
A team of scientists from the University of Washington did not plan to get into the news columns of scientific portals. But it seems that it was inevitable. They were concerned about the security of the transcription process and DNA analysis, because this difficult task is based on software with open access to the source code. And use this software hundreds of laboratories around the world. If an attacker can load malicious code into the system, very expensive tests, to put it mildly, will be covered with a copper basin.
Of course, the researchers were able to demonstrate the vulnerability of the system using more traditional methods. For example, use remote access tools over the Internet. But scientists decided to go in his experiment a little further. As the carrier of malicious code, it was decided to use a DNA source material with which the analyzer system has to deal every day.
"Our main goal is to try to avoid situations where the offender will be knocking at our door, and we will absolutely not ready for this," says Professor Tadayoshi Kono, who for many years engaged in research in the field of security and built-in niche for electronics, including expensive scientific instruments.
Software scientific equipment arranged in such a way that the transforms obtained from the DNA data into binary data. The bit stream stored in the buffer of fixed size, assuming a reasonable maximum length of a reading. This gives attackers the underlying vulnerability of the buffer overflow data, which the software executes slipped malicious code. Let the experiment and was not used "computer virus" in the traditional sense, but the code was very close to that. Because with it scientists have been able to access the computer management.
The researchers hope that they will convey to the scientific community with this important information. After all, if expensive research equipment is so vulnerable to hack it even at the DNA level, many studies could be in jeopardy. But it does not promise anything good to mankind. The results of their study, the researchers will present to the public at the USENIX Security conference, to be held next week in Vancouver.
Tags: information war
- 29-05-2012Drugs in the service of the Third Reich
- 12-09-2010Many experts believe the best tank Merkava main battle tank in the world
- 12-09-2010The Minister of defence of Germany introduced draft large-scale reform of the armed forces
- 21-04-2001To the question about the war of the fourth sphere
- 11-10-2010