Increased cyber-biosecurity for DNA synthesis
Fig. 1: Malicious DNA injection performed by a remote cyber-criminal.


  1. 1.

    Berry, D. J. Hist. Technol. 35, 374–404 (2019).


    Google Scholar

  2. 2.

    U. S. Department of Health Human Services. Screening framework guidance for providers of synthetic double-stranded DNA. (2010).

  3. 3.

    US National Institutes of Health. NIH guidelines for research involving recombinant or synthetic nucleic acid molecules. (2019).

  4. 4.

    World Economic Forum. Biosecurity innovation and risk reduction: a global framework for accessible, safe and secure DNA synthesis. (2020).

  5. 5.

    IASB. The IASB code of conduct for best practices in gene synthesis. (2009).

  6. 6.

    Harmonized screening protocol, I.G.S. v2.0. (2017).

  7. 7.

    Murch, R. & DiEuliis, D. Front. Bioeng. Biotechnol. 7, 235 (2019).

  8. 8.

    Cui, Y., Xu, J., Cheng, M., Liao, X. & Peng, S. Interdiscip. Sci. 10, 455–465 (2018).


    Google Scholar

  9. 9.

    Wang, L. et al. Sci. Rep. 5, 17517 (2015).


    Google Scholar

  10. 10.

    Scarfone, K. & Mell, P. Guide to intrusion detection and prevention systems (IDPS). NIST Special Publication 800-94 Rev. 1 (draft) (National Institute of Standards and Technology, 2012).

  11. 11.

    Kwon, D. et al. A survey of deep learning-based network anomaly detection. Cluster Comput. 22, 949–961 (2019).


    Google Scholar

  12. 12.

    Ahmed, M., Mahmood, A. N. & Hu, J. J. Netw. Comput. Appl. 60, 19–31 (2016).


    Google Scholar

  13. 13.

    Adam, L. et al. Nat. Biotechnol. 29, 208–210 (2011).


    Google Scholar

  14. 14.

    Tucker, J. B. Issues Sci. Technol. 26, 23–32 (2010).

    Google Scholar

  15. 15.

    Raisaro, J.L. et al. MedCo: enabling privacy-conscious exploration of distributed clinical and genomic data. in 4th International Workshop on Genome Privacy and Security (GenoPri’17) (2017).

  16. 16.

    West, R. & Gronvall, G. K. Nat. Biotechnol. 38, 1021 (2020).


    Google Scholar

Download references

Author information


  1. Software and Information Systems Engineering, Ben-Gurion University of the Negev, Be’er Sheva, Israel

    Rami Puzis & Yuval Elovici

  2. Cyber Security Research Center, Ben-Gurion University of the Negev, Be’er Sheva, Israel

    Rami Puzis, Dor Farbiash, Oleg Brodt & Yuval Elovici

  3. Jusidman Science Center for Youth, Ben-Gurion University of the Negev, Be’er Sheva, Israel

    Dor Farbiash

  4. Telekom Innovation Labs, Ben-Gurion University of the Negev, Be’er Sheva, Israel

    Oleg Brodt

  5. Zvi Meitar Institute for Legal Implications of Emerging Technologies, IDC Herzliya, Herzliya, Israel

    Dov Greenbaum

  6. Harry Radzyner School of Law, IDC Herzliya, Herzliya, Israel

    Dov Greenbaum

  7. Molecular Biophysics and Biochemistry, Yale University, New Haven, CT, USA

    Dov Greenbaum

Corresponding author

Correspondence to
Dov Greenbaum.

Ethics declarations

Competing interests

The authors declare no competing interests.

About this article

Leave a Reply

Your email address will not be published. Required fields are marked *