TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Malicous code written into DNA infects the computer that reads it

51 点作者 listentojohan将近 8 年前

15 条评论

kneel将近 8 年前
&gt;They cheated a little by introducing a particular vulnerability into the software themselves.<p>Wow, incredible work guys. Really a milestone here.
评论 #14988099 未加载
评论 #14981715 未加载
emh68将近 8 年前
I feel like scientists are intentionally doing things hey know will generate clickbait headlines. It&#x27;s probably good for funding.
winter_blue将近 8 年前
This is (yet) another buffer overflow exploit. Writing your code in <i>a safe language</i> makes buffer overflows obsolete. This problem was solved a long time ago. It should have been obsolete by now.<p>Even with code written in unsafe languages, ASLR and the XD&#x2F;NX bit makes this class of exploits almost completely obsolete. I&#x27;m assuming the DNA software they were using had neither turned on.<p>I&#x27;m a bit exhausted of hearing about buffer overflow exploits. There&#x27;s nothing smart or clever about them (anymore).
评论 #14980475 未加载
评论 #14980325 未加载
mediocrejoker将近 8 年前
Even though in this case the software vulnerability was introduced by the researchers, this is still a very innovative proof of concept that combines techniques from biochemistry and computer security.
gruturo将近 8 年前
As long as the code is &quot;just&quot; malicious to computers.<p>I dread (but am already certain it will eventually happen) the day when some kind of gene therapy cure will be customized to your DNA and will contain some absolutely nasty bio-DRM (think turbo cancer) if it gets applied to the wrong person, or past a date, etc.
评论 #14980493 未加载
kaffeemitsahne将近 8 年前
Not too far-off from the oft-mocked segment in Bones where a computer is infected by making an MRI scan of a malware fractal pattern embedded in the bones.
评论 #14980250 未加载
ccvannorman将近 8 年前
Reminds me of Hofstadter&#x27;s &quot;Given any record player, I guarantee a record can be made to break it&quot;
throwaway2016a将近 8 年前
I think the big thing this shows is that &quot;Never trust your input data without validation&quot; really means &quot;never&quot; even if the data is something seemingly difficult to tamper with.
dboreham将近 8 年前
Actual paper: <a href="http:&#x2F;&#x2F;dnasec.cs.washington.edu&#x2F;dnasec.pdf" rel="nofollow">http:&#x2F;&#x2F;dnasec.cs.washington.edu&#x2F;dnasec.pdf</a>
评论 #14980343 未加载
DArcMattr将近 8 年前
This is almost the plot of a scifi novel published in 1994, The Deus Machine, by Pierre Ouellette. The malicious code was placed in introns by nature itself.<p>Need to sanitize those inputs!
pdimitar将近 8 年前
&quot;Ghost in the Shell&quot; reality comes closer and closer.<p>Especially the part when in the original movie two garbage truck drivers were remotely hacked and their identities were completely replaced. That could probably happen by checking out a certain street sign.<p>Scary.
rdiddly将近 8 年前
From the title I thought they were going for a metaphor to describe what a cold or other virus might do. (And you&#x27;re the computer.)
kazinator将近 8 年前
If an MP3 playlist can exploit a player, why not any other data. A barcode on a banana could hide an exploit, so why not DNA.
xbmcuser将近 8 年前
Remind me of an episode of Bones
bigato将近 8 年前
never trust input