facility for sequencing. When their sequences came back, they sent them through a software pipeline that included their vulnerable utility. Almost immediately, the computer running the software connected into their host, providing them with access to the machine. The malware worked.
Given how easy the authors made thingsa known vulnerability and a number of safeguards turned offdoes this really pose a threat? There's good news and bad news here.
On the good side, there's the complications of translating computer instructions into DNA that can be synthesized and sequenced. Plus there's the issue that most sequencing machines are limited in how long a sequence they can read. The machine used in this work maxes out at 300 bases, which is the equivalent of 600 bits, and most facilities keep things shorter than that. Longer read machines are available, but they're also error prone, and any errors will typically disable the malware.
But it's also common for the software used to analyze DNA to look for places where two short sequences overlap and use that to build up longer sequences. This has the potential to expand the size of the malware considerably, although less of the analysis software pipeline will be exposed to these longer, assembled sequences.
Similar issues exist with how the malware is encoded. While the authors used each base to encode two bits, DNA analysis software handles DNA in various ways internally. For example, if sequencing doesn't provide a clear indication of what a base is, other characters may be used (for example, N for any base, or R for G or A). Any software that handles these ambiguous bases has to have a more complex encoding scheme; many simply use ASCII characters.
As a result, different pieces of software will be vulnerable to different malware encodings. While that means some software will be immune, the size of the DNA analysis pipelines typically means that a dozen or more pieces of software will be run in succession. Chances are good that at least one of them will use the same encoding as the malware.
The research community's habits are also a major point of vulnerability. The analysis software was generally not written with security in mind. Using the Clang compiler's analysis tools and HP's Fortify compiler, the authors searched a collection of open source DNA analysis software for potential vulnerabilities. They found widespread use of functions that are prone to buffer overflows (strcat, strcpy, sprintf, vsprintf, gets, and scanf)about two instances for every 1,000 lines of code. "Our research suggests that DNA sequencing and analysis have not to date received significantif anyadversarial pressure," they conclude.
The second issue is how easy it is to infiltrate malicious code onto other machines via DNA. The sequencing machines have such a high capacity, work from several different labs is run on a single machine at the same time. As a result, some of the sequences returned from the machine will end up mixed into an unrelated sample. When the researchers checked with another group that had their sequencing performed at the same time, they found that the other group's results contained 27 instances of the malware.
Separately, lots of services simply allow you to send in any DNA for sequencing, putting their software at risk. And many public repositories allow people to upload their sequence for analysis by others. So, you wouldn't even have to synthesize any DNA to have your exploit analyzedyou can simply upload the text of the sequence you've designed to someone else's data repository.
None of this means that a DNA-based exploit is around the corner. But it's a healthy warning that the research community and commercial DNA companies should look to improve their practices before this does become a problem.
Originally posted here:
Researchers encode malware in DNA, compromise DNA sequencing software - Ars Technica
- Mind uploading - 01 [Last Updated On: November 8th, 2009] [Originally Added On: November 8th, 2009]
- Mind uploading - 02 [Last Updated On: November 8th, 2009] [Originally Added On: November 8th, 2009]
- A new way to battle Mexican drug cartels - KLTV [Last Updated On: March 8th, 2010] [Originally Added On: March 8th, 2010]
- Mobile Health Screening Units Visit Lowe's Workers - International Supermarket News [Last Updated On: March 8th, 2010] [Originally Added On: March 8th, 2010]
- The quintessential sewing machine - Business Mirror [Last Updated On: March 8th, 2010] [Originally Added On: March 8th, 2010]
- The Future of Windows - Technologizer (blog) [Last Updated On: March 8th, 2010] [Originally Added On: March 8th, 2010]
- SEO Press Release Distribution Site Online PR News Celebrates 10000 Active Users - Online PR News (press release) [Last Updated On: March 8th, 2010] [Originally Added On: March 8th, 2010]
- Utilizing Online Mailing Services – Make the Most of Direct Marketing - RisMedia.com (press release) [Last Updated On: March 8th, 2010] [Originally Added On: March 8th, 2010]
- Carr's first look at 'Extreme' home - KLTV [Last Updated On: March 8th, 2010] [Originally Added On: March 8th, 2010]
- Should you advertise on iPhones? - Smart Company (blog) [Last Updated On: March 8th, 2010] [Originally Added On: March 8th, 2010]
- Review: Mega Man 10 - Destructoid [Last Updated On: March 8th, 2010] [Originally Added On: March 8th, 2010]
- Had I World Enough, and Time - Institute for Ethics and Emerging Technologies [Last Updated On: March 8th, 2010] [Originally Added On: March 8th, 2010]
- Unicast Continues Innovative Technology Enhancements With Latest Release of ... - CNNMoney.com (press release) [Last Updated On: March 16th, 2010] [Originally Added On: March 16th, 2010]
- Facebook scouts for 'passionate' India head - Economic Times [Last Updated On: March 16th, 2010] [Originally Added On: March 16th, 2010]
- SXSW: YouTube Launches Partner Program for Indie Bands - Wired News [Last Updated On: March 17th, 2010] [Originally Added On: March 17th, 2010]
- Wider Still and Wider! - Bangkok Post [Last Updated On: March 17th, 2010] [Originally Added On: March 17th, 2010]
- P2P Versus The World - Rampage [Last Updated On: March 17th, 2010] [Originally Added On: March 17th, 2010]
- Yakuza 3 - The MMOMFG Review - MMOMFG (blog) [Last Updated On: March 17th, 2010] [Originally Added On: March 17th, 2010]
- Behind the musings: The annotated high schools column - Chicago Tribune (blog) [Last Updated On: March 17th, 2010] [Originally Added On: March 17th, 2010]
- Jihad Jane, YouTube, and Me - David Horowitz's NewsReal Blog (blog) [Last Updated On: March 17th, 2010] [Originally Added On: March 17th, 2010]
- Justin Bieber Releases 'U Smile,' Announces Summer Tour Dates - MTV.com [Last Updated On: March 17th, 2010] [Originally Added On: March 17th, 2010]
- FCC announces National Broadband Plan - VentureBeat [Last Updated On: March 17th, 2010] [Originally Added On: March 17th, 2010]
- Image hosting on the cheap: a look at three free services - Ars Technica [Last Updated On: March 17th, 2010] [Originally Added On: March 17th, 2010]
- Content Management: Secrets of the Trade - Formtek Blog (blog) [Last Updated On: March 17th, 2010] [Originally Added On: March 17th, 2010]
- FCC's National Broadband Plan: There is a dark side - ZDNet [Last Updated On: March 17th, 2010] [Originally Added On: March 17th, 2010]
- 5 Reasons Old Media Should Buy Facebook - AllFacebook (blog) [Last Updated On: March 17th, 2010] [Originally Added On: March 17th, 2010]
- "Steal It" and Other Internal YouTube Emails from Viacom's Copyright Suit - Fast Company [Last Updated On: March 19th, 2010] [Originally Added On: March 19th, 2010]
- Now cafes in monument premises for tourists during CWG - Sify [Last Updated On: March 19th, 2010] [Originally Added On: March 19th, 2010]
- Google-Viacom court papers leave a lot to the imagination - FierceOnlineVideo [Last Updated On: March 19th, 2010] [Originally Added On: March 19th, 2010]
- FCC's broadband plan: A possible dream - Washington Post (blog) [Last Updated On: March 19th, 2010] [Originally Added On: March 19th, 2010]
- The Importance of Using Social Networking for Business; Part I – Facebook - IPWatchdog.com [Last Updated On: March 19th, 2010] [Originally Added On: March 19th, 2010]
- Recording YouTube Videos - Acoustic Guitar [Last Updated On: March 19th, 2010] [Originally Added On: March 19th, 2010]
- Who's using location-based social networking? - KC Free Press [Last Updated On: March 20th, 2010] [Originally Added On: March 20th, 2010]
- iPhone will continue to beckon BlackBerry owners - CNET [Last Updated On: March 20th, 2010] [Originally Added On: March 20th, 2010]
- Rain leaves its mark on Azalea Trail events - KLTV [Last Updated On: March 21st, 2010] [Originally Added On: March 21st, 2010]
- Viacom v. YouTube/Google: A Piracy Case in Their Own Words - DailyFinance [Last Updated On: March 21st, 2010] [Originally Added On: March 21st, 2010]
- Getting a look at next high-tech | Philadelphia Inquirer | 03/22/2010 - Philadelphia Inquirer [Last Updated On: March 22nd, 2010] [Originally Added On: March 22nd, 2010]
- Sprint chews on Apple while lauding 4G Overdrive hotspot - The Tech Herald [Last Updated On: March 22nd, 2010] [Originally Added On: March 22nd, 2010]
- 'Repo Men' contest -- the nationwide chase is almost over - Los Angeles Times (blog) [Last Updated On: March 22nd, 2010] [Originally Added On: March 22nd, 2010]
- Viacom vs. YouTube/Google: A Piracy Case in Their Own Words - DailyFinance [Last Updated On: March 22nd, 2010] [Originally Added On: March 22nd, 2010]
- These iPhone apps will help make March Madness a little more sane - Appolicious [Last Updated On: March 22nd, 2010] [Originally Added On: March 22nd, 2010]
- Eye-Fi Pro X2 cards have arrived, and you probably want one - tuaw.com (blog) [Last Updated On: March 23rd, 2010] [Originally Added On: March 23rd, 2010]
- Pharmacist shows who wins, loses with health care bill - KLTV [Last Updated On: March 23rd, 2010] [Originally Added On: March 23rd, 2010]
- High-Tech Texts! - The Campus Slate [Last Updated On: March 24th, 2010] [Originally Added On: March 24th, 2010]
- CTIA WIRELESS 2010: Samsung's New Galaxy Brings 4" AMOLED Screen, Social Hub ... - Marketnews.ca [Last Updated On: March 24th, 2010] [Originally Added On: March 24th, 2010]
- Google must follow Chinese rules or leave - China Daily [Last Updated On: March 24th, 2010] [Originally Added On: March 24th, 2010]
- Jay-Z Short Documentary 'NY-Z' Premieres Online - MTV.com [Last Updated On: March 24th, 2010] [Originally Added On: March 24th, 2010]
- DAs clash over Mineola sex ring appeal - KLTV [Last Updated On: March 25th, 2010] [Originally Added On: March 25th, 2010]
- iSilo for iPhone - BusinessWeek [Last Updated On: March 26th, 2010] [Originally Added On: March 26th, 2010]
- Questions Abound as "New START" Agreement is Completed - Global Security Newswire [Last Updated On: March 26th, 2010] [Originally Added On: March 26th, 2010]
- What will Apple do next in mobile services? - Mobile Entertainment [Last Updated On: March 26th, 2010] [Originally Added On: March 26th, 2010]
- How much is too much to pay for health care? - Anchorage Daily News [Last Updated On: March 27th, 2010] [Originally Added On: March 27th, 2010]
- The Future of Smartphones: 4G and Beyond - Entrepreneur [Last Updated On: March 27th, 2010] [Originally Added On: March 27th, 2010]
- Uploading and uplifting: sharing big data files - Earthtimes (press release) [Last Updated On: March 28th, 2010] [Originally Added On: March 28th, 2010]
- Verizon Blasts 'Outdated' FCC Broadband Plan - NewsFactor Network [Last Updated On: March 28th, 2010] [Originally Added On: March 28th, 2010]
- Web Host Layered Tech Offers Mezeo-Powered Cloud Storage - Web Host Industry Review [Last Updated On: March 29th, 2010] [Originally Added On: March 29th, 2010]
- Dropbox: Now one more reason to want a Nexus One - ZDNet (blog) [Last Updated On: March 30th, 2010] [Originally Added On: March 30th, 2010]
- Exaflood: Politicians Prop Up Dinosaurs, Ignore Cutting Edge Technology - NewsBlaze (press release) [Last Updated On: March 30th, 2010] [Originally Added On: March 30th, 2010]
- Instructions - Washington Post [Last Updated On: March 30th, 2010] [Originally Added On: March 30th, 2010]
- Uploading for Life Extension Will Be Valid - Institute for Ethics and Emerging Technologies [Last Updated On: March 31st, 2010] [Originally Added On: March 31st, 2010]
- 'Glee's' MySpace Auditions: What Not To Sing - Wall Street Journal (blog) [Last Updated On: March 31st, 2010] [Originally Added On: March 31st, 2010]
- Memeo iPad Reader: Like the GDrive on your iPad (only different) - ZDNet (blog) [Last Updated On: April 1st, 2010] [Originally Added On: April 1st, 2010]
- Why are pipe bomb 'how to' videos legal? Answer is alarming - KLTV [Last Updated On: April 1st, 2010] [Originally Added On: April 1st, 2010]
- Trip to Haiti inspiration for East Texas teen - KLTV [Last Updated On: April 1st, 2010] [Originally Added On: April 1st, 2010]
- Jason Kilar Leads Hulu To Profitability, But Will He Stay On At Hulu? - TVbytheNumbers [Last Updated On: April 2nd, 2010] [Originally Added On: April 2nd, 2010]
- Layers for IPad Adds Online Gallery, Pro Options - PC World [Last Updated On: April 2nd, 2010] [Originally Added On: April 2nd, 2010]
- Shane Dawson, YouTube's Comic for the Under-30 Set - New York Times [Last Updated On: April 2nd, 2010] [Originally Added On: April 2nd, 2010]
- Hands-On With the Apple iPad — and Your Questions - Wired News [Last Updated On: April 4th, 2010] [Originally Added On: April 4th, 2010]
- FedEx Simplifies International Shipping with FedEx Electronic Trade Documents - MarketWatch (press release) [Last Updated On: April 6th, 2010] [Originally Added On: April 6th, 2010]
- Cacoo Lets Multiple Users Create Designs Collaboratively And In Real-time - TechCrunch (blog) [Last Updated On: April 7th, 2010] [Originally Added On: April 7th, 2010]
- Comcast: Your New Overlord - ITworld.com [Last Updated On: April 7th, 2010] [Originally Added On: April 7th, 2010]
- Bloggers Photograph Food, We Get Hungry - Switched (blog) [Last Updated On: April 7th, 2010] [Originally Added On: April 7th, 2010]
- Apple suggests only the iPhone can fingerprint songs - Geek.com [Last Updated On: April 7th, 2010] [Originally Added On: April 7th, 2010]
- Senior with mental challenges killed along highway - KLTV [Last Updated On: April 7th, 2010] [Originally Added On: April 7th, 2010]
- Book a Cruise and "Flip" Over a Free Camcorder - CruiseCritic.co.uk [Last Updated On: April 8th, 2010] [Originally Added On: April 8th, 2010]
- Creation Myths: what the argument that the iPad's not for creating content ... - Huffington Post (blog) [Last Updated On: April 8th, 2010] [Originally Added On: April 8th, 2010]
- Want market share? Make a brain claim - Marketing Web [Last Updated On: April 8th, 2010] [Originally Added On: April 8th, 2010]
- 10 Ways World of Warcraft - OUPblog (blog) [Last Updated On: April 8th, 2010] [Originally Added On: April 8th, 2010]
- Check-in to Foursquare: Latest social media service lands in SW Florida - Naples Daily News [Last Updated On: April 8th, 2010] [Originally Added On: April 8th, 2010]
- Apple iPhone OS 4 Announcement Makes Users Feel "Finally!" - HULIQ [Last Updated On: April 8th, 2010] [Originally Added On: April 8th, 2010]